1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
12

Only technical managers needs to know about programming, web view source code and about technology issues.

Computers and Technology
1 answer:
ivanzaharov [21]3 years ago
8 0
I’d say false mainly because of the last part which is technology issues. I believe more than just a technical manager should be aware about the technology they are using
You might be interested in
A wireless network does not benefit like a wired network does, when it comes to collision reduction. Which device reduces collis
Leviafan [203]

Answer:

Switch

Explanation:

The network switch is an networking hardware also known as a network bridging device used to connect devices on the network together and receives and forward data from source to destination through packet switching.

In order to eliminate or reduce collision within the network, present day wired networks make use of network switches that connects each device to its own port on the switch, making the switch the domain of collision for half duplex links or whereby the link is a full duplex links the collision possibility is completely eliminated.

3 0
3 years ago
6. What is the difference between portrait and landscape orientation? What are the advantages of
vlabodo [156]

Answer:

PORTRAIT ORIENTATION IS VERTICAL AND LANDSCAPE ORIENTATION IS HORIZONTAL

Explanation:

PORTRAIT SETTING CAN BE USED TO DESCRIBE MEANINGS OF LETTERS IN A WORD LANDSCAPE CAN BE USED TO DIFFERENTIATE  BETWEEN WORDS MEANINGS                                                                                                                                            

3 0
3 years ago
Suggest names for a coding club
bulgar [2K]

Answer:

  • <u>Abstract Connoisseurs.</u>
  • <u>Hypertext Assassins.</u>
  • <u>Callback Cats.</u>
  • <u>Boolean Autocrats.</u>
  • <u>Runtime Terror.</u>

Explanation:

<em><u>Hope it's help you !!</u></em>

3 0
3 years ago
If we are using an 4-character password that contains only lowercase English alphabetic characters (26 different characters), ho
Trava [24]

Answer:

11,424,400 possible passwords

Explanation:

Since all characters are letters and only lowercase

we have 26∧4 = 456,976 possibilities

For a 5-character password which is still lower case sensitive.

we have 26∧5 = 11,881,376 possibilities

Many more possible passwords = (11881376-456976)

= 11,424,400 possible passwords

6 0
3 years ago
Read 2 more answers
Kiara is using her software's graphic formats to create a line graph. As she
rewona [7]

Answer:

Correct the data she entered, and the software will adjust the  graph.

Explanation:

Software is used to work with ease and efficiency. If there is any mistake during data entry, we can easily change that particular data and make it correct. There is no need to delete whole data and re enter the data again. As most of the software are user friendly and have the option to edit the information that already has been entered.

In mentioned case, Kiara should edit the data, that has been entered incorrect. After the correction of data, the graph will be automatically updated with new values and she found correct graph.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Buildings must be wired to comply with the latest National Electrical Code to ensure that, with adequate maintenance, the instal
    11·1 answer
  • Load the solver add-in if it is not already loaded. click the budget worksheet and set the objective to calculate the highest ba
    15·1 answer
  • In microsoft windows when a window is minimized what happens to that window
    9·1 answer
  • Amitha writes up a one-page summary of a novel during her summer internship at a publishing company. When she reads over the pag
    10·1 answer
  • Which of the following are not parts of a message? Select all that apply.
    12·1 answer
  • The objective of ____ testing is to identify and eliminate execution errors that could cause a program to terminate abnormally,
    15·1 answer
  • To save a file so that it can be opened on most computers, select the ____ option.
    10·2 answers
  • Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing furt
    10·1 answer
  • What is keylogging attack?
    13·2 answers
  • The goal of a system is to
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!