1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
3 years ago
11

If you come to a stumbling block and can't think of any more ideas, what could you do? select all that apply 2pts.

Computers and Technology
2 answers:
Ira Lisetskai [31]3 years ago
8 0

If you come to a stumbling block and can't think of any more ideas, what could you do? ALL OF THESE

1 expand on your favorite idea so far even if you don't think it will work. Sometimes you'll find a solution where you least expect it.

2 go with the ideas you've come up with this far. Moving forward and the design process will be encouraging.

3 rephrase your problem question. Looking at the problem from a different perspective can Inspire new ideas

4 take a break and come back later with a fresh mind. A clear mind will give you a new perspective
ANEK [815]3 years ago
7 0

When you have a mental block or in the midst of a rut, you can choose to implement several strategies that would help you escape this condition. Based on the options available for the question given, you can choose to:

  • [3] Rephrase your problem question. Looking at the problem from a different perspective can Inspire new ideas
  • [4] Take a break and come back later with a fresh mind. A clear mind will give you a new perspective

You might be interested in
Which kind of image is indispensable and needs added text to go with it?
madreJ [45]

Answer:

A chart and a graph are kind of image that are indispensable and need added text to go with it.

4 0
3 years ago
What is parallelism of microinstruction
Kitty [74]
The answer is Hardware level works upon dynamic parallelism whereas, the software level works on static parallelism. Dynamic parallelism means the processor decides at run time which instructions to execute in parallel,
8 0
3 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
4 years ago
A married man gets a new job in a company. After three months, he meets a younger woman in the finance department and they begin
pav-90 [236]

Answer:

False ( B )

Explanation:

Of  the seven IT  infrastructure domains The USER domain was not at risk because the User Domain is not task with handling the sharing of data or Mutual communication between users in a Typical IT infrastructure.

The domain charged with such responsibility is The LAN domain because the LAN domain is charged with the sharing of information between the USERS and maintaining good mutual communication, and since the relationship has become sour, the sharing of information between the users will suffer the most and it will be at a high risk

5 0
3 years ago
IT professionals should help to protect users’ personal information, such as bank account information or Social Security numbers
sesenic [268]

To prevent theft of account information, identity theft, money, important passwords, and personal information.


Hope it helps ❤️

8 0
4 years ago
Read 2 more answers
Other questions:
  • A restaurant bill comes to $28.35. Find the total cost if the tax is 6.25% and a 20% tip is left on the amount before tax.​
    6·1 answer
  • _____ run horizontally and _____ run vertically in a table.
    7·1 answer
  • What is a tag in an HTML document?
    5·1 answer
  • Teachers in most school districts are paid on a schedule that provides a salary based on their number of years of teaching exper
    7·1 answer
  • Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.
    14·1 answer
  • The next thing Maria wants to do is to indent the first line of her paragraph how dose she do it
    10·2 answers
  • Show the CREATE TABLE statements for HAPPY INSURANCE database for the table CLIENT (assume that non-primary key columns can be o
    7·1 answer
  • When do you need to use a fully qualified url in a hyperlink?
    6·1 answer
  • G i r l s o n l y j o i n <br> id= ons jcuv jke
    13·2 answers
  • Httpsdiscord.ggBVNuFMgG link is here<br>come and join discord​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!