1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
3 years ago
7

Which of the following is something you need to keep an eye out for

Computers and Technology
2 answers:
cricket20 [7]3 years ago
7 0

Answer:

D. Pedestrians ignoring DON'T WALK signs

Explanation: Near packed intersections pedestrians commonly ignore "don't walk" signs.

Brilliant_brown [7]3 years ago
4 0

Answer:

D. Pedestrians ignoring DON'T WALK signs

Explanation:

Pedestrians ignoring DON'T WALK signs is something you need to keep an eye out for  near packed intersections.

You might be interested in
Successful Web sites such as StumbleUpon ( www.stumbleupon) and Digg ( www.digg) use ____ by inviting their visitors to vote on
aliina [53]

Answer:

"Crowdsourcing" is the correct answer for the above question.

Explanation:

  • Crowdsourcing is a term from which any organization advertises the thinks or can get the ideas or solutions for any particular problem.
  • It is a term that refers to the problem to the number of solvers to achieve the result correct and frequent.
  • For example, If anyone wants to prepare the two websites. Then he assigns the works to the number of people and the works done faster with the help of this.
  • The above question states that some websites can be successful with the help of the type of work. They are successful with the help of crowdsourced work. Because it saves time. So the answer is Crowdsourcing.
3 0
3 years ago
When writing test methods, what functionality is verified by the system method "runAs()"?
olchik [2.2K]

Answer:

The main functionality verified by this test method command is user sharing record.

Explanation:

Generally, every apex code runs in system mode.

Apex is strong object-oriented programming language that allows the developers to execute flow and transaction control.

Using syntax which look like java and acts as databases, Apex allows the developer to add any type of business logics to an event which can include button, clicks records or visual pages.

Apex code can be initiated by web service request.  

The permissions and record sharing of current user are not consider by apex codes.

Now the system method runAs() will allow you to take or write a test method which will basically change the user context to an existing or an new user, so that the record sharing will take place.

runAs() command will not change or anything done with user permissions or permission levels, it will only record sharing of the user.  

When you use runAs() command the original and true context will run after the test method is once completed under the command of runAs().

The runAs() has no concern with the user license.  

If there is no or expired your personal or organization license you can just make a new user with this runAS() command.

In using this command we have to make a private class by the name of this test and then our further code to make a user , afterwards  which we will the true and original code of ours which we want to run.

There are many other uses of runAs() like  

 Mixed DML operations in test by opening the DML operations.

 We can also use it as a version which will take a package as a version argument. This will cause the code a specific version.

runAs(System.Version) is the command used for this.

4 0
2 years ago
How could TWC continue to leverage mobile apps to further monetize its significant investment in its weather data? What addition
Ann [662]

<u>Explanation</u>:

To effectively Monetise mobile apps the latest trend usually involves focusing on user downloads and active user subscriptions.

Since TWC is a weather data analyst company, providing premium services via it's app not available on TV can increase user signups.

Their app could offer this use cases;

  • A platform were users share live weather data of their location that are factual.
  • Provide paid weather educational courses
8 0
2 years ago
write a c++ program that reads from the user a positive integer (in a decimal representation), and prints its binary (base 2) re
Vesna [10]

Answer:

The program to this question can be described as follows:

Program:

#include <iostream> //defining header file

using namespace std;

int main() //defining main method

{

int x1,rem,i=1; //defining integer variable

long Num=0;// defining long variable

cout << "Input a decimal number: "; // print message

cin >> x1; //input value by user

while (x1!=0) //loop for calculate binary number

{

//calculating binary value    

rem= x1%2;

x1=x1/2;

Num =Num +rem*i;//holding calculate value

i=i*10;

}

cout <<Num;//print value

return 0;

}

Output:

Input a decimal number: 76

1001100

Explanation:

In the above code, four variable "x1, rem, i, and Num" is declared, in which three "x1, rem, and i" is an integer variable, and one "Num" is a long variable.

  • In the x1 variable, we take input by the user and use the while loop to calculate its binary number.
  • In the loop, first, we check x1 variable value is not equal to 0, inside we calculate it binary number that store in long "Num" variable, after calculating its binary number the print method "cout" is used to prints its value.  
5 0
3 years ago
A desperate employee calls because she has accidentally deleted crucial files from her hard drive and can’t retrieve them from t
konstantin123 [22]

Answer: The file may have been lost due to incompatibility with the operating system, inadequate space on the hard disk drive, or through corruption of the recycle bin.

However, I will have to ask her the following questions:

- name of operating system she is utilizing,

- the time of deletion of files,

- the kind or extension of the deleted file,

- the model number of the computer,

- the size of files created after the deletion of files.

Also, sometimes, deleted files could be irretrievable due to security breeches. The employee may not have the required access to the crucial file but accidentally stumble upon it.

After all of these have been determined, then the error is fixed, and the document/file is restored, and becomes accessible to the employee.

6 0
2 years ago
Other questions:
  • What are the 5 general terms of the fair use rule
    9·1 answer
  • what has become an established maritime commerce Center and one of the largest cities in the United states ​
    11·1 answer
  • Write a program which simulate rolling dice. When the program runs, it will prompt the user to choose a number ranging from 1 to
    15·1 answer
  • Which of the following are not parts of a message? Select all that apply.
    12·1 answer
  • Why is it a best practice of a remote access policy definition to require employees and users to fill in a separate VPN remote a
    14·1 answer
  • Systems Software, Inc., is introducing a new piece of sophisticated graphics software. A recently hired writer has been assigned
    8·1 answer
  • (I WILL GIVE BRAINLIEST) Which steps will delete an appointment?
    8·1 answer
  • What is also known as computer Network?
    6·2 answers
  • 3) The director tells you to truck left, you must:
    10·1 answer
  • b. Write a complete program for the following situation related to setting the speed of a car to preset values before starting a
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!