1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
2 years ago
8

Explain why the receptionist responded as indicated in the following scenario.

Computers and Technology
1 answer:
slavikrds [6]2 years ago
4 0
The receptionist is aware of the every day attire as he works there. Jim and Roger are undressed, since they were wearing blue jeans. The receptionist lets them know of what’s expected.

Hope this helps!
You might be interested in
What is a term commonly used to describe the Python dictionary feature in other programming languages
Yakvenalex [24]

Explanation:

1) Easy to Learn and Use

Python is easy to learn and use. It is developer-friendly and high level programming language.

2) Expressive Language

Python language is more expressive means that it is more understandable and readable.

3) Interpreted Language

Python is an interpreted language i.e. interpreter executes the code line by line at a time. This makes debugging easy and thus suitable for beginners.

4) Cross-platform Language

Python can run equally on different platforms such as Windows, Linux, Unix and Macintosh etc. So, we can say that Python is a portable language.

5) Free and Open Source

Python language is freely available at offical web address.The source-code is also available. Therefore it is open source.

6) Object-Oriented Language

Python supports object oriented language and concepts of classes and objects come into existence.

7) Extensible

It implies that other languages such as C/C++ can be used to compile the code and thus it can be used further in our python code.

8) Large Standard Library

Python has a large and broad library and prvides rich set of module and functions for rapid application development.

9) GUI Programming Support

Graphical user interfaces can be developed using Python.

10) Integrated

It can be easily integrated with languages like C, C++, JAVA etc.

7 0
3 years ago
Complex communication skills will probably never be outsourced to a computer because they require the human touch.
frutty [35]
True because eventually a human needs to repair the computers
4 0
4 years ago
A firm uses BitLocker for volume encryption. Normally, BitLocker performs its task well. However, an administrator was recently
raketka [301]

Answer:

The BitLocker keys were compromised

Explanation:

Given that the act of decrypting and encrypting all over is a means of troubleshooting the issue of security in computing operations. Hence, when an administrator is forced to decrypt and encrypt the entire volume, the main reason for such action can be as a result of "BitLocker keys were compromised."

Hence, the right answer, in this case, is that "The BitLocker keys were compromised."

3 0
4 years ago
Marisa wants to customize her computer's default firmware. ROM allows data to be changed or modified when necessary.
ludmilkaskok [199]

Answer: ROM stands for "Read-only memory", this is permanent, so false.

4 0
2 years ago
Read 2 more answers
Which of the following variable declarations is a correct assignment?
Gwar [14]

Answer:

Option D: double y = 82;

Explanation:

In Java programming, it is acceptable to assign an integer (lower type) to a double type (higher type) variable. By assigning an integer to double type variable using the "=" operator, the integer will be converted to double type implicitly. It is known as the implicit type casting.  

For example, <em>double y = 82</em> will convert integer 82 (integer) to 82.0 (double).

6 0
3 years ago
Other questions:
  • WILL MARK BRAINLYIST
    15·2 answers
  • Select the correct answer. One of the functions of a data warehouse is to change table names to meaningful names. Which name is
    13·1 answer
  • (Help please I don't know what to choose because it's both text and email but I can only pick one. HELP!!!!!!!!!!)
    6·2 answers
  • In the ____ letter style, all components of the letter begin flush with the left margin.
    5·1 answer
  • How do cyber criminals target user’s end devices?
    11·2 answers
  • Write a new version (called map2) of the map function which operates on two lists. Your function should accept three parameters,
    15·1 answer
  • 10. Why antivirus is needed to be installed in computer system?
    8·1 answer
  • If your earning potential is higher than the cost of your higher education,<br> you will have a
    8·1 answer
  • The process of specifying that certain rows be displayed in the results of a query is known as selection. ______________________
    13·1 answer
  • which type of virtual machine (vm) takes advantage of unused capacity in data centers at a much lower cost than regular vms of s
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!