1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhannawk [14.2K]
3 years ago
8

4.11 lesson practice edhesive

Computers and Technology
2 answers:
spin [16.1K]3 years ago
6 0

Answer:

the last one

Explanation:

Whitepunk [10]3 years ago
4 0

Answer:

To calculate the area of an oval room

Explanation:

You might be interested in
Multiple Intelligence Theory explains that...
Alex

Answer:

A. We all learn differently (edge 2020)

Explanation:

4 0
3 years ago
Read 2 more answers
Write three guidelines to help you keep track of your behavior as you use different apps with
Gala2k [10]

Answer:

A basic guideline plan to help me track my behavior consist of the following:

How much time do I use each element?

Have I experienced anxiety after using them?

Have I experienced anxiety while using them?

Have I changed my day to day routine by using them?

Explanation:

The reasons to back my answer are the following. First of all, dependency can be measured in time spent and anxiety developed after the use of the element. Thus, we need to explore if the source of media has originated anxiety while using it or after using t to spot if we are suffering an addictive pattern. Also, generally addictive elements create anxiety while using it and it increases after stop using them. Therefore, if we find that we have experienced both types of anxiety we are in an addictive cycle.

4 0
3 years ago
Describe the system unit​
mestny [16]

Answer:

A system unit is the part of a computer that houses the primary devices that perform operations and produce results for complex calculations

6 0
3 years ago
Read 2 more answers
What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption
ankoles [38]

<u>Explanation:</u>

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major <u>advantage</u> of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main<u> disadvantage</u> of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. <u>A major </u><u>advantage</u><u> of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), </u><u>a disadvantage.</u>

6 0
3 years ago
From the Software Engineering Code of Ethics, which clauses relate to intellectual property (check all that apply)
kaheart [24]

Answer:

A) "Identify, document, collect evidence and report to the client or the employer promptly if, in their opinion, a project is likely to fail, to prove too expensive, to violate intellectual property law, or otherwise to be problematic."

B) "Ensure that there is a fair agreement concerning ownership of any software, processes, research, writing, or other intellectual property to which a software engineer has contributed."

C) "Not knowingly use software that is obtained or retained either illegally or unethically."

Explanation:

All the above are connected to intellectual stuff and hereafter are the right possibilities. One requires to comprehend the definition of intellectual property. In fact, it is a software, a piece of script, art, etc. that a knowledgeable make using his intelligence. All the rights related to such is with the intellect. And that is why the above three choices is right.

The fourth choice has nonentity to do with intellectual stuff, and it deals with the skirmish of interest. And henceforth that is not a correct option.

5 0
3 years ago
Other questions:
  • How to highlight text on a kindle paperwhite?
    7·1 answer
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • Which Google Analytics visualization compares report data to the website average?A. Pivot viewB. Comparison viewC. Performance v
    8·1 answer
  • Which of the following sorting algorithms could be implemented on a doubly-linked list WITHOUT making the asymptotic worst-case
    12·1 answer
  • Which type of address is used at the transport layer to identify the receiving application?
    14·1 answer
  • Someone, please answer this.
    15·1 answer
  • What is the typical drive letter for the hard drive?
    12·1 answer
  • Helppppppppppppppppppppppppppppppppp
    13·2 answers
  • A citizen of any group has both _____ and _____.
    10·1 answer
  • Which window would show you bindings for local area connection 2?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!