1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
3 years ago
13

You learned that properly edited resumes are necessary for making a good impression on a university or a potential employer. Dis

cuss the consequences of submitting a poorly edited and formatted resume while looking for a job or pursuing higher studies.​
Computers and Technology
1 answer:
Daniel [21]3 years ago
3 0

Answer:

it will not be a good impression and it will be hard to look for a job

Explanation:

You might be interested in
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
which of these is another name for a pre- written formula a.reference b. function c. value d. selection​
sineoko [7]

Answer:

the answer is b. function

6 0
3 years ago
Are principles which allow designers to create blank designs
Lady_Fox [76]

Answer:

Seven principles guiding blank design

see below

Explanation:

The correct question should be What Are principles which allow designers to create blank designs

"Are principles which allow designers to create blank designs"

Blank design first screen user is presented with when about to start something new.

The seven principles are

  • Balance
  • Rhythm
  • Pattern
  • Emphasis
  • Contrast
  • Unity
  • Movement
7 0
3 years ago
Tom and jerry opened a new lawn service
DedPeter [7]
That’s cool sirrrrrrrr
6 0
3 years ago
Read 2 more answers
In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
choli [55]

Answer: C. Prototyping

Explanation:

The Prototyping phase of App development involves making a prototype of the app in question and then releasing it to a few potential users so that they can experience the concept of the app and its workability.

The potential user is then interviewed to find out their thoughts on the direction that the app is taking to find out if it is the right one. The prototype will obviously be rudimentary but it is a great opportunity to find out how potential users view the app's concept.

4 0
3 years ago
Other questions:
  • Steps needed to deposit cash on cash deposit machine
    6·1 answer
  • ShellShock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, whi
    11·1 answer
  • What is the typical educational requirement for a non-entry level software programmer?
    8·2 answers
  • fill in the balenkes ) 1)there are ................................... function keys on the keybord 2)pressing the end key moves
    6·1 answer
  • Intel Centrino Technology is the combinatin of wirelesstechnology with the previous HT technology.
    14·1 answer
  • Which command would you use to swap the words hither and yon on any line with any number of words between them? (You need not wo
    5·1 answer
  • While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
    15·1 answer
  • RAM IS often referred
    9·1 answer
  • Clara works behind a computer all day. She gets a lot of headaches, and her eyes have been hurting her lately. Her doctor diagno
    15·1 answer
  • The designers of a database typically begin by developing a​ __________ to construct a logical representation of the database be
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!