1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katen [24]
3 years ago
13

In an interview, an appropriate response to "What is an example of one of your

Computers and Technology
2 answers:
aivan3 [116]3 years ago
4 0

Answer:

I am too hard on myself sometimes.

Explanation:

Vilka [71]3 years ago
3 0

Answer:

"I tend to struggle with __________, because _______________.

Explanation:

For exanple:

"I tend to struggle with my anger, because I grew up in a harsh enviroment."

or

"A weakness of mine would be my self image. I was often bullied as a kid."

You might be interested in
he Saffir-Simpson Hurricane Scale classifies hurricanes into five categories numbered 1 through 5. Write an application named Hu
AnnyKZ [126]

Answer:

The program plan requires the design of the gui program form

Explanation:

The program plan will be as follows:

take 4 label and 4 text box and 1 button and modify the property of controls to design the gui form.

use 6 if statements and 1 else statement.

use or operator for comparison.

show message in textbox.

program code:

using System;

using System.Collections.Generic;

using System.ComponentModel;

using System. Data;

using System.Drawing;

using System.LINQ;

using System.Text;

using System.Threading.Tasks;

using System.Windows.Forms;

namespace...

4 0
3 years ago
Read 2 more answers
Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
kakasveta [241]

Answer:

It is called a WPS brutal force attack.

Explanation:

Wired and wireless networks are both susceptible to attacks. The wired network, the advantage as a cable connection, is more secure than wireless networks, but wireless network also have security measures like the wifi protected set up (WPS).

WPS is used to connect to a network without passphrase, but with a key combination or a PIN.

Brutal force attacks are used on WPS to forcefully generate the PIN, using a third party software.

3 0
3 years ago
Look at the following structure declaration.
myrzilka [38]

Answer:

B. a tag

Explanation:

In the structure definition given below:

struct Employee

{

string name;

int idNum;  

};

Employee corresponds to the tag of the structure. The tag is used to create additional instances of the structure. For example:

struct Employee e1;

struct Employee e2;

name and idNum are members of the Employee structure and are referenced using the dot notation. e.g.,

struct Employee e1;

e1.idNum=1;

7 0
3 years ago
_________ media must be downloaded in its entirety to the user's computer before it can be heard or seen
gladu [14]

Answer:

Downloadable

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, a downloadable media must first be downloaded in its entirety and saved to a user's computer before it can be played, heard or seen.

For example, for an end user to listen to a song hosted on a particular website, he or she must first of all download the song in its entirety and have saved on a computer system before it can be seen, played and listened to. Also, other downloadable media such as videos, animations, texts, etc., must be downloaded before they can be accessed or used by an end user.

4 0
3 years ago
When building systems, the only two entities that constitute software engineering are people and process.
VLD [36.1K]

Answer: False

Explanation: Software engineering is the designing, analyzing, creating the software application as per the requirement of the user. The programming languages is the base for the designing of the application the software engineering field.

At the time of building system ,there is the requirement of many resources for the development.There is the requirement of the software skills, programming knowledge, resources and tools for the working and designing.Thus, there are different resources, people,skills processes, problem solving skill etc required for the building of the system.

7 0
3 years ago
Other questions:
  • What is the purpose of lookup tables in spreadsheet software
    13·2 answers
  • Help!!!!!!!!!!!!!!!!!!!
    12·1 answer
  • #Write a function called alter_list. alter_list should have#two parameters: a list of strings and a list of integers.##The list
    11·1 answer
  • A ________ is a powerful analytical tool to size up Apple Inc.'s competitive assets in order to determine whether or not those a
    9·1 answer
  • Which of the following allows the transmission of voice and often video communication over the internet?
    12·1 answer
  • It connects computers in different cities and different countries
    9·2 answers
  • Type the correct answer in the box. Spell the word correctly.
    15·2 answers
  • How can I use HTML to express a personal value
    13·1 answer
  • HELP 20 points THIS IS ON EDGE IF YOU DON'T KNOW THE ANSWER DON'T RESPOND
    12·2 answers
  • which server edition doesn't support any server roles that you would typically use with standard version
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!