1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
3 years ago
10

if your instructors teaching style is very different from your learning preference your best choice is to one work on your weake

r areas and adjust how you learn this class material two think about your strengths But realize they won't be used this class 3 learn from your mistakes and avoid this type of instructor in the future four avoid contacting the instructor unless he or she requested you do so
Computers and Technology
1 answer:
MrRissso [65]3 years ago
4 0
1. Work on your weaker areas, and adjust how you learn this class material
You might be interested in
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software,
alexira [117]

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

8 0
3 years ago
What two different passwords can be set to lock down a computer from unauthorized access?
Shalnov [3]

The two different passwords you can use to lock down a computer from unauthorized access would be,

1. The Supervisor password

2. The User Password.

- Mabel <3

3 0
3 years ago
Assume that a kernel is launched with 1000 thread blocks each of which has 512 threads. If a variable is declared as a shared me
Alex

Answer:

The answer to this question is the option "B".  

Explanation:

In this question, the answer is option B which is 1,000 because the kernel is a central part of an operating system. kernel manages the computer and the hardware operations. most especially memory and CPU time. It also sheared a memory variable is allocated to thread blocks. That's why the answer to this question is 1,000.

7 0
3 years ago
According to Alisa Miller, why does news focus so heavily on celebrities?
kirill115 [55]

Answer:

one, because the consumers of news are no longer interested in worlwide events, but rather on events that are happening close to them, and in a form affect them directly, and second, because it is cheaper to cover gossip, and it generates more profitability for media broadcasters, than speaking about events that have no impact on people´s interests.

3 0
3 years ago
Susan is working with an IT company. She has been asked to make sure that all of the functions in the company are in place and p
MrMuchimi

According to Henri Fayol, it can be said that there are five functions of management: planning, organizing, staffing, directing, and controlling. From the description in the question, it seems that Susan should employ the controlling management function – which is defined as ensuring that all the ongoing process are proceeding as planned.

It is clear that this definition is precisely what Susan needs to do to fulfill the request that she was given.

7 0
3 years ago
Other questions:
  • All of the following except one are issues that should be covered in an AUP. Which one is the exception?
    5·1 answer
  • You work in the Accounting Department and have been using a network drive to post Excel workbook files to your file server as yo
    9·1 answer
  • What was bill gates first operating system he created?
    7·1 answer
  • Find the range of the function for the domain<br>(-4,-2,0, 1.5,4).<br>f(x) = 5x²+ 4<br>​
    13·1 answer
  • You can count on everything online to be 100% accurate. <br> A. FALSE <br> B. TRUE
    11·2 answers
  • In which client/server relationship can a computer act as both a client AND a server? Select one: a. X-Windows b. SSH c. Classic
    8·1 answer
  • Which programming element is used by a game program to track and display score information
    12·2 answers
  • Complete each sentence
    10·1 answer
  • with the current computer development, explain 5th areas where computer is applied for the social economic dwvelopment in societ
    11·1 answer
  • If you try to add a new item to a full stack the resulting condition is called a(n)?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!