1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WITCHER [35]
4 years ago
11

Tommy has hired a marketing company to create a billboard advertisement

Computers and Technology
2 answers:
chubhunter [2.5K]4 years ago
8 0

Answer:

the only thing i see missing is smart placement,is it risk free, focus on its objective or something

Explanation:

I'm doing my best

maxonik [38]4 years ago
7 0

Answer:

the billboard is missing a call to action!

Explanation:

It has exciting graphics and appropriate information.

You might be interested in
Which of these tools can best be used as a self assessment for career planning purposes?
Furkat [3]

a self-directed is the correct answer
3 0
3 years ago
Read 2 more answers
The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n)
nataly862011 [7]

Answer:

D). Algorithm

Explanation:

The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called an algorithm.

From the question, it is clear the correct option is algorithm.

In simple terms, to solve a problem the set of rules to follow is called algorithm. Algorithm in computer programming describes the steps that explains not only the task that needs to be performed, but also how to do it.

In algorithm, the steps are needed to be in the right sequence.

6 0
3 years ago
Read 2 more answers
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
3 years ago
4. What is the formula for calculating the file size?
Verizon [17]
Step 2: Multiply total number of pixels by the bit depth of the detector (16 bit, 14 bit etc.) to get the total number of bits of data. Step 3: Dividing the total number of bits by 8 equals the file size in bytes. Step 4: Divide the number of bytes by 1024 to get the file size in kilobytes.
7 0
3 years ago
In what cases would you denormalize tables in your database?
ad-work [718]

Answer: Denormalize is the mechanism is carried out by addition of the redundant bits in the already normalized database.The data is attached in the form of attributes,adding new tables.

This technique is used in the case of previously normalized data collection which requires improvement in the performance by reducing the errors.The improvement is made by making database readable ,adding  group of data in redundant form etc.

When data is to be retrieved quickly then also denormalization is used as by grouping or collecting information into a single table.

6 0
3 years ago
Other questions:
  • The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should
    13·2 answers
  • The piece of hardware that contains the circuitry that processes the information coming in to the computer and tells the other h
    8·1 answer
  • An argument is different from a parameter in that an argument
    11·2 answers
  • In what order does the air flow in a canister vacuum cleaner pass through the following components?
    11·1 answer
  • Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonst
    11·1 answer
  • Which programming element is used by a game program to track and display score information?
    10·2 answers
  • An actual printout of computer data always satisfies the best evidence rule?
    12·1 answer
  • Of the following hard drives, which one is fastest?
    13·1 answer
  • If a company gave you a free version of their software and encouraged you to try and improve it and share it with the only commu
    8·1 answer
  • if you put a drone on the charger at 8:12 and take a break at 10:03 how long is it on the charger. for
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!