1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
3 years ago
9

20 Points!! Please hurry!!

Computers and Technology
1 answer:
ahrayia [7]3 years ago
8 0

Answer:

the answer is Navigation form

You might be interested in
Are the ways data represented and transmitted with computer law of nature or by law of man?
hammer [34]
Data representation is law of man.
5 0
3 years ago
How to make a business plan​
Alborosie

Answer:

Traditional business plan format

Executive summary. Briefly tell your reader what your company is and why it will be successful. ...

Company description. ...

Market analysis. ...

Organization and management. ...

Service or product line. ...

Marketing and sales. ...

Funding request. ...

Financial projections.

Explanation:

Hope it helps

8 0
3 years ago
What is the part of the browser window that displays the content of the web page such as pictures and text called?
iragen [17]
The frame is a part of the web page or browser window
5 0
3 years ago
Compute the present value of a $5,500 deposit in year 1, and another $5,000 deposit at the end of year 4 using an 8 percent inte
marusya05 [52]

Answer:

Explanation:

Present value is the value in the present of a sum of money, in contrast to some future value it will have when it has been invested at compound interest.

It can be calculated using future value formula below

A = P(1+r/100)^n

where

A = Future value

P = Present value

r = Rate of interest

n = time period

Present Value = Value at Year 1 + Value at Year 4

Calculating Value at Year 1

A = $5,500

r = 8%

n = 1

From A = P(1+r/100)^n ; Make P the subject of formula

P = A ÷ (1 + r/100)^n

Substitute in values

P = $5,500 ÷ (1 + 8/100)^1

P = $5,500 ÷ (1 + 0.08)

P = $5,500/1.08

P = $5092.5925926

P = $5092.59 ----

Present Value at Year 1 = $5092.59

Calculating Value at Year 4

A = $5,000

r = 8%

n = 1

From A = P(1+r/100)^n ; Make P the subject of formula

P = A ÷ (1 + r/100)^n

Substitute in values

P = $5,000 ÷ (1 + 8/100)⁴

P = $5,000 ÷ (1 + 0.08)⁴

P = $5,000/1.08⁴

P = $3675.149263982267

P = $3675.15 ----

Present Value at Year 4 = $3675.15

Present Value = Value at Year 1 + Value at Year 4

Substitute each value

Present Value = $5092.59 + $3675.15

Present Value = $8,767.74

8 0
4 years ago
You acquire a network vulnerability-scanning tool and try it out on a network address segment belonging to people at your univer
inna [77]

Answer and Explanation:

  • The speculates on either the morality of transmitting vulnerabilities to an individual over all the internet. The node is a very possible target of a criminal charge, these are highly recommended in terms of the problem not just ethical.
  • The question argues the etiquette of telling a compromised network infrastructure to something like a domain admins or security guard. Throughout this case the primary admin issue is power. Informing individuals about both the potential problem is prudent or legal, which is also preferable to recommend the future course of action.
  • The speculates on either the moral values of leveraging the infrastructure for a mild vulnerability. This same proprietor including its node is truly likely to be victims of a prospective infringement, and therefore it is advantageous to notify him including its problem that the equitable access is considered to become an ethical manipulate susceptibility for possessor data as well as potential threats to understanding.
  • The theories a small flaw throughout the channel's ethics. The device's leader is the likely guilty party of even a future offense to notify him of both the actual problem. The law is ridiculous as well as comparable to trying to hack without permission vulnerability it's immoral vulnerability.
  • The content upon the ethical principles of manipulating the channel's small susceptibility. The device's owner seems to be the likely casualty of such a future offense to instruct him including its subject. As well as trying to sell him much farther documents socially responsible borders. It's the holder who has so far notified the weakness she perhaps she has just one option to obtain products and services. Having clear data on the sale still seems to be ethical.
  • The issue argues mostly on ethics with repairing security flaws without channel assent. Although the controlled variable of the modules has been the true likely target of such a future infringement, exploiting susceptibility without permission is appropriate as well as unethical, this same objective being honorable as well as noble.
8 0
3 years ago
Other questions:
  • Complex machines are defined by...
    14·2 answers
  • If more than one symbol is located immediately adjacent to another, it usually means that a multi gang box for multiple wiring d
    12·1 answer
  • The * key on the number keypad is used for _____.
    5·2 answers
  • Raul converts numbers in base 10 to base 2. Which answer best defends why Raul would need to do this?
    12·1 answer
  • A chiropractor is looking at the Security Standards Matrix and believes that it is unnecessary to address the encryption and dec
    8·1 answer
  • 2. Use the Internet to research Robocopy switches and then construct a command line that will use Robocopy to copy files in rest
    14·1 answer
  • Describe how computer become <br> in the next 35 year
    5·1 answer
  • What structure is a candle​
    13·1 answer
  • Select the correct answer.
    7·1 answer
  • Which type of service offers a preconfigured testing environment for application developers to create new software applications?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!