1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
13

A professional-looking portfolio gives a clear message. What does it convey?

Computers and Technology
1 answer:
Akimi4 [234]3 years ago
8 0

Answer:a

Explanation:

You might be interested in
How to achieve competitive advantage using information systems models
Maurinko [17]

Information systems can achieve competitive advantage by engaging in:

  • Lowering costing.
  • Boasting differentiation of their product.
  • Changing Their competitive scope.

<h3>What is competitive advantage?</h3>

Competitive advantage is known to be that  factors that helps a firm to produce goods or services better or relatively more cheaply than their counterparts.

Note that in the case above, Information systems can achieve competitive advantage by engaging in:

  • Lowering costing.
  • Boasting differentiation of their product.
  • Changing Their competitive scope.

Learn more about competitive advantage from

brainly.com/question/14030554

#SPJ12

4 0
2 years ago
A third-grade teacher at Potter Elementary School wants a program that allows a student to enter the amount of money a customer
mina [271]

Answer: IDK

Explanation: ummm I have no idea wut ur asking meh

6 0
3 years ago
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two syst
irga5000 [103]

Answer:

Proxy Server                        

Explanation:

  • Proxy server is a server that acts as a mediator between two systems.
  • One system can be your computer and the other can be the server to which you are asking a service, such as requesting a web page.
  • Lets suppose you request a web page from a server and you type a URL of a website to access a web page.
  • This request goes to proxy server which sends this request on your behalf to the target server in order to retrieve that web page.
  • Proxy server makes this request to the target server on the internet by using one of its IP addresses.
  • When the proxy server gets that web page, it will forward that web page to your requesting computer.
  • If you request a specific service such as a website frequently the proxy server saves that website on its cache.
  • So if you request that website again, proxy server will forward it to you from its cache rather than requesting it again from the target server on your behalf resulting in quick response to the user's request.
  • Proxy servers provide users with privacy to access the websites, and they can surf the internet anonymously .
8 0
3 years ago
Which line in the following program contains the header for the showDub function? 1 #include 2 using namespace std; 3 4 void sho
Flura [38]

Answer:

The answer to this question is "15 line".

Explanation:

A function is a block of ordered, portable code used to perform a single, connected operation. The syntax of function declaration can be given as:

Syntax :

returntype functionName(parameter1, parameter2); //function prototype

or declaration

returntype functionName(parameter1, parameter2) //function definition or header of the function  

{  

//function body.

//function implementation

 //return value;

}

In the given question the header of the showDub function is on line 15.

That's why the answer to this question is "15 line".  

8 0
3 years ago
How to Pass VMware VCA6-DCV 1V0-621 Exam in First Attempt ?
erastova [34]
Get 100% success guarantee with updated Vmware VCA6-DCV 1V0-621 Certification exam in first attempt by certsbay.com  https://www.certsbay.com/Vmware/1V0-621-exam-questions
7 0
4 years ago
Other questions:
  • 2. Identify the diagram and define it.<br>13. What are pollen grains ?<br>4. What is an embryo?​
    12·1 answer
  • 1. Think about the various ways in which you have seen hackers portrayed in popular media over the past few years. Are they hero
    11·1 answer
  • Ou have an application running on Oracle Cloud Infrastructure. You identified that the read and write operations are slowing you
    10·1 answer
  • In __________ write, the data are stored in the cache, and control returns to the caller. Select one: a. a synchronous b. a buff
    8·1 answer
  • Which of the following is a valid formula?<br> (C2-D16)<br> O A2/F2<br> O=B5/10<br> O =E10
    14·1 answer
  • You dad has given you his old digital scanner for your new computer. you plug it into the usb drive on your windows 8 computer b
    8·1 answer
  • A ___________ variable is used to add up a set of values. fill in the blank
    8·1 answer
  • Your ISP connects to the core routers of the Internet via a O backbone O satellite O cable mode Ospine​
    9·1 answer
  • Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain control
    5·1 answer
  • The cpu understands instructions written in a binary machine language. <br> a. true <br> b. false
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!