1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrew [12]
3 years ago
15

. Does Zuckerberg believe in the thought that “the endpoint is when you sell the

Computers and Technology
1 answer:
alexdok [17]3 years ago
4 0
<span>Zuckerberg does not believe that selling the company is the endpoint. He says that, "...a lot of people who I think build startups or companies think that selling the company or going public is this endpoint. Right, it's like you win when you go public. And that's just not how I see it."</span>
You might be interested in
Supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the cust
Jet001 [13]

Answer:

Operational CRM.

Explanation:

Operational CRM can be described as most of the programs that allow a company to taking care of the desires of the consumers. The structure links and maintains the selling, marketing, and customer support activities of a corporation, thus providing a structure that requires customer service.

So, the following answer is correct according to the statement.

7 0
3 years ago
____ is a systems development technique that produces a graphical representation of a concept or process that systems developers
rosijanka [135]

Answer:

D. Modeling

Explanation:

<em>Modeling</em>: It is a graphical representation, of a concept or system, technique used by software developer to analyze, test, and modify that system or concept.

4 0
4 years ago
Explain the steps you take to complete an Internet search. Do you use a particular search engine every time or do you alternate?
Levart [38]
While proceeding with an internet search I find google to be the best source considering its high accuracy. When asking your question keep it minimal yet descriptive. After having found a few sources cross reference them with each other and throw out any sources that may hold false information. After having narrowed them down look to see how recent they are because since their publication new information may have been brought to light. Look to see if they have links to where they got their information. All in all just be diligent.
5 0
3 years ago
(I'm sorry that this question isn't school related, I can't find answers anywhere else)
Juliette [100K]
Because you have to explain how you got it
3 0
3 years ago
Each of the following code fragments contains a number of security vulnerabilities. For each fragment, identify these security v
Trava [24]

Answer:

Check the explanation

Explanation:

a)

1) int main(int argc, char *argv){

argv has always been an array of pointer whereby each and every element points to the command line argument that is passed to the program.

int main(int argc, char *argv[]) {

2) passwords = fopen(filePath, "r");

argv[0] always holds the name of the program currently running i.e. itself

So you shouldn't even try not to open a executable file for reading. since doing this will not give error but you won't be able to read the file as it is a binary file.

it is god to always check whether the file was opened successfully or not after opening the file. If file was not opened successfully fopen will return NULL.

passwords = fopen(filePath, "r");

if(passwords == NULL)

{

printf(“\n Unable to open file”);

return -1;

}

3) execl(shellPath, "shell", NULL);

Before making a call to execl you should close the open file

close(passwords);

b)

1) char itemID[9];

After creating a char array one should always initialize the array as it may contain some garbage value.

char itemID[9] = “”;

2) scanf("%d", &unitsOrdered);

Since unitOrdered represents the quantity, it should always be non zero and non negative

c)

1) char fullName[MAX_LEN];

MAX_LEN should not be zero or negative as it used to define the size.

If ( MAX_LEN <=0 )

{

return error;

}

else

{

char fullName[MAX_LEN]

}

2) strcpy(fullName, firstName);

Before using the string functions you're expected to always make sure that the pointer that you are passing to the functions should not be NULL i.e. the pointers should always pass to certain memory location.

if (firstName && lastName)

{

strcpy(fullName, firstName);

strcat(fullName, " ");

strcat(fullName, lastName);

return fullName;

}

else

{

return error;

}

5 0
3 years ago
Other questions:
  • Write a program that defines a type for a structure that stores information on a student in ENG EK 125. Declare two variables to
    8·1 answer
  • How do u change the level of education on Brainly. cuz i just finished elementry
    9·2 answers
  • To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
    5·1 answer
  • In data flow diagrams, an individual who originates data is:
    15·1 answer
  • Which of the following is true? A)Checks and Debit Cards both withdraw money directly from a bank account. B)Checks are the most
    13·2 answers
  • In this mode, your presentation will fill up the entire screen. Auto Default Standard Window
    6·2 answers
  • The elements of an integer-valued array can be set to 0 (i.e., the array can be cleared) recursively as follows: An array of siz
    8·1 answer
  • What is UTF-8 and why was it created?
    8·1 answer
  • In your own words, describe UML. Identify at least two types of UML diagrams that can be used in software development; describe
    7·1 answer
  • Indicate whether the following statements are true or false:
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!