1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAXImum [283]
3 years ago
10

Like Tess, Brina has a fascinating job! She works as a software engineer with Instagram. She says that Computer Science is a way

to impact the world. At first she did not like coding, why? What changed her mind?
Computers and Technology
2 answers:
Arturiano [62]3 years ago
6 0

Answer:

This is a subjective answer, so I'll try my best to answer this.

She probably did not like coding because it is like learning a new language, which can be very difficult for people, but once she saw everything it can do and how it could impact people's day to day life she knew that it is very impactful.

Explanation:

Ronch [10]3 years ago
4 0
She probably didn’t like it at first because coding is like learning a new language it’s hard. But after she learned it and realized how it impacts ppl lives she changed her mind.
You might be interested in
A computer hard disk starts from rest, then speeds up with an angular acceleration of 190 rad/s2 until it reaches its final angu
Nataly_w [17]
The first thing we are going to do is find the equation of motion:
 ωf = ωi + αt
 θ = ωi*t + 1/2αt^2
 Where:
 ωf = final angular velocity
 ωi = initial angular velocity
 α = Angular acceleration
 θ = Revolutions.
 t = time.
 We have then:
 ωf = (7200) * ((2 * pi) / 60) = 753.60 rad / s
 ωi = 0
 α = 190 rad / s2
 Clearing t:
 753.60 = 0 + 190*t
 t = 753.60 / 190
 t = 3.97 s
 Then, replacing the time:
 θ1 = 0 + (1/2) * (190) * (3.97) ^ 2
 θ1 = 1494.51 rad
 For (10-3.97) s:
 θ2 = ωf * t
 θ2 = (753.60 rad / s) * (10-3.97) s
 θ2 = 4544,208 rad
 Number of final revolutions:
 θ1 + θ2 = (1494.51 rad + 4544.208 rad) * (180 / π)
 θ1 + θ2 = 961.57 rev
 Answer:
 the disk has made 961.57 rev 10.0 s after it starts up
3 0
3 years ago
Read 2 more answers
Client computers cannot function unless they are connected to the network because they cannot access an operating system.
Shtirlitz [24]

Answer: true

Explanation:

As the operating system cannot run from an external device and in a distributed operating system all the clients needs to be connected to the network to share resources via the distributed or network operating system.

8 0
3 years ago
A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password
Setler [38]

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

5 0
3 years ago
What is spread sheet software?​
melamori03 [73]

Answer:

The answer to this question is given in the explanation section.

Explanation:

This is a type of software which show us data in tabular form. These software can easily store, analyze and organize data.

They are divided in rows and columns. They are mainly used for accounting and book keeping.

The commonly used spread sheet software in the market are MS Excel by Microsoft, Calc by libre office.

3 0
3 years ago
Whatisthebestlocationapp for my androidphonebesidesgoogle maps?
Cerrena [4.2K]
Not sure whether this question is requires a specific answer but I would say Waze.
3 0
3 years ago
Other questions:
  • Which key on a laptop keyboard is often used to help pair a mobile device with another device for communication purposes?
    12·1 answer
  • A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But af
    11·1 answer
  • Jesse is trying to find a computer file. he types the name of the file into the computer search bar. the computer is most likely
    5·2 answers
  • The establishment called ABC Enterprise requires a Java program to keep a database of the inventory of the products that it sell
    8·1 answer
  • You have answered 4 of 18 questions.
    12·2 answers
  • Why do software developers prefer to use high-level language to author programs?
    8·1 answer
  • How many types of window in Qbasic​
    7·1 answer
  • What is the difference between
    14·1 answer
  • Ethics related to all <br> artificial intelligence?
    14·1 answer
  • which type of processor chip is designed to perform a single function and is typically custom-designed?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!