1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mkey [24]
4 years ago
11

Students enrolled in a digital classroom participate in discussions and take field trips with classmates. watch instructional vi

deos and turn in assignments online. take notes online but take tests in front of a teacher at school. listen to lectures online but make presentations at school.
Computers and Technology
1 answer:
krek1111 [17]4 years ago
7 0

Answer:b

Explanation:gszrxewzgdtxherhzre

You might be interested in
Write a program that will add the content of two counters every 45 seconds and place the result in an integer register.
nexus9112 [7]

Answer:

Explanation:

The following code is written in Java and runs a thread every 45 seconds that adds the two counters together and saves them in an integer variable called register. Then prints the variable. If this code runs 5 times it automatically breaks the loop. This can be changed or removed by removing the breakLoopCounter variable.

 public static void add_Counters(int counterOne, int counterTwo) {

       int register = 0;

       int breakLoopCounter = 0;

       try {

           while (true) {

               register += counterOne + counterTwo;

               System.out.println(register);

               Thread.sleep(45000);

               breakLoopCounter += 1;

               if (breakLoopCounter == 5) {

                   break;

               }

           }

       } catch (InterruptedException e) {

           e.printStackTrace();

       }

   }

5 0
3 years ago
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authen
Ksju [112]

Answer: Authorization process

Explanation

Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.

Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.

Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".

5 0
4 years ago
What is a teaser and what is an audience
Taya2010 [7]
Teaser - Only showing a part of a clip or something to hook to audience 
Audience - The ones watching or viewing 
6 0
3 years ago
what are some steps Hector could have taken to ensure that his photographs were not ruined near the end of the shoot?
galben [10]

Answer:

make several extra copies of the pictures and frame them right away if they're printed out.

Explanation:

3 0
2 years ago
How do mark somebody as brainliest??
svet-max [94.6K]

Answer:

Once more that one person answer, you will get an option next to the heart and the star that would look like a crown

Explanation:

That is how you do it.

4 0
3 years ago
Other questions:
  • What does Tristan need to do to add a row at the
    14·1 answer
  • Write a Java program to print the result in the series 10, 15, 20, 25, ..., 50. Hint: You can use an iteration statement for wri
    9·1 answer
  • What are technology trends in science check all that apply
    13·1 answer
  • What does limited access to a document mean? A. It makes a document inaccessible without a password. B. It enables a person to m
    7·1 answer
  • Visme,PowerPoint, keynote and prezi are what kind of software
    15·1 answer
  • The __________ on a mouse is used to select or place the cursor where you want on the page
    13·1 answer
  • Give four example of computer virus​
    13·1 answer
  • We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the
    13·1 answer
  • What is the recipe for enchanting table?
    14·2 answers
  • Write a function to take three integers x, y and n and check if x and y are both fall between 0 to n-1. If yes, your function sh
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!