1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimaraw [331]
3 years ago
7

Which goal of design theory can be described as the proper distribution

Computers and Technology
1 answer:
muminat3 years ago
7 0
The answer is balance
You might be interested in
If you need any answer answered faster check out Wolframalpha.com
sleet_krkn [62]

Answer:

Thx

Explanation:

8 0
3 years ago
Read 2 more answers
You type a web address in your web browser. order the steps, which describe the internet name resolution process for the web add
padilas [110]
First of all let's make it clearer, what is meant by "domain name resolution"?
"Domain name resolution" is the process of translating your web address into its corresponding IP address. e.g. translating (www.brainly.com to 104.16.32.180)
Computers cannot understand the human language they only can understand numbers that's why we need this process.

So, the process (in a very simple way) is divided into four steps:
1) Lookup "root nameservers"
2) Lookup "Top Level Domain TDL nameservers"
3) Lookup "domain nameservers"
4) Lookup "subdomain nameservers" [if exist]

If you still confused please check out this video https://www.youtube.com/watch?v=BCjUbpIzRs8&index=10&list=PL4bq-KmCeyBmMvBB3-RT6ikdp8ljV9GeT

6 0
3 years ago
Given that Marcy worked 42 hours (Hours = 42) last week and earns $10.00 an hour (Rate = 10), how much did Marcy earn last week,
serg [7]

Answer: $420

Explanation: from the question above, mercy worked 42 hours at $10 an hour. Her total pay before tax is: 42 x 10 =

$420

5 0
4 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
The declarations and statements that compose the method definition are called the __________.
Fiesta28 [93]

Answer:

a. method body.

Explanation:

A method contains the following components:

  • method name
  • method arguments
  • method return type
  • method implementation code

All of these together constitute the method body. The method body contains the declarations and statements constituting the method definition.

Apart from this, when the method is invoked at runtime, it needs to be called with method-name and the actual parameter list which gets substituted for the formal parameters in the method body.

8 0
3 years ago
Other questions:
  • A directional antenna issues wireless signals along a(n) ____ direction.
    9·1 answer
  • An art board on which text and graphics are pasted is known as a __?
    12·1 answer
  • Now suppose that the file is broken into 5 packets, each of 10 Mbits. Ignore headers that may be added to these packets. Also ig
    14·1 answer
  • Which types of files are saved with the .mp3 and .zip extensions?
    12·2 answers
  • The easiest way to run a web page that’s already in your browser after you’ve made changes to the code for the page is to
    6·1 answer
  • Which object event is an indication that something has been created but not committed into the database?
    13·1 answer
  • What can be changed when a style is modified?
    5·2 answers
  • Assume the data link protocol used by NDAS has the following associated characteristics:
    8·1 answer
  • What is the typical drive letter for the hard drive?
    12·1 answer
  • Match each item with a statement below.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!