1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katen [24]
4 years ago
6

What are three things to consider in programming design?

Computers and Technology
1 answer:
balu736 [363]4 years ago
6 0

Answer:

Data Structures and Algorithms, Source Control & Database and SQL

Explanation:

The above are the three things a starter should prepare his or her mind for.

You might be interested in
Do you think the current system of punishment in the United States works? Why? What would you change?
Simora [160]

Well the fact that jails are overcrowded is one factor that shows it's not working. Some people need help from past traumas, abuse, etc. Not everyone that acts out needs to be incarcerated, they need rehabilitation or counseling. Definitely depends on the crime committed. Therefore substance abuse users would be in rehabilitation. Even Juveniles in detention centers don't benefit from incarceration for certain offenses. There is no rehabilitation in incarceration. There are more criminals in jail and incarceration in my opinion, only for some offenders, is the last option. Now for Sex Offenders, Murderers and Criminals with violent crimes my opinion is completely opposite. Some of those offenders should be dealt with according to their crime. Also, all of the people that have been pardoned and them lessening time for drug traffickers and actual drug dealers (not necessarily users) is just a bad thing to pardon them or let them out because they don't have any violent crimes. Isn't dealing drugs, that are killing people every single day just as bad as a violent crime. In my opinion they can sit and rot for the longevity of their sentence. Some need help and I would fully support that only under some circumstances. Others I would rather not have to live amongst them.

8 0
3 years ago
When installing wire into a terminal it is important the stripped part of the wire
lianna [129]
D is the answer.......
5 0
3 years ago
Lael Masterson works in the Student Activities Office at Valerian State College in Illinois. Lael has started compiling informat
Nina [5.8K]

Answer:

Use the HLOOKUP function in the cell E2 by specifying the student's hourly rate value, the range of cells of the table holding the information, the row from which to return the value, and a value of true or false for approximate or exact match respectively.

Explanation:

Microsoft Excel is a statistics tool used for data analysis. It has several functions and graphical properties for cleaning and representing data.

The HLOOKUP function is an example of a search function in excel, it returns a value based on another value from a range of cells. The function accepts four arguments, they are, the value to be searched, the range table or cell range to search, the row to get the search value, and a mode of return value to return, could be either true for an approximate match or false for an exact match.

6 0
3 years ago
P16 Consider the following network. ISP B provides national backbone service to regional ISP A. ISP C provides national backbone
Art [367]

Solution :

Considering the following data :

$\text{ISP B}$ provides the national backbone to the regional $\text{ISP A}$.

$\text{ISP C}$ provides the national backbone to the regional $\text{ISP D}$.

Each of the ISP consists of one autonomous systems (AS).

$\text{ISP B}$ would like to hand over the traffic of C through the $\text{West}$ Coast.

The $\text{ISP C}$ would like to receive traffic from B's peering point via East Coast.

One way for $C$ to force $B$ to hand over all of $B$’s traffic to $D$ on the east coast is for $C$ to  only advertise its route to $D$ via its east coast peering point with $C$.

7 0
3 years ago
You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicle
kati45 [8]

There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.

  • The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.

With this, your computer becomes theft-proof.

Thia will give you piece of mind as you will not be restless anymore.

Learn more about Laptop security from

brainly.com/question/24956493

3 0
3 years ago
Other questions:
  • What does the "configure dhcp options for proxy dhcp" option do?
    13·1 answer
  • why is it important to use a general search engine, like GOOGLE, to look up the name of the organization, institution, agency or
    7·1 answer
  • You can access various sites on the WWW by using hyperlinks or by
    14·1 answer
  • The following algorithm computes the average height for a list of basketball player heights. Initialize a variable sum to 0. For
    11·2 answers
  • Siva added a "Contact Form" to her website.
    10·1 answer
  • Write a program that uses for loops to perform the following steps: Prompt the user to input two integers: firstNum and secondNu
    15·1 answer
  • DRAG DROP -A manager calls upon a tester to assist with diagnosing an issue within the following Python script:#!/usr/bin/python
    11·1 answer
  • What is a phone made out of dna
    15·1 answer
  • Answer the following 8-mark question in your book.
    15·1 answer
  • A. Mohit has bought a new laptop. The laptop is not working as no software is installed in
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!