1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga_2 [115]
4 years ago
9

Drag each tile to the correct box.

Computers and Technology
1 answer:
SVEN [57.7K]4 years ago
6 0

  • Learning : For performing any task you need to learn from the basiscs .
  • planning : planning is the main part . unless and until you dont know how to design and what to design , what will you design ?
  • Designing : After laying a layer of well set up plane u need to look up , and break your head in physically implying it .
  • Devaloped : This place is where you detect flaws in your system , work with that and makes it even better .
  • Testing and delevering : The product is designed , U just need to test and delever it to consumers .
You might be interested in
What validation type would you use to check that numbers fell within a certain range? a) range check b)presence check c)check di
olga2289 [7]

Answer:

a) range check

Explanation:

Validation can be defined as an automatic computer check that is designed to ensure any data entered is sensible, consistent, feasible and reasonable.

Basically, there are five (5) main validation methods and these includes;

I. Presence check: checks that the user enters (inputs) data into the field. It ensures a field isn't accidentally left blank.

II. Length check: checks that the data entered isn't too short or too long. It ensures that the data meets the minimum characters.

III. Type check: checks that the data entered is in the right format. For example, string, integer, float, etc.

IV. Check digit: checks that the digit entered is acceptable and consistent with the rest of the digits.

V. Range check: checks that the data entered is between the accepted lower (minimum) and upper (maximum) level.

Hence, range check is a validation type you would use to check that numbers fell within a certain range.

For example, 0 < x > 1000 is a range check.

4 0
3 years ago
1) Put the following in order from smallest to largest A) 1,500,000 bytes B) 2,000 kilobytes C) 0.01 petabytes D) 1 Terabyte E)
Lyrx [107]

Answer:

A, B, E, D, F, C

3 0
3 years ago
Create an application for a library and name it FineForOverdueBooks. TheMain() method asks the user to input the number of books
user100 [1]

Answer:

using System.IO;

using System;

class FineForOverdueBooks

{

static void Main()

{

Console.WriteLine("Enter the number of books user checked out: ");

int books = Convert. ToInt32(Console.ReadLine());

Console.WriteLine("Enter the number of overdue days: ");

int days = Convert. ToInt32(Console.ReadLine());

DisplayFine(books, days);

}

public static void DisplayFine(int books, int days) {

double amt = 0;

int d = days;

if(days>7) {

amt = (days-7) * .20 * books;

days = 7;

}

if(days > 0) {

amt = amt + days * .10 * books;

}

Console.WriteLine("The fine for {0} book(s) for {1} day(s) is {2}", books, d, amt);

}

}

Explanation:

7 0
3 years ago
I want to message someone on Brainly but it wont let me. How many questions do I need to answer before I could message?
aliya0001 [1]
I’m not sure it’s about number of questions, I think it’s based off of rank. Good luck though! I’m happy to answer any questions you have!
6 0
4 years ago
Read 2 more answers
_______ is a very common approach to multisystem authorization.
mart [117]

Password is a very common approach to multisystem authorization. Passwords can be made up of a combination of letters, numbers, and special characters.

Anyone who has used a computer knows how to use a password, which is the most commonly used authentication method. Password-based authentication is the most simple for adversaries to exploit. Passwords are frequently reused, and guessable passwords are created using dictionary words and publicly available personal information. Two-factor authentication (2FA) is a security system that requires two distinct forms of identification to gain access to something. The first factor is usually a password, and the second is usually a text message with a code sent to our smartphone, or biometrics such as your fingerprint, face, or retina.

Learn more about password here-

brainly.com/question/14580131

#SPJ4

7 0
1 year ago
Other questions:
  • If you want to open an application that does not have a tile pinned to the start menu
    9·1 answer
  • You can add envelopes to existing documents. <br> a. True <br> b. False
    10·1 answer
  • What is a file that has an .iso extension? What does this extension indicate?
    8·1 answer
  • When the hyper-v role is added to a windows server 2012 r2 server, what is loaded first during boot?
    6·1 answer
  • Using C#, declare two variables of type string and assign them a value "The "use" of quotations causes difficulties." (without t
    11·1 answer
  • Assume that we are using 0-1 integer programming model to solve a capital budgeting problem and xj = 1 if project j is selected
    6·2 answers
  • You are asked to add speech to a robotic receptionist that sits at the front desk of a large organization. The robot has an anim
    10·2 answers
  • Write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function should takes one parameter:
    8·1 answer
  • Draw at least 15 fabric/garment care labels on a piece of paper to be submitted the following week
    5·1 answer
  • What type of html list will automatically place a list marker, or bullet point, indicator in front of each item? group of answer
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!