1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
15

What are the three fundamental principals of mnemonics? HELP FASTTT!

Computers and Technology
1 answer:
muminat3 years ago
8 0

Answer:

The three fundamental principles underlying the use of mnemonics are imagination, association, and location.

Explanation:

You might be interested in
Survey data can be collected with questionnaires. Which type of question has a limited number of preselected responses?
nadya68 [22]
The answer to your problem is B
8 0
3 years ago
Which installation changes from the old information system to the new one incrementally, starting with one or a few functional c
Wewaii [24]

Answer:

Phased installation

Explanation:

The name of this strategy is phased installation. Phased installation (or phased implementation) occurs when an existing system is replaced by a new one. However, unlike most implementations, this takes place in stages. This has several advantages. First, it allows you to test the system. If there is a problem with it, it is easier to revert back to the old strategy. Moreover, if employees need to adopt this new system, it allows them to get used to it slowly while still being able to access the previous one.

5 0
3 years ago
Develop a C program that calculates the final score and the average score for a student from his/her (1)class participation, (2)
White raven [17]

Answer:

Following are the code to the given question:

#include<iostream>//defining header file

using namespace std;

int main()//defining main method

{

float clspat,test,asst,exam,practice,total,average;//defining floating variable

char name[100];//defining char variable to input value

cout<<"Enter Name of Student: ";//print message

cin>>name; //input value

cout<<"Enter scores in following scoring items between 0 and 100:"<<"\n";//print message

cout<<"Enter class participation score: ";//print message

cin>>clspat;//input value

cout<<"Enter test score: ";//print message

cin>>test;//input value

cout<<"Enter assignment score: ";//print message

cin>>asst;//input value

cout<<"Enter exam score: ";//print message

cin>>exam;//input value

cout<<"Enter practice score: ";//print message

cin>>practice;//input value

total=clspat+test+asst+exam+practice;//calculating total value

average=total/5;//calculating average value

cout<<endl<<"SCORE CARD OF "<<name<<"\n"<<"-----------------------"<<"\n";//print value with message

cout<<"Total score: "<<total<<"\n";//print message with value

cout<<"Average score: "<<average; //print message with value

}

Output:

please find the attached file.

Explanation:

In this code, the floating-point variable is declared, which is used for input value from the user-end and after input the floating-point value it uses the "total, average" variable to calculate its respective values and store its value with init, after storing the value into the variable it uses the print method to print its values.

5 0
3 years ago
Helpppppppppp plssss
DENIUS [597]

Answer:

Hey! So i was just in computer science! so i think the answer is B!

Explanation:

3 0
3 years ago
A​ ________ is a person or organization that seeks to obtain or alter data or other IS assets​ illegally, without the​ owners' p
Mamont248 [21]

Answer: Threat

Explanation:

 Threat is one of the type of possible danger occur in the computer system security and also also exploit the security system that cause various types of possible harms.

Threat is alter any type of data in an organization without the permission of the owner.  

The threat can be classified into the different types are as follows:

  • Computer worm
  • DOS attack
  • Rootkit
  • Computer viruses

3 0
3 years ago
Other questions:
  • The trademarked name of the accepted standard for configuring wireless networks is _______________
    12·1 answer
  • To use the program service routines, the user's program makes requests to the operating system through the
    10·1 answer
  • What is the full word of"VPN"?​
    15·2 answers
  • A user complains that his computer automatically reboots after a short period of time. Which of the following computer component
    13·1 answer
  • Write a C program that includes a function of type double called divemaster accepts two double arguments (you must write the div
    15·1 answer
  • Which careers have the highest minimum experience requirement?
    14·1 answer
  • Why are new versions of applications packages released often ​
    9·1 answer
  • Create a PHP page that contains an array of at least 20 movie titles or book titles (your choice). The HTML page should have an
    7·1 answer
  • What mistake might you make related to changing the data in a cell that's used in a formula?
    14·1 answer
  • What statement best describes entrepreneurship?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!