1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irakobra [83]
4 years ago
8

Which two skills and abilities are essential for a ship captain

Computers and Technology
1 answer:
Ierofanga [76]4 years ago
6 0

Answer:Leadership/guidance/public speaking/communication

Explanation:

You might be interested in
Who is the intended audience of a pseudocode document?
cluponka [151]

Answer and Example:

Pseudocode is an artificial and informal language that helps programmers develop algorithms.

Pseudocode is a "text-based" detail (algorithmic) design tool. The rules of Pseudocode are reasonably straightforward. All statements showing "dependency" are to be indented.

Pseudocode is understood by the programmers of all types. it enables the programmer to concentrate only on the algorithm part of the code development.

Java would use this.

3 0
3 years ago
List the components of a typical operating system and summarize the role of each in a single phrase.
yanalaym [24]

Answer:

The answer is below

Explanation:

There are several components of operating systems, this may be based on the specific types of Operating systems. However, here are some of the major components.

1. Kernel: it delivers the primary level of control on all the computer peripherals.

2. Process Execution: it serves as a connection between the hardware and application program

3. Interrupt: it provides a dependable technique for the OS to transmit & respond to their surroundings.

4. Memory Management: it regulates main memory and then moves processes between disk & main memory during implementation.

5. Multitasking: it interprets the activities of many independent computer programs on a similar computer system.

6. Networking: it defines the interaction of processor through communication lines

7. Security: it protects the activities of other processes going in the system

8. User Interface: it provides permission for a computer operator to get the information.

3 0
3 years ago
Technician A says that you should always compare the new hub to the old one to make sure the new hub is correct for the applicat
german
Technician B because if you always compare to previous hubs then you’ll never progress and the same mistakes will keep reoccurring.
3 0
4 years ago
Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. The company's pr
Andrei [34K]

Answer:

B) shared workspace

Explanation:

There are various terms which are shown below:

Blogging: Blogging is the site in which the person shares its views and opinions about a certain topic. So that it can spread their knowledge throughout the world

Shared workspace: As the name suggests it is a document that is shared with the team members so that they can track any change made by the other team members so that it avoids the duplicate of files. It also reduced the cost and time.

Instant messaging: It is an online chat in which the receiver and the sender communicate with each other in a real-time

Cross-linking: The cross-linking is the technique which links one site to another with a motive to access another site.

So, according to the given scenario, the most appropriate option is b.

7 0
3 years ago
Examine the following code.
liberstina [14]

number three:

"The declared type of obj is Object. The actual type is Integer."

8 0
3 years ago
Other questions:
  • Automotive engine cylinder heads can be made of what?
    7·1 answer
  • Write a program that generates a random number and asks the user to guess what the number is. If the user's guess is higher than
    6·1 answer
  • What device is designed specifically to reduce broadcast traffic that passes over a network and to choose the best path for movi
    12·1 answer
  • Which type of element is , and what is the meaning of that element ?
    6·1 answer
  • In the circuit shown in the figure above, what will happen when switches S1 and S3 are both closed? 
    8·1 answer
  • In a fully underwritten offering a firm sells 1 million shares of stock through a fully underwritten offering. Their banker char
    10·1 answer
  • Challenge
    6·1 answer
  • PLZ HELP WITH SPEED i need the answer<br><br> WILL GIVE BRAINLIEST
    15·1 answer
  • How can one create an online professional network using Face book?
    14·1 answer
  • What is the best way to share a document that contains many image or audio files.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!