1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrew [12]
3 years ago
15

. Does Zuckerberg believe in the thought that “the endpoint is when you sell the

Computers and Technology
1 answer:
alexdok [17]3 years ago
4 0
<span>Zuckerberg does not believe that selling the company is the endpoint. He says that, "...a lot of people who I think build startups or companies think that selling the company or going public is this endpoint. Right, it's like you win when you go public. And that's just not how I see it."</span>
You might be interested in
Design by contract considers the software system to be a setof:
Ludmilka [50]

Answer: A) clients and servers

Explanation:

 Design by contract considers the software system to be a set of Clients and server as, the contract designing is the contract software programming approached for making the effective system software. This type of approach are consider that all the components of the clients that are instance of an operation on the components of the server, which can fulfill the precondition specific requirements which including in that operations.

5 0
3 years ago
One rule in the Java programming language is that you have to place a semicolon at the end of each statement. What is this rule
slavikrds [6]

Answer:

A data structure if I'm correct.

Explanation:

The computer would need to know when one command is over, as you can write code like this,

ellipse(20, 20, 20, 20);fill(255, 0, 240);

and without the semicolon it would end up looking like this,

ellipse(20, 20, 20, 20)fill(255, 0, 240)

and the computer would not know when you've stopped creating the circle and when you've started to color it.

8 0
3 years ago
Read 2 more answers
What is an example of a condition controlled loop? What would the syntax look like?
irina1246 [14]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

WHILE loops and DO WHILE loops are called the condition controlled loops. The execution of these loops depends on a certain condition, when the condition is true, the loop body will be executed and when the condition becomes false, the loop body will not be executed. the major difference between both loops is given below.

In the WHILE loop,  the condition is checked at the beginning of the loop whereas in the do-while loop condition is checked at the end of the loop and, in the do-while loop, the loop body is executed at least once.

The syntax of the while loop is given below

while (condition) {

 // code block to be executed

}

The syntax of do-while loop is given below

do {

 // code block to be executed

}

while (condition);

6 0
3 years ago
Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be moni
chubhunter [2.5K]

Answer:

She can the following tool to protect the link:

Secure Socket Shell

Explanation:

Secure Socket Shell:

It is also known as secure shell and has short form SSH. A method that is used to secure the communication over the unprotected network. This network protocol was introduced in 1995 and its most common use include the managing of different systems as the network administrator can execute different commands remotely.

In our question, Jane can use Secure socket shell in order to communicate the information to the remote end without being monitored by the adversaries.

8 0
4 years ago
Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz
jonny [76]

Answer:

C. Z-wave

Explanation:

The Z wave is a wireless communications protocol used primarily for automation. The Z- wave operates using a mesh network and then uses low energy radio waves to communicate from appliance to appliance.

The Z wave operates on a lower frequency than most other popular RF devices, thus making interference nonexistent.

The range of the Z-wave is 100m. Hence, it can give a perfect coverage from the base station to the company.

<em>Option A is wrong</em> . This is because the Zigbee is insecure and has a low coverage range (10m-20m). This means that there are possibilities of interference and also improper coverage beyond 50 m.

<em>Option B is wrong.</em> This is because Bluetooth devices are insecure, can loose connections under certain conditions. They have a range of 10m which is a lot lower than 50m benchmark.

<em>Option D is wrong</em>. NFC stands for Near Field Communication. This means its range is practically about 4cm and it cannot be used for long ranges as the company intends.

6 0
4 years ago
Other questions:
  • Danny is editing the text content of a single page on a website he created a year ago. What part of the tag would he have to upd
    11·1 answer
  • Why are video games interesting?
    5·1 answer
  • How to study program ?
    11·1 answer
  • A web ______ is a computer that delivers requested webpages to your computer or mobile device.
    7·1 answer
  • The unique constraint differs from the primary key constraint in what way?â
    15·1 answer
  • The Mail Merge option is located in which tab? a;home b;insert c;refernces d;mailings
    11·2 answers
  • Based on the details in The Riddle of the Rosetta Stone, how did the career of Jean-Baptiste Fourier differ from that of Jacques
    9·2 answers
  • The process of sending a result back to another part of the program is
    14·1 answer
  • Fill _________ skips the Saturday and Sunday dates in a date fill.
    10·1 answer
  • WRITE A PROGRAM TO CALCULATE SIMPLE INTEREST
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!