Answer:
c. Transforming raw data inputs into new or modified information
Explanation:
When you create a program what you are doing is making something that can take what a person does on say a website and then transform it into something else that can most of the time be clearly understood and defined.
Answer:
A) work study program
Explanation:
Because you need experience and scholarships don't always pay, so this is the best choice.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
First, we need to know what are the attributes of an object in object-oriented programming. In the object-oriented program, an entity that you are going to program considered an object. for example, students, class, course, teacher, and exam are objects in the learning management system. The attributes are the feature of an object whereas methods are the behaviors of an object
In this question, it is asked about to list or give an example of an attribute for a screen object. Screen object can be anything that shows display, for example, your laptop, mobile, tablet, billboard, etc.
The attribute of the screen object are listed below:
- screen size,
- screen manufacturer
- screen type (whether it is a laptop, monitor, digital watch screen, etc)
- screen width
- screen length
- screen color
- screen pixel
- Is it a touch screen
The above are some examples of an attribute for a screen object.
Answer:
B) He will need to use a computer software program to design the building, create blueprints, and manage budgets.
Explanation:
Discovery of any vulnerability in a software program can potentially be sold to the government: True.
<h3>What is vulnerability?</h3>
Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.
This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.
Read more on vulnerability here: brainly.com/question/25813524
#SPJ1