1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scrat [10]
3 years ago
14

1) List at least five smaller behaviors you could break the complex behavior "brushing my teeth" into.

Computers and Technology
2 answers:
sergiy2304 [10]3 years ago
7 0

Answer:

go to bathroom

add toothpaste

place toothbruhs in mouth

brush teeth

rinse out with water

zhuklara [117]3 years ago
5 0
Q1:
1. Go into the bathroom
2. Put toothpaste on the toothbrush
3. Place head of toothbrush on your teeth
4. Revolve in small circles
5. Repeat 4 for all of your teeth
6. Use water to wash away the toothpaste in you mouth
You might be interested in
The _____ command defines a default value for a column when no value is given
sashaice [31]

The DEFAULT command defines a default value for a column when no value is given

<h3>How to determine the command?</h3>

In SQL and other related query languages, a column can be set to have a default value.

This is done using the constraint:

default("some text here")

Hence, the DEFAULT command defines a default value for a column when no value is given

Read more about sql at:

brainly.com/question/25694408

#SPJ12

7 0
2 years ago
A content-managed site can be customized _____.
natita [175]

Good question. The best answer is that it all depends on your project's specifications. Here are a few scenarios where a custom CMS would make sense:

You have security concerns or corporate security requirements that would make off-the-shelf platforms unacceptable. An example of this could be stringent security requirements that limit the amount of software licenses allowed, or that require tightening so severe that it would inhibit the ability of the platform to operate correctly. Also, remember that off-the-shelf platforms are more susceptible to random attacks by bots and other automated attackers.

You require advanced features. If you plan on having a website requiring advanced customization, evaluate if you are pushing the limits of off-the-shelf CMS platforms. An example would be software that is core to your business that must be custom built on top of the CMS platform. Future risks could be the inability to run a proper software update, or even worse, a software update breaking your custom code. It happens all the time!

3 0
3 years ago
Your computer system is a participant in an asymmetric cryptography system. You've created a message to send to another user. Be
hjlf

Answer: Integrity

Explanation:

Based on the information given, it should be noted that the protection that the hashing activity provides is integrity. In cryptography, hashing is used in the verification of integrity.

To determine integrity, comparison can be made between data and a hash value. When data is hashed at a particular time, the hash value is protected. Then, to ensure integrity, the data can then be hashed again after which it'll be compared to the protected value.

6 0
3 years ago
Use the drop-down menus to complete the steps for inserting a range of cells in a worksheet.
vlabodo [156]

Answer: click the home tab

In the cells group, click insert

Explanation:

Just did it on edge 2020

3 0
3 years ago
Read 2 more answers
Which of these options is an example of a nested structure?A.
Georgia [21]

Answer:

D. if else inside a for loop

Explanation:

5 0
4 years ago
Other questions:
  • What does the dashed line in the beaker separating the two sides represent?______________________?
    13·2 answers
  • How can you encrypt and decrypt a message in cryptography
    9·1 answer
  • Which of these can be considered data?<br> A:facts<br> B:information<br> C:belief<br> D:all of these
    9·1 answer
  • Explain how you give users keyboard access to a text box
    6·1 answer
  • The design of computers, devices, and media in a network is categorized as either client/server or peer-to-peer. what is the ter
    8·1 answer
  • You create a formula in A8 that adds up the numbers listed in A1 through A7. You copy the formula and paste it into C8. What hap
    9·1 answer
  • Given that note, write a program which tells us the major scale starting at that note, using the pattern above. In the main bloc
    6·1 answer
  • Which is the short structure that Redis provides for the compact representation of Sets?
    10·1 answer
  • Different he launc.<br>in function are available with MS-Excel<br>Many​
    14·1 answer
  • If a flagged word is spelled correctly, such as many of our names, right-click it and then click ____ on the shortcut menu to in
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!