1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
3 years ago
11

A self improvement plan should begin with planning how you will accomplish your goal.

Computers and Technology
2 answers:
Natali5045456 [20]3 years ago
8 0

Answer:

Answer:

True

Explanation: The first step is to make a goal. The second step is to plan how you will accomplish you goal. The third and final step is to accomplish your goal.

Explanation:

Artist 52 [7]3 years ago
4 0

Answer:

True

Explanation: The first step is to make a goal. The second step is to plan how you will accomplish you goal. The third and final step is to accomplish your goal.

You might be interested in
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
Which of the following rules need to be followed when using variables?<br> Choose all that apply.
Masja [62]

Answer:

- All variable names must begin with a letter of the alphabet or an. underscore( _ ).

-After the first initial letter, variable names can also contain letters and numbers.

-Uppercase characters are distinct from lowercase characters.

-You cannot use a C++ keyword as a variable name.

7 0
2 years ago
Read 2 more answers
Write pseudocode instructions to carry out each of the following computational operations:1. Determine the area of a triangle gi
Zinaida [17]

Answer:

Hi there! The question is checking your knowledge on Pseudocode. Pseudocode is a high level solution written in plain English to outline the steps needed for the program to work correctly. An implementation for the different parts of the question is written below.

Explanation:

1. Determine the area of a triangle

  declare formula for area calculation of triangle as ½ * (base * height)

  validate input parameters “base” and “height”

  apply formula and return result

2. Compute the interest earned Prompt user for input 2

   declare formula for interest calculation as annual interest rate * term *     starting account balance

   validate input parameters “interest_rate” and “starting_account_balance ”

   apply formula and return result as final balance at the end of the year as the interest earned + starting balance.

3. Determine the flying time between two cities given the mileage M between them and the average speed of the airplane.

   declare formula for time calculation of triangle as time = distance / speed

   validate input parameters for mileage “M” and speed “S”

   apply formula and return result

7 0
3 years ago
Suppose we used an Internet Addressing protocol that used 4 bits to encode a single address. How many devices would be supported
Allushta [10]
C. is the answer my guy
8 0
3 years ago
-- of 5 points Question 3 1 try left While designing a new system, a company uncovered several processes that were quite rule-ba
Anna [14]

Answer:

B. robotic process automation.

Explanation:

In the design of a new system, a company was able to uncover several processes that were typically rule-based, and which did not really require staff to control or handle.

Hence, the company chose to automate those processes using robotic process automation so they would no longer need to assign people to perform those tasks.

4 0
2 years ago
Other questions:
  • Which activity cannot be done on a social networking site?
    12·1 answer
  • Technological _____ is the term used to describe the merging of several technologies into a single device.
    13·1 answer
  • 50 pts DO NOT ANSWER FOR POINTS
    9·1 answer
  • Double clicking a word selects the entire word?
    10·1 answer
  • What type of engineer is needed in the following scenario?
    7·2 answers
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    12·1 answer
  • An individual who understands and uses a variety of symbols yet uses one symbol at a time to share a message needs more developm
    10·1 answer
  • Which of the following is another type of brake system used in trucks
    5·1 answer
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    10·2 answers
  • Because Brainly is such a big organization for students in need of help with their school work, I believe that it was either som
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!