1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
3 years ago
6

Hurrryyyy it’s either a or c

Computers and Technology
1 answer:
Veseljchak [2.6K]3 years ago
4 0

Answer and Explanation:

I believe its A. Modularity enables multiple programmers to work on a program at the same time..

Let me know if I'm wrong..

You might be interested in
Su now wants to modify the text box that contains her numbered list. She accesses the Format Shape pane. In what ways can Su mod
Fiesta28 [93]
I believe its E she can insert a picture in the text book
7 0
3 years ago
Read 2 more answers
What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowle
Stells [14]

Answer:

The answer is "Spyware".

Explanation:

Spyware is a supplementary program that is mounted on your customer computer and it transmits the data without authorization via the Internet. Its business includes ads, private data, and improvements in the user interface, which is why it has become recognized as the special adware class that collects and transmits user information over the web without the user's permission.

7 0
3 years ago
Which type of portfolio might a young investor who is not afraid of risk choose?
Keith_Richards [23]
i think it would be the investment with high risk and high return such as Stocks.When investing in stock, investor analyze whether a specific company will be doing well in the time of investment (which will increase the market price of the stock) and take a profit from it.
7 0
3 years ago
In 1–2 sentences, describe how you would create a border around a group of cells
iragen [17]
Pick one of the cells you<span> want to format and then click the down arrow beside the </span>Borders<span> button in the Font </span>group<span> on the Home tab. A drop-down menu comes up with all the</span>border<span> options that </span>you can<span> apply to the </span>cell<span> selection</span>
4 0
3 years ago
Read 2 more answers
The approach by ___ (with a few minor refinements) was implemented 2300 years later by Newell and Simon in their GPS program, ab
Vedmedyk [2.9K]

Answer:

The approach by <u> Aristotle </u> (with a few minor refinements) was implemented 2300 years later by Newell and Simon in their GPS program, about which they write (Newell and Simon, 1972). The main methods of GPS jointly embody the heuristic of means-ends analysis.

Explanation:

Aristotle’s approach (with a few minor refinements) was implemented 2300 years later by Newell  and Simon in their GPS program, about which they write (Newell and Simon, 1972):

The main methods of GPS jointly embody the heuristic of Means–ends ANALYSIS , typified by the following kind of common-sense argument, sorting between what one has and what one wants, needs, or the difficulty implied,  classifying things according to the functions they give solution to and oscillating  among ends, functions required, and means that perform them. This  analysis does not indicate what to do when the actions will achieve the  goal, though, or when no achievement will be reached by the action.

3 0
3 years ago
Other questions:
  • A geologist is part of what career feild
    6·1 answer
  • Synthesizing information can be done by creating
    15·2 answers
  • At the coffee shop where they work, Jen is the safety officer, Richard is in charge of administering first aid, Ashley is respon
    13·2 answers
  • An ftp ____ is a computer that allows users to upload and/or download files using ftp.
    5·1 answer
  • What symbol do you use to choose a feature for your notes on Notion?
    8·1 answer
  • JavaBeans are?A special Java classfileServletsAppletsA Special form of JSPNone of Given
    8·1 answer
  • Write an application that inputs a five digit integer (The number must be entered only as ONE input) and separates the number in
    10·1 answer
  • Explain four sitting postures in a computer laboratory​
    9·1 answer
  • How does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats
    13·1 answer
  • Which is an example of analog d<br><br><br>evice​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!