Answer:
Small sections of code are known as modules.
Explanation:
- In computer programming, a module is defined as a collection of one or more routines. Then the modules combine to make a program.
- Modules make it easier for a programmer to concentrate on a specific part of a program as these modules can further be reused for enhancement of a project or say updating process.
- Modules have evolved the problem of reusing already written code as in previous times, when the software of applications needed to update they were taken from a very basic level but now modules make it possible to reuse the already written code as many times as needed.
Answer:
A. Populate an info-graphic with her poverty rate statistics in a slide presentation
Explanation:
You certainly require making a detailed report and then print out the findings. But that should be in slides and you need to make the best use of the statistics.
And you certainly need to populate an info-graphic with her poverty rate statistics in a slide. Info-graphic is the best way to represent research findings. And hence, this is the correct answer.
Also, the detailed report and to print out her findings will be useless, as It will be hard to analyze from such raw data. We need to clean the data first. And that we do through preparation of the info-graphics.
The answer is (D) hope this helps !
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.