1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Irina18 [472]
3 years ago
15

The __________ is the system of official channels that carry organizationally approved messages and information.

Computers and Technology
1 answer:
Simora [160]3 years ago
4 0
Formal Communication Channels
You might be interested in
How would you link to the named fragment #school on the page resume.html from the home page of the site?
tigry1 [53]
Assuming you want this strictly in html. I would use. 
' <a href="#school"></a> ' (Without the outer quotes)
This should link to the container/ page selection. If you have any other questions feel free to ask. 
8 0
3 years ago
Write an if/else statement that adds 1 to the variable minors if the variable age is less than 18, adds 1 to the variable adults
Mama L [17]

Answer:

Explanation:

data is a statement like

data 10,20, 30 , 40 , 50, 60 , 70, 80

\\the numbers represent ages.

For x := 1 to end of data do a[x]:=read(data)

\\ This is a comment. You could do this much easier if you just use three if statements rather than the if then else.

minor:=0;adult:=0;senior:=0;

while a[x] <> 0 do begin

age:= a[x]

if age < 19 then minor:=minor + 1;

If age > 18 then if age < 65 the adult:=adult + 1;

if age > 64 then senior := senior + 1;

end;

I have not declared the variables anywhere. That depends on what language you are using. The key step you  want are the three if statements. How you find out what's in them is another matter.

6 0
3 years ago
The sun can be an excellent source of natural light.<br> True.<br> False.
Blababa [14]

Answer:

The answer is TRUE

7 0
3 years ago
Read 2 more answers
Software engineering is not only concerned with issues like system heterogeneity, business and social change, trust, and securit
jenyasd209 [6]

Answer:

follows are the solution to this question:

Explanation:

Confidentiality:

It always agrees with all of this, even though there is no security arrangement, and the theoretically facilitates the free exchange of information between both the client as well as the worker or understands that perhaps the personal life of a client and then all the concerns and problems we have belongs to them.

Competence:

It didn't distort the skill level in such a specific field or topic, it is the talent or capacity, and being able to be doing something well or be sane enough just to face charges in court.

Intellectual property rights:

It will be mindful of regional intellectual property laws in which the individuals over its mind's constructs are given over a certain amount of time, which typically gives the maker the exclusive right to use his / her development.

5 0
3 years ago
Which type of attack is being utilized when the attacker asks you to hold a security door open for them after you have successfu
ddd [48]
When the attacker <span>asks you to hold a security door open for them after you have successfully authenticated using your proximity badge or access badge backdoor attack is being utilized. The backdoor malware gives you to have normal authentication procedure and the remote access is granted.
</span><span>This attack exploits vulnerabilities within applications.</span>
Backdoors are used for a number of malicious activities: data theft, server hijacking, Website defacing and many more.
6 0
3 years ago
Other questions:
  • Why is it important to open the Map Custom Fields dialog box before importing/exporting a list of contacts? Check all that apply
    6·2 answers
  • Which type of address is used in a packet to address the packet to a single host??
    12·1 answer
  • _____ computing refers to a computing environment that is always present, can feel our surroundings, and-based on who we are, wh
    8·1 answer
  • What can Marla enter into cell A11 to find out how much money is left in her budget and to make sure the cell is updated wheneve
    9·1 answer
  • Assume that two int constants,FIRST_YEAR and LAST_YEAR have already been declared and initialized with year values (like 2009, 2
    9·1 answer
  • Define Indentation
    8·1 answer
  • A Python keyword ______________.
    15·1 answer
  • Which form of online communication happens in real time?
    11·1 answer
  • Is anyone excited for the new matrix coming out ?
    11·2 answers
  • Using a microphone to record a sound on your computer is an example of:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!