1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
3 years ago
10

An individual who understands and uses a variety of symbols yet uses one symbol at a time to share a message needs more developm

ent of _______ to make requests/comments more precise by using expanded sequences of information.
Computers and Technology
1 answer:
Naily [24]3 years ago
3 0

Answer::

An individual who understands and uses a variety of symbols yet uses one symbol at a time to share a message needs more development of programming (learn as many programming languages as possible) to make requests/comments more precise by using expanded sequences of information.

I hope these helps, kindly give brainliest if it does

You might be interested in
What is the full form of flops​
kobusy [5.1K]

Answer:

<em>Floating Point Operations Per Second</em> (FLOPS)

Explanation:

<em>Floating Point Operations Per Second</em> (FLOPS) is a measure of a computer’s performance, especially in fields of scientific calculations that make heavy use of floating-point calculations. Floating-point operations include any operations that involve fractional numbers.

8 0
3 years ago
Read 2 more answers
What is the bleed space in a design?
pav-90 [236]

Answer:

The bleed is the part on the side of a document that gives the printer a small amount of space to account for movement of the paper, and design inconsistencies. Artwork and background colors often extend into the bleed area. After trimming, the bleed ensures that no unprinted edges occur in the final trimmed document.

Explanation:

8 0
3 years ago
When searching for specific record information, sometimes you see duplicate files with the same name that have different data ru
mel-nik [20]

Answer:

True is the right answer for the above question.

Explanation:

When a user created a new file with the same name which is already on the disk, then a pop-up window will alert the message to change the name of the file or a computer system replace the old files with a new one. It means that no files exist on the system with the duplicate name.

If it happens in some case then there must be possible that there is one file written in a disk one two places with the different data at the same time. It is because of system error.

The question concept also means the same which is described above. Hence the question is a true statement.

4 0
3 years ago
What does a black box represent in the system input/output model?.
natali 33 [55]

Answer:

es un elemento que se estudia desde el punto de vista de las entradas que recibe y las salidas o respuestas que produce, sin tener en cuenta su funcionamiento interno.

Explanation:

5 0
3 years ago
Write a program to enter a number and test if it is greater than 45.6. If the number entered is greater than 45.6, the program n
soldi70 [24.7K]

Answer:

float inp =0;

cin>>inp;

if(inp > 45.6)

    cout<<"Greater than 45.6";

Explanation:

the first line will initialize an float for the input you gonna give the program.

second line will get the input from the user.

third line checks if the given input is greater than 45.6 .if so , it will print "greater than 45.6"

also for your future questions , please note which language your program should be in.

8 0
3 years ago
Other questions:
  • Why is audio greyed out on powerpoint ms office 2011?
    10·1 answer
  • How can solve a Boolean algebra problem?<br><br> Ex: JK+(~J+~K)L+JK
    6·1 answer
  • When evaluating portable CD players, you consider price, the sound quality, and ease of using the controls. These are your _____
    8·2 answers
  • Help!!!! ASAP TIMED TEST 50 points!!!!
    7·1 answer
  • QUESTION
    10·1 answer
  • Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____. a) legac
    15·1 answer
  • Define additional characteristics such as font weight or style for an html tag
    5·1 answer
  • س2) اکتب خوارزميه لحل المعادلة الرياضيه الاتيه
    9·1 answer
  • The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
    11·1 answer
  • What is contained in the Open Files section of Shared Folders? ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!