1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adelina 88 [10]
3 years ago
8

PLEASE HELP ASAP!!!

Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
7 0

Answer:

Explanation:

Attribution (CC BY)

Attribution ShareAlike (CC BY-SA)

Attribution-NoDerivs (CC BY-ND)

Attribution-NonCommercial (CC BY-NC)

Attribution-NonCommercial-ShareAlike (CC BY-NC-SA)

Attribution-NonCommercial-NoDerivs (CC BY-NC-ND)

You might be interested in
2. 2 extension A file saved in LOGO will have parts 3. Aprocedure consists ofthe file saved if I saved in logo will have instruc
JulijaS [17]

Answer:

The procedure or subprogram must start with the word ‘to’, followed by a name we think of. The next step is to key-in all the same steps we would write on the command line. The procedure must end with the word ‘end’. All comment or remark lines should be preceded by semi-colon (;).

Explanation:

to procedurename steps of your procedure here end

8 0
2 years ago
You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report need
Rasek [7]

The email specifying who in your company you need to talk to first and what evidence must be turned over to the police is written below.

The manager,

Robotics Plc.

Dear sir,

<h3>Issue of  internal policy violation</h3>

I wish to bring to your notice an issue of concern that has occurred in the company. All employees are mandated to work for the growth of the company and when things or due protocol are not being followed, it can bring an organization down.

I wish to bring to your notice an issue of  internal policy violation  that was done by Mr. Yusuf Thomas on December 2021 that has cost the company to loss about 2million dollars. He used the companies money and also took some of the companies client for himself.

He is still working and no sanction or steps have been taken to reprimand him. I wish that the issue be solved so that others will not follow the same steps.

Thanks and waiting for quick response.

Mary Gina.

Learn more about policy violation from

brainly.com/question/13198827

#SPJ1

6 0
2 years ago
When you are buying a computer, you must be careful to choose one with a pleasing desktop appearance because the way it looks is
fenix001 [56]

Answer:

False

Explanation:

You can always change the default look and feel of your Desktop appearance. To begin, right-click anywhere on the desktop and select personalize. A window will appear that will give you options to change your settings. You can choose various options like change the background, choose your own photos, and change colors.

8 0
3 years ago
You wouldn't think a simple shop like Dippy Donuts would be an interesting target for hackers. But look beyond the donuts and yo
Veronika [31]

Answer:

Yes, the site can be attacked for data theft. This is done mainly through malware, which is a piece of code, and if the site is small then you can find that piece of code on your own by having a look manually through the complete code, as it can be few hundred lines of code. However, if the code length is more then you can make use of the software like the Codeguard. And that can certainly help you out considerably. Or you can buy the services of top security service providers like Sucuri.

Explanation:

Please check the answer section.

5 0
4 years ago
Object Oriented Programming (OOP) allows us to handle complex code in an organized structure and break down the problem by model
Natasha2012 [34]
Yes I believe that Oop should be phased out
3 0
3 years ago
Other questions:
  • ASCII can be translated into over a million characters, making it a global code. True or false?
    7·2 answers
  • 1. Why isn't solar energy usually the only power source for a region?
    10·2 answers
  • Which command should you enter to configure a single port to discard inferior bpdus 200-125?
    5·1 answer
  • Here it is crews my profile pic
    5·2 answers
  • List the six external peripheral parts of a computer system
    8·1 answer
  • Assume that name has been declared suitably for storing names (like "Misha", "Emily" and "Sofia"). Assume also that stdin is a v
    9·1 answer
  • BlockPy: #38.2) While Input Use a while loop to repeatedly take input from the user and print whatever they type in. When the us
    10·1 answer
  • What can Marla enter into cell A11 to find out how much money is left in her budget and to make sure the cell is updated wheneve
    9·1 answer
  • A technician has been asked to upgrade a processor and needs to do some research. The computer is just a couple of years old. Wh
    13·1 answer
  • Sumit has created a procedure to draw a boat in Logo and saved it by the name, 'Boat'. Next day, when he tried to type the name
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!