1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nasty-shy [4]
3 years ago
4

Why might you choose to create a functional resume?

Computers and Technology
1 answer:
stepan [7]3 years ago
7 0
Functional resumes highlight your abilities, such as hiring, managing or coaching, rather than your chronological work history
You might be interested in
A two-dimensional array of characters can contain Group of answer choices
Ber [7]

Answer: All of these.

Explanation:   Lets take a two-dimensional array alphabet[4][4]

Lets say this array contains the following elements: Example 1

a b c d

l  i  o  n

f e  l   l

s t  e  m

These are the strings with same length. So this 2D array can contain strings of same length.

Now lets take another 2D array Example 2

a b c

h  i  n  t

s  o

e g  g

2D array can have all these above mentioned elements. So it can contain strings of different lengths.

Now consider the Example 2. Some places for the elements are left. This isn't an issue for 2D array. So it can contain uninitialized elements too.

So the answer is All of above.

6 0
4 years ago
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
What is output?
Alex777 [14]

Answer:

The output of this question is 21. As show in the image

The explanation is given in below

Explanation:

Let first write the question

C=1

sum = 0

while(C<10):

C=C+3

sum=sum + C

print(sum)

Now Focus on

while(C<10):

C=C+3

sum=sum + C

The value of C is initially 1

C=1+3

Sum= 0+4

In second loop the value of C will become 4

c=4+3

sum=4+7

In third loop the value of C will be 7

c=7+3

sum=11+10

so the answer is 11+10=21

7 0
3 years ago
Let G = (V, E) be an undirected graph. Design algorithms for the following (in each
Degger [83]

Answer:

i think its b if not sorry

Explanation:

3 0
3 years ago
How many answer or point do I answer/need to sent message?
Grace [21]

I'm a little confused about the question, but if you're asking how many points you need to ask a question, the minimum is 10.


4 0
3 years ago
Other questions:
  • A Color class has three int color component instance variables: red, green, and blue. Write a toString method for this class. It
    13·1 answer
  • tuition $36,620 room and board $12,900 books and fees $2,450 transportation $3,100 other $1,330 . Emily is using the table to de
    8·2 answers
  • The part of the computer that provides access to the internet is the?
    14·1 answer
  • Match each scenario to the absolute value expression that describes it. 1. the distance moved when going backwards five spaces i
    13·2 answers
  • The part of the computer that contains the brain or the Central Park nursing unit is also known as
    10·1 answer
  • Two system administrators who work in two different buildings for the same company want to open a communication channel between
    8·1 answer
  • Lucy has to move data from column A to column N in a worksheet. Which keys should she select to move data in the same worksheet?
    9·2 answers
  • There are several design goals in building an operating system; for example, resource utilization, timeliness, robustness and so
    11·1 answer
  • Es costoso construir un robot
    6·1 answer
  • I need help about computer program. Solve C language code...... please​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!