1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yanka [14]
4 years ago
10

Which text feature is NOT a graphic aid? map chart picture text

Computers and Technology
1 answer:
aleksklad [387]4 years ago
6 0
I would go with text. but I'm not 100% certain
You might be interested in
In this era of technology, everyone uses emails for mail and messages. Assume you have also used the
ipn [44]

Answer:

A class may be a structured diagram that describes the structure of the system.  

It consists of sophistication name, attributes, methods, and responsibilities.  

A mailbox and an email message have certain attributes like, compose, reply, draft, inbox, etc.

Software architecture affects:

Performance, Robustness, Distributability, Maintainability.  

Explanation:

See attachment for the Model object classes which may be utilized in the system implementation to represent a mailbox and an email message.

Advantages:

Large-scale reuse Software architecture is vital because it affects the performance, robustness, distributability, and maintainability of a system.

Individual components implement the functional system requirements, but the dominant influence on the non-functional system characteristics is that the system's architecture.

Three advantages of System architecture:

• Stakeholder communication: The architecture may be a high-level presentation of the system which will be used as attention for discussion by a variety of various stakeholders.

• System analysis: making the system architecture explicit at an early stage within the system development requires some analysis.

• Large-scale reuse:

An architectural model may be a compact, manageable description of how a system is organized and the way the components interoperate.

The system architecture is usually an equivalent for systems with similar requirements then can support large-scale software reuse..

7 0
3 years ago
When installing a network cable with multiple strands, a network technician pulled the cable past a sharp edge and exposes the c
MariettaO [177]

Answer:

A short

Explanation:

A short in electrical terms is an abbreviation for a short circuit. This generally means that there is an unintended connection between two points allowing current to flow where it should not. In your particular case, it means that a cable is damaged and that two or more of the conductors are connected together causing the cable to fail.

8 0
4 years ago
A design tool helps you plan, evaluate, and explain your ideas to create a product. Some examples of design tools are outlines,
Leni [432]
I might be true and might not which chances are 50%
8 0
3 years ago
To be eligible for the leadership training program offered by the office, a student must have at least 2 years of post-secondary
erica [24]

Answer:

The formula for the given problem is:

=IF(OR(D2>=2,G2>"Yes"), "Yes", "No")

Explanation:

Please see attachment for step by step guide

7 0
4 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
Other questions:
  • When an IPv6 device with no pre-configured IPv6 address powers up, it can calculate a global 128-bit IPv6 address for itself usi
    12·1 answer
  • The graphical user interface (GUI) was pioneered in the mid-1970s by researchers at:
    10·2 answers
  • Which one of the following terms is defined as the material and surfaces upon which an artist works?
    9·1 answer
  • Why are rules required for a number system to be useful?
    10·2 answers
  • If you want to insert a table which ribbon should you select
    13·2 answers
  • How do I change my PATH?
    7·2 answers
  • Using this statement to answer the following question “FIFA World Cup 2010: (1+9) From Today!” (Ignore Quotation)
    9·1 answer
  • Which of the following statements is true when it comes to developing a web presence for a business?
    6·1 answer
  • How to delete account
    12·1 answer
  • A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!