1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serjik [45]
3 years ago
14

Nancy is studying web design. She has to assist her boss in creating a webpage on the different models of communication. How can

she explain the theories visually to make them easier to understand?
A. add diagrams relevant to the content
B. add animation relevant to the content
C. add audio relevant to the content
D. add video relevant to the content

I want to say D but i'm not sure.
Computers and Technology
2 answers:
GuDViN [60]3 years ago
4 0
Id say D. But I don't know either, lol.
USPshnik [31]3 years ago
3 0

Answer: if you are on playto then the answer is A

Explanation: i just took the quiz and the answer was A

You might be interested in
Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
77julia77 [94]

Answer:

<u>Property</u>

Explanation:

Intellectual Property (IP) is the lawful protection of human idea/intellect by unauthorised users. These human intellects are intangible assets that have both moral and commercial value. They include ideas, art, music, movies, software e.t.c.

Common types of Intellectual property include

  • Copyrights
  • patents
  • Trade Marks
  • Trade Secrets
6 0
3 years ago
Read 2 more answers
In a brief essay explain the security vulnerabilities of transition methods (6to4, etc.)
vlabodo [156]

Answer:

While transiting from IPv4  to IPv6, many offices and companies use both the protocols (Ipv4 and IPv6) at the same time. This scenario can increase the risk  rate of attack twice. All the flaws and vulnerabilities could be overlooked easily when transition is done.

On the other hand, while transiting Ipv6 to IPv4, the router does not tells or depicts that the communication is appropriate or if it could be used as a part of DoS attack that make it so much harder to trace the origin back.

The reason for the vulnerability of Transport Relay Translators (TRT) is that they do not apply Internet Protocol Security (IPSec) and thats why they are not secure.

i hope it will help you!

7 0
4 years ago
What does the R in the acronym SMART stand for??
jeyben [28]
Depending on who you ask, it is either Realistic or Relevant. Organizations that can't choose sometimes use the acronym SMARRT.
7 0
4 years ago
In this assessment, you will design and code a Java console application that validates the data entry of a course code (like IT4
ivolga24 [154]

Answer:

The program is written using jCreator IDE

Comments are used for explanatory purpose

Program starts here

import java.util.*;

public class courecode

{

public static void main(String [] args)

{

 String ccode; // Declare course code as string

 Scanner input = new Scanner(System.in);

 System.out.print("Course code: "); // Prompt user for input

 ccode = input.nextLine();

 boolean flag = true; // Initialize a boolean variable to true

 if(ccode.length() != 6) // Check if length of course code is 6

 {

  System.out.print("Input length must be 6"); //Display message if length of input string is not 6

 }

 else // If length is 6

 {

  for(int i = 0; i<6;i++) //check validity if input string using for loop

  {

   if(i == 0) //Test for first character

   {

    //The following if statement will be executed if the first character is not i or I

    if(ccode.charAt(i) != 'i' && ccode.charAt(i) != 'I')

    {

     System.out.println("Invalid Course Code");

     System.out.println("The course code must start with an i or I");

     flag = false; //Set boolean variable to false

     break;

    }

   }

   else if(i == 1)

   {

    //The following if statement will be executed if the second character is not t or T

    if(ccode.charAt(i) != 't' && ccode.charAt(i) != 'T')

    {

     System.out.println("Invalid Course Code");

     System.out.print("The second letter of the course code must be t or T");

     flag = false; //Set boolean variable to false

     break;

    }

   }

   else

   {

    //The following if statement will be executed if any of the last 4 characters is not an integer

    if(!Character.isDigit(ccode.charAt(i)))

    {

     System.out.println("Invalid Course Code");

     System.out.print("The last 4 characters of the course code must be an integer");

     flag = false; //Set boolean variable to false

     break;

    }

   }

  }  

 }

 //The following statment checks if boolean variable flag is still true

 // If true, then the input course code is valid and the accompanying print statement will be executed

 if(flag)

 {

  System.out.print("The input course code is valid");

 }  

}  

}

Explanation:

Lines marked with // are comments

Check comments (//) for explanation

4 0
3 years ago
If your program throws an IndexOutOfRangeException, and the only available catch block catches an Exception, ___________________
GuDViN [60]

Answer:

Option A is the correct answer for the above question.

Explanation:

The Index Out Of Range exception is a type of Run exception which is generated on run time. It means when any user executes the software or program, then that program gives some error on the execution time by some coding problem or some value problem.

So this type of exception can be handle by the Catch block which is also stated by the option A. Hence A is the correct answer but the other is not because:-

  • Option B states that this exception is generated by the catch block which is not correct.
  • Option C states that the catch block passes the exception which is also not the correct.
  • Option D states that the exception is passed for the operating system, but it is passed to the catch block only.
3 0
3 years ago
Other questions:
  • HELPPP ASAPP
    8·2 answers
  • If the processor has 32 address lines in its address bus; i.e. 32-bit address range, what is its address space or range; i.e. wh
    10·1 answer
  • 30 POINTS!!!
    9·2 answers
  • What type of file is MyFile.dll?
    14·2 answers
  • Given the following code: PreparedStatement ps = connection.prepareStatement("select firstName, mi, lastName from Student where
    13·1 answer
  • Plez answer this
    10·1 answer
  • What is function of java​
    9·1 answer
  • Suppose the size of process is 10000 bytes and the relocation register is loaded with value 5000 which of the following memory a
    15·1 answer
  • What type of html list will automatically place a list marker, or bullet point, indicator in front of each item? group of answer
    8·1 answer
  • Tools such as microsoft's word, excel, and powerpoint are examples of ________ software. question content area bottom part 1 a.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!