1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinil7 [7]
3 years ago
5

PLEASEEEE HELPP ILL MARK BRAINLIEST!! in a presentation outline, each slide must represent a main point in the outline. true or

false​
Computers and Technology
1 answer:
patriot [66]3 years ago
6 0

Answer: true

Explanation: hope this helps

You might be interested in
PLEASEEEE HELPPP
zavuch27 [327]
<span>C. real-time operating system</span>
6 0
3 years ago
Which two statements are true about algorithms?
DENIUS [597]

Answer:

I. Algorithms can be written using pseudocode.

II. Algorithms can be visualized using flowcharts.

Explanation:

An algorithm can be defined as a standard formula or procedures which comprises of set of finite steps or instructions for solving a problem on a computer. The time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the input.

The two statements which are true about algorithms are;

I. Algorithms can be written using pseudocode. A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language.

II. Algorithms can be visualized using flowcharts. A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).

3 0
3 years ago
Read 2 more answers
A method to move data through a network of links and switches which reserves communication sessions between end systems is calle
lubasha [3.4K]

Answer:Circuit switching and packet switching

Explanation: Circuit switching is the switching technique through the connection from the source port to the destination port.Packet switching is also a switching techniques in connectionless form for the data packets. Both these switching techniques helps in communication between end and start ports.

Other option are incorrect as the access networks provide the access to the network and throughput is the input passing in the network.Thus, the correct option is circuit switching and packet switching .

3 0
4 years ago
(I need help also can u guys just give me some example just in case I got confuse)
Vesna [10]

Answer:

1) there should be boundaries because you never know what could happen on the internet as people tend to not have control of who is on theyre account or texting them,

2) if you have a phone you should be responsible and not do something that could get you in alot of trouble ,

3) it's important because if somebody else gets your information things can be sent that you didnt send ,that can get you in legal trouble or start a fued between people,

5) comments only matter if you let them matter as people's opinions shouldn't matter to you as long as your happy,

6) block, report , and notify a trusted adult.

8 0
3 years ago
What is the full meaning of the following acronyms:ARPANET, BOOTP, GSM, GUI, EOM, EULA, CTSS. ​
ExtremeBDS [4]

Answer:

ARPANET: Advanced Research Projects Agency Network

BOOTP: Bootstrap Protocol

GSM: Global System for Mobiles

GUI: graphical user interface

EOM: Enterprise Output Management

EULA: end-user license agreement

CTSS: The Compatible Time Sharing System

Explanation:

<em>BEFORE GOING FOWARD KNOW THAT I DO NOT OWN THESE TEXTS.</em>

GSM= a standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by mobile devices such as mobile phones and tablets.

ARPANET=the first public packet-switched computer network. It was first used in 1969 and finally decommissioned in 1989. ... Many of the protocols used by computer networks today were developed for ARPANET, and it is considered the forerunner of the modern internet.

BOOTP= is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.

GUI= A graphics-based operating system interface that uses icons, menus and a mouse (to click on the icon or pull down the menus) to manage interaction with the system.

EOM= refers to the process by which enterprise organizations manage, format and distribute data created from operational applications.

EULA= An end-user license agreement (EULA) is a license that gives a user the right to use a software application in some manner. EULAs are designed to enforce specific software use limitations, such as only using the software on one computer.

CTSS=services for children who require varying therapeutic and rehabilitative levels of intervention to address conditions of mental illness or emotional disturbance that impair and interfere with development and functioning. overcome deficits or maladaptive skills acquired over the course of a psychiatric illness.

6 0
3 years ago
Other questions:
  • A tracking signal A. is a measurement of how well a forecast is predicting actual values. B. is computed as the mean absolute de
    13·1 answer
  • g Create your own data file consisting of integer, double or String values. Create your own unique Java application to read all
    7·1 answer
  • Luentifying message rullidl Upuuns
    12·1 answer
  • One of the main purposes of special effects is to accomplish shots that would be too expensive, too dangerous or just plain impo
    9·2 answers
  • Evan accidentally entered an incorrect word when he was typing a document. Which keyboard shortcut should he use to undo the err
    5·2 answers
  • To what type of user does he most likely have access? Jae is using a computer at the public library to do research she's able to
    9·1 answer
  • What is an IP address and where I can find the IP address for my computer?
    14·1 answer
  • What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
    5·1 answer
  • What is the address of the first SFR (I/O Register)​
    11·1 answer
  • How do web-based applications and websites differ? (2 points)
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!