1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
11

A teacher wants to check the typing proficiency of five students. She gives all of them the same passage to type. Which student

is likely to be
accurate in the typing test?
OA the student who uses only one hand to type
OB, the student who uses random fingers to type
OC. the student who types by looking at the keyboard
OD. the student who corrects errors by looking at the keyboard
E the student who uses macros for long words
Computers and Technology
1 answer:
Hitman42 [59]3 years ago
5 0

The student who uses macros for long words. They are most likely to pass words very easily because they have a macro. While not only saving time, also making a stunning performance as macros usually auto correct as well.

You might be interested in
Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?Ethical Decision
ratelena [41]

Answer:

Explanation:

1. Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that?

Answer:

Before the discussion, Fred, Gladys, and Charlie focused on other ends in regards to information security. Fred was more concerned with adding additional software to fix the malware issues when clearly there were easier steps that need to be taken

2. How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance?

Answer:

Gladys’s performance should be based on the new security measures and protocol that she has in place for the organization. This of course, is putting a lot of trust into Charlie’s performance as she was the one to introduce Charlie with his new plan on the organization’s new security. She practically had him nominated for CIO.

3. Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?

Answer:

Before considering outside threats, internal threats should be looked into early in the planning process. Internal threats does not necessarily mean that the employees have malicious intent, but the case of human error and failure can also be a negative contribution to cyber security. Creating a security program and education end users by creating a security policy guidance is one of the the best ways to prevent simple cyber security issues from starting

Instead of Charlie being named CISO, suppose instead that Fred hired his son-in-law, an unemployed accountant, to fill the role. Assuming the person had no prior experience or preparation for a job in information security, did Fred make an ethical choice? Explain your answer.

Answer:

Absolutely not! By hiring an unexperienced family member over a trained professional, Fred is letting his emotions get the better of him. Fred should consult with Gladys on whether his son-in-law is good candidate for the position or not. Rather than sacrifice company security, Fred could possibly find his son-in-law a position in the companies’ financial or human resources departments.

8 0
3 years ago
Compare physical storage and virtual storage. Give an example of each and explain why one type allows computers to access data a
Nuetrik [128]
Physical storage is like your Hard Drive, Virtual is what is called the Cloud. Hard drives are able to pull information directly from inside the computer while the cloud has to do over the internet.
8 0
4 years ago
When should you integrate technology?​
earnstyle [38]
Nolur acil lütfen yalvarırım yalvarırım lütfen yalvarırım when should you integrate technology?
5 0
3 years ago
Read 2 more answers
Print person1's kids, call the incNumKids() method, and print again, outputting text as below. End each line with a newline.
Hatshy [7]

Answer:

Hi there! This is a good question to grasp the concepts of object-oriented classes, encapsulation and abstraction of classes and their properties in Java. Please find the details below.

Explanation:

You can implement the solution by calling the getNumKids() function of the personInfo object or directly using the personKid input from the user to display the initial number of kids for the user. Then, calling the incNumKids() increases the kids count. Finally, displaying the new number of kids is done by invoking the getNumKids() method of the PersonInfo object that returns the private property of numKids to the user. The user cannot access this property without the get and set methods.

CallPersonInfo.java =====

import java.util.Scanner;

public class CallPersonInfo {

public static void main (String [] args) {

Scanner scnr = new Scanner(System.in);

PersonInfo person1 = new PersonInfo();

int personsKid;

personsKid = scnr.nextInt();

person1.setNumKids(personsKid);

System.out.println("Kids: " + personKid); // or person1.getNumKids();

   person1.incNumKids();

   System.out.println("New baby, kids now: " + personInfoObject.getNumKids());

 

}

}

You can also write the code in the same file as PersonInfo.java as below.

import java.util.Scanner;

class PersonInfo {

 private int numKids;

 public void setNumKids(int setPersonsKids) {

   numKids = setPersonsKids;

 }

 public void incNumKids() {

   numKids = numKids + 1;

 }

 public int getNumKids() {

   return numKids;

 }

 public static void main(String args[]) {

   System.out.println("Enter number of kids: ");

   Scanner scan = new Scanner(System.in);

   int num_kids = scan.nextInt();

   PersonInfo personInfoObject = new PersonInfo();

   personInfoObject.setNumKids(num_kids);

   System.out.println("Kids: " + num_kids);

   personInfoObject.incNumKids();

   System.out.println("New baby, kids now: " + personInfoObject.getNumKids());

 }

}

5 0
3 years ago
Explain what is a database schema and mention one example
Taya2010 [7]

Answer:

Database schema is a structure that are used to represent the logical base in the database. Database schema is the logic arrangement of objects in the form of tables. It basically defines the entities and the relationship between them. Schema is the organisation of data in the database system.

It is divided into two main parts that is:

  • Logical database schema
  • Physical database schema

Example:

When we create a table with the student name then, the logical database schema contain the student name, student ID and the project name. Then, the student table basically stored in the physical database schema in the form of file.

4 0
4 years ago
Other questions:
  • Are there protections for people in terms of what data can be collected by different sites?
    10·1 answer
  • What word processing feature saves you the most time when keying a document a. Thesaurus
    9·1 answer
  • Files and e-mail messages sent over the Internet are broken down into smaller pieces called _____.
    13·1 answer
  • Which event most led to a reduction in the size and cost of computers? a. invention of the Bessemer converter b. development of
    8·2 answers
  • Which statements are true about modern
    9·1 answer
  • Aapke question about computer keyboard​
    5·1 answer
  • Write a algorithm to attend birthday party​
    8·2 answers
  • Which of the following is a function of the slip yoke used on a driveshaft?
    14·1 answer
  • Where are some places that cyberbullying occurs? Check all that apply.
    15·1 answer
  • In what way do media and networks interact? A.) Media are connected to networks tat make information easier to share. B.) Networ
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!