1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aivan3 [116]
3 years ago
8

The strategy in which you periodically look away from the text and ask yourself about the material is called the

Computers and Technology
2 answers:
Monica [59]3 years ago
8 0
<span>The strategy in which you periodically look away from the text and ask yourself about the material is called the look-away method.</span>
Inessa [10]3 years ago
5 0

The strategy in which you periodically look away from the text and ask yourself about the material is called the: b. look away-method. The look-away method is a good way to review your knowledge of a subject after you study it. By reading the text, looking away and then reviewing the information you are able to truly 'test' your knowledge on the subject and summarize what was just read.

You might be interested in
A farmer sells tomatoes. For some reason, the farm obeys mechanical laws of fate.
Mars2501 [29]

Answer:

Here are the if/elif statements:

if tomatoes == 24:  #if farmer sells exactly two dozen tomatoes

   watermelons +=4  #farmer receives 4 watermelons

elif tomatoes >= 12:  #else farmer sells at least a dozen tomatoes

   watermelons +=2  #farmer receives 2 watermelons

else:

   tomatoes<12   #On the days that farmer sells less than a dozen tomatoes

   apples +=1  #farmer will get a single apple

Explanation:

You can test the working of these if elif statements by this program:

tomatoes = int(input("Enter the amount of tomatoes sold: "))  #prompts user to enter number of tomatoes

watermelons = 0  #initialize watermelons value to 1

apples = 0  #initialize apples value to 1

if tomatoes == 24:

   watermelons +=4

elif tomatoes >= 12:

   watermelons +=2

else:  

   tomatoes<12

   apples +=1

   

print("Number of watermelons recieved: ",watermelons)  #displays the received number of watermelons

print("Number of apples recieved: ",apples )  #displays the received number of apples

8 0
3 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
4 years ago
Or operator of boolean algebra is denoted by:<br>*<br>+<br>-<br>.​
OlgaM077 [116]

Answer:

or operator is denoted by + sign

7 0
3 years ago
Fill in the blank.He wrote me a love blank
saul85 [17]
A love poem. He wrote you a love poem.
3 0
3 years ago
Read 2 more answers
A security analyst accesses corporate web pages and inputs random data in the forms. The response received includes the type of
leonid [27]

Answer:

Option c is the correct answer for the above question.

Explanation:

  • The vulnerability is a term that is used to state that any system has some limitation by which the system causes an error while performing the action.
  • The above question states a software and asked the action which is used by the analyst to prevent the limitation. So the system will use the input validation.
  • It is because this prevents the error. it is because this will help to proceed with the wrong or invalid information on the database and the database or system can not hold the wrong data.
  • Hence option c is the correct answer while the other option is not correct because other options can not able to fix the limitation of the above system.
6 0
3 years ago
Other questions:
  • Which address correctly represents one that is composed of two halves, one assigned to a network adapter manufacturer, and the o
    6·1 answer
  • What does a computer user need to know about programming in order to play a video game?
    6·2 answers
  • The procedure call mystery(38) will yield which output? __________ a) 0 12 b) 12 0 c) 1 1 0 2 d) 1 1 1 1 e) 2 0 1 1 public void
    11·1 answer
  • Consider a three sequentially stepped process named as Process A, Process B and Process C. Input comes into Process A. Output fo
    13·1 answer
  • What are examples of macro events related to a form? Check all that apply.
    6·1 answer
  • HELPPP ME PLEASEEE!!
    14·1 answer
  • Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional
    7·1 answer
  • Batter boards (if properly offset) will allow for the end user to continually re-string the layout to double check accuracy with
    11·1 answer
  • Ryan is developing a camera app for iOS with the following objectives: make it easier for users to choose and sort pictures; and
    8·1 answer
  • Select the correct answer.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!