1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
REY [17]
3 years ago
8

Directions: Asba student of Contact Center Service, you already have an experience using different computer programs. Try to rem

ember some of those by putting name of the computer program that you use in the first line below and its use on the second line.
__________. __________
__________. __________

__________. __________
__________. __________

__________. __________
__________. __________


​
Computers and Technology
2 answers:
ELEN [110]3 years ago
8 0

Explanation:

can u suggest a title about quarantine

ex: My quarantine life

sammy [17]3 years ago
7 0

Answer:

I will get back to you later ok :)

I will send your answer as soon as possible :)

in the comments

Explanation:

I WILL PROMISE TO GET BACK TO YOU AS SOON AS POSSIBLE

You might be interested in
At which stage should James, a website designer, gather information about the website he wants to create, and at which stage sho
viva [34]
<h2>Answer: James should gather information in the <u><em>Learning</em></u> phase and begin the site’s coding in the <u><em>Development</em></u> phase.</h2>

8 0
3 years ago
Your supervisor has asked you to help with the orientation of three new office employees. Topics you're asked to present include
Crazy boy [7]

Answer:

Policy manual

Explanation:

A written document that is designed by the company to decide the rules and regulations for the employee to guide them about attendance and evaluation to achieve the desired goals is called Policy manual.

A handbook is provided to the employee at the time of joining of Job. All the policies related to employee such as dress code, attendance policy and evaluation policy. All the rules and regulations related to office are also present in this document.

The purpose of this document is to inform the new employees about guidelines of the company.

7 0
3 years ago
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
2 years ago
What is output by the following code?
Naily [24]

Answer:

Sum = 3

Sum = 9

Sum = 18

Sum = 30

Look at the image for more information.

4 0
2 years ago
1) what are two functions of a pick or count condition?
anastassius [24]
1. The answer is C. Pick an object at random, and keep track of how many copies of an object are left in a game.

2. The answer is D. Clockwise and counter clockwise.

3. The answer is B. To play an object's animation.

I hope you find this helpful.
5 0
3 years ago
Other questions:
  • Show the subnet address, subnet mask in slash notation, broadcast address, number of addresses, first valid host address, and th
    13·1 answer
  • what is the largest possible number of internal nodes in a redblack tree with black height k? what is the smallest possiblenumbe
    11·1 answer
  • A(n) _____ is a type of server that stores computer software, which users can access from their workstations.
    6·1 answer
  • Create a program in c/c++ which accepts user input of a decimal number in the range of 1 -100. Each binary bit of this number wi
    9·1 answer
  • Using direct mapping, consider a 16-bit memory addresses, and a cache with 64 blocks, where each block is 8 bytes. What is the s
    8·1 answer
  • Tuklasin<br>awain 2: Grapiko ng Pananagutan<br>Isulat sa graphic organizer pa​
    9·1 answer
  • What is a cloud in the world of computing
    7·1 answer
  • Critical Thinking Questions
    9·2 answers
  • Your company is building a new architecture to support its data-centric business focus. You are responsible for setting up the n
    15·1 answer
  • When a support agent does not know the answer to a question, a good incident management strategy is to tell the user ____.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!