1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
3 years ago
6

The series of events that make up a story is called

Computers and Technology
2 answers:
salantis [7]3 years ago
5 0

PLOT. the series of related events in a story or play, sometimes called the storyline. EXPOSITION. introduces characters, situation, and setting. RISING ACTION.

CaHeK987 [17]3 years ago
5 0

Plot. the series of related events in a story or play, sometimes called the story-line. Exposition. introduces characters, situation, and setting. Rising  Action.


You might be interested in
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
Universal Containers is designing a new community using the Customer Community license type. They would like to have the users c
motikmotik

Answer:

The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Explanation:

Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?

A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.

B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access

C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.

D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.

The explanation of the answer is now provided as follows:

Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.

The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.

By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

5 0
3 years ago
given an array of integers a, your task is to count the number of pairs i and j (where 0 ≤ i < j < a.length), such that a[
Nimfa-mama [501]

Using the knowledge of computational language in C++ it is possible to write a code that given an array of integers a, your task is to count the number of pairs i and j.

<h3>Writting the code:</h3>

<em>// C++ program for the above approach</em>

<em> </em>

<em>#include <bits/stdc++.h></em>

<em>using namespace std;</em>

<em> </em>

<em>// Function to find the count required pairs</em>

<em>void getPairs(int arr[], int N, int K)</em>

<em>{</em>

<em>    // Stores count of pairs</em>

<em>    int count = 0;</em>

<em> </em>

<em>    // Traverse the array</em>

<em>    for (int i = 0; i < N; i++) {</em>

<em> </em>

<em>        for (int j = i + 1; j < N; j++) {</em>

<em> </em>

<em>            // Check if the condition</em>

<em>            // is satisfied or not</em>

<em>            if (arr[i] > K * arr[j])</em>

<em>                count++;</em>

<em>        }</em>

<em>    }</em>

<em>    cout << count;</em>

<em>}</em>

<em> </em>

<em>// Driver Code</em>

<em>int main()</em>

<em>{</em>

<em>    int arr[] = { 5, 6, 2, 5 };</em>

<em>    int N = sizeof(arr) / sizeof(arr[0]);</em>

<em>    int K = 2;</em>

<em> </em>

<em>    // Function Call</em>

<em>    getPairs(arr, N, K);</em>

<em> </em>

<em>    return 0;</em>

<em>}</em>

See more about C++ code at brainly.com/question/17544466

#SPJ4

4 0
1 year ago
Write a class named Book containing: Two instance variables named title and author of type String. A constructor that accepts tw
andrey2020 [161]

Answer:

The code to this question can be given as:

Code:

public class Book  //define class.  

{

private String title, author;   //define variable.

Book(String a, String b)  //define parameterized constructor.

{

title = a;   //holding value.

author = b;

}

public String toString()  //string function

{

return title + "\n" + author;    //return value.

}

}

Explanation:

In the above java code firstly we declare the class book that name is already given in the question. Then we declare the private variable that datatype is string author and title. Then we declare the parameterized constructor. In the parameterized constructor we use the private variable for hold constructor parameter value. Then we declare the tostring() function in this function we return value of the title and author variable.

3 0
3 years ago
What type of laptop display technology provides fast refresh rates with relatively little power and does not require a backlight
saveliy_v [14]

Answer:

LCD

Explanation:

Liquid Crystal Display

3 0
3 years ago
Other questions:
  • You can use ___________ to add dynamic features to a webpage such as search box that completes your search text automatically.
    12·1 answer
  • What type of organism forms the base of food webs?
    9·1 answer
  • Write a program to calculate how much to tip a waiter person based on the quality of service. The script file should ask for the
    12·1 answer
  • Can anybody come up with a catchy title for this?
    11·1 answer
  • A web application starts when a client sends _______ to a server?
    13·1 answer
  • What does the following loop do?
    5·1 answer
  • For the preceding simple implementation, this execution order would be nonideal for the input matrix; however, applying a loop i
    6·1 answer
  • How to boost audio live ​
    10·1 answer
  • Choose the best type of loop for each situation.
    6·1 answer
  • Im Gonna Give Brainly a Second Chance<br><br> Everybody deserves a second chance
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!