1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
4 years ago
7

O novo funcionário da equipe de desenvolvimento de sistemas está aprendendo os termos mais utilizados no dia a dia da empresa. A

uxilie-o nesta tarefa:
O que são bugs?
Computers and Technology
1 answer:
ratelena [41]4 years ago
3 0

<span>Os insetos são insetos</span>
You might be interested in
The software concept ___________and defines a need for the new system.
lubasha [3.4K]

Answer:

application

hope it helps you

3 0
3 years ago
A barcode is a Select one: a. coded instruction needed to control computer hardware. b. confidential computer code required by H
kolezko [41]

A bar code is a  series of bars and spaces representing numbers or letters.

<h3><u>Explanation:</u></h3>

A method that is used for the purpose of representing a data in the form of a picture or image that can be easily understood by the machine. It consists of many lines that has different widths and spaces. They either represent the letter or a number. These are mainly used for the representation of data in the machine understandable format.

For example an UPC-A bar codes has 12 numbers. The numbering system is represented by the first digit. The manufacturer will be represented by the next five digits in it. The product will be represented by the five digits following it. Check digit is represented in the last digit.

5 0
3 years ago
Jack has a fear of getting up in front of a group of people and giving a presentation. When he gave his last presentation, he ta
dezoksy [38]

Answer:

Jack has to be very calm and try his best to present himself in an outward way and think about the fact that by the end of the night no one will remember that he messed up, I feel like he'll be okay :)

7 0
3 years ago
Read 2 more answers
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
Sami needs to decide how the fonts, colors, and images will look on her new web site. Which will help her pian her design?
shtirl [24]
Maybe a sketchbook:))))
6 0
3 years ago
Other questions:
  • Which files track internet usage and personal information when people visit websites?
    14·2 answers
  • Is bit stuffing necessary in the control or address field in theHDLC protocol? why?
    13·1 answer
  • why do programs include keyboard shortcuts for certain actions? do you prefer the mouse or the keyboard/ why?
    7·1 answer
  • What is the term for the conversion of a bitmap image to a vector image?
    8·1 answer
  • how to make assignment on power point plz cntct me and help me all about power point and my assignment is prime ministers of pak
    13·1 answer
  • HELP QUICKLY!!! IF YOUR RIGHT I'LL MARK YOU BRAINLIEST
    15·2 answers
  • Is there a relationship between cybercrime and traditional crime?
    6·1 answer
  • The 0-1 knapsack problem is the following. A thief robbing a store finds n items. The ith item is worth vi dollars and weighs wi
    14·1 answer
  • How to be gud at Friday night funk
    11·1 answer
  • A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!