1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
3 years ago
7

Can someone pls explain this question??

Computers and Technology
1 answer:
tatuchka [14]3 years ago
6 1

THE ANSWER IS BABABOOEY

You might be interested in
How does the team know what to work upon during the iteration
Brilliant_brown [7]

Answer:

Based on the discussions during iteration planning, team members agree on what each would work on.

Explanation:

Iteration can be defined as the way in which a process is been repeated in order to generate a possibly outcomes and this occur in a situation where the sequence will approach some end point in which each repetition of the process will be a single iteration while the outcome of each iteration will then be the starting point of the next iteration.

Therefore the team know what to work upon during the iteration Base on the discussions during iteration planning in which the team members agree on what each of them would work on.

During the iteration planning, the team collectively make a decision on how much of the backlog actually they will commit to the iteration in which the committed backlog then is taken to the delivery during the next iteration which is why the goals or objectives of the iteration get determined on the basis of the work committed.

7 0
3 years ago
What is the computer?​
DiKsa [7]

Answer:

an electronic machine that can store, find and

8 0
2 years ago
What are the three fundamental elements of an effective security program for information systems?
marishachu [46]
<span>the three fundamental elements of an effective security program for information systems are Identification, Authentication and Authorization.The access control creates the user and assigns the rights to resources and authorization is giving permissions to the users to access the resources.The user who wants to enter the system should have a valid data t enter the system like password, fingerprint or any other type of recognition.</span>
4 0
3 years ago
Read 2 more answers
PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
DaniilM [7]

Answer:

1. would be B.

2. would be D

3. May I ask if it can be multiple answers?

Explanation:

1. In coding a if statement has to follow if something is true or not. If we are talking about a if and then statement it will skip that block and move to the next block of the "then" part of the "if then" Statement if the first part is reported false

2. This is a easy one, so it has to be either a 3.25 GPA or higher or they have to have either 100 hours or more.

3. waiting for a comment back :)

4 0
3 years ago
Which statement is true about customizing presentation programs? A. You can add multiple animations to an object in a slide with
levacccp [35]

From all the given options, the correct statement about customizing presentation is (B) you can customize a pre-designed slide layout with the Slide Master.

The option (A) is false, because if you want to put animations on your slide objects, you need to go to the Animation tab, while option (C) is false because to view the animation that you assign to a slide object, you need to open the animation pane bar or go to slide show. Option (D) is false because you <em>can </em>make changes to the colors, fonts, and effects for pre-designed slide themes.

6 0
3 years ago
Read 2 more answers
Other questions:
  • From the video "Your Password Sucks", using computer power to guess your password by trying multiple variations one after the ot
    15·2 answers
  • For a loop counter, the appropriate data type would be:
    14·1 answer
  • After spending a year in India, Giovanna returns home to the United States and is inspired to raise money to help her new friend
    14·1 answer
  • What does the launcher button do? (From Microsoft Word 2016)
    6·1 answer
  • If metal shims are used for alignment adjustment in the front, they adjust ________.
    5·1 answer
  • Can you give an example of mail merge (letter) pls​​
    6·1 answer
  • Why is distance learning better
    12·2 answers
  • First, read in an input value for variable valCount. Then, read valCount integers from input and output each integer on a newlin
    6·1 answer
  • Perceptron simplest definition
    14·1 answer
  • consider a pipelined risc cpu with 14 stages. what is maximum speedup of this cpu over a non-pipelined implementation?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!