1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KatRina [158]
3 years ago
10

Make a list of five primary raw materials, for each one, indicate and industrial material that is created from it

Computers and Technology
2 answers:
Rashid [163]3 years ago
5 0
This person if correct I looked over there work and there correct so hope this make h feel better summiting
IgorLugansk [536]3 years ago
4 0

Answer:

this is a good geraf to help I USD it to

Explanation:

You might be interested in
Is this code object-oriented, or is it procedural? what clues in the code itself did you use to determine what kind of code it i
Katen [24]

An Object-Oriented code or coding refers to a technique of programming that utilizes the identification of classes of objects that are closely tied to the functions with which they are related.

<h3>What is a Procedural Oriented Code?</h3>

This refers to a kind of programming language that utilizes a step-by-step method so as to break down a task into a set or a collection of factors or variables and routines or sub-routines using a set of instructions that are sequential.

Objects in programming refer to a type of abstract data that has a state and behavior. It is a specific instance of a class.

A class in programming is a templated definition of the techniques and variables of a certain type of object.

<h3>What are some of the principles and structures of coding?</h3>

There are 10 principles of coding. Some of them are:

  1. Keep it simple
  2. Separate concerns
  3. Document your Code etc.

Some of these principles can be used in normal day-to-day activity and even in business. item 1 for instance can be used during communication.  Effective communication is more effective when it is kept very simple.

It is to be noted that the code referenced in the question is unavailable hence the general answer.

Learn more about Object-Oriented Code at:
brainly.com/question/4560494

3 0
2 years ago
There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi
torisob [31]

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

6 0
3 years ago
When you open a browser window, it open in a _____. <br> a. fieldb. folderc. menud. window?
Romashka [77]
D. A window the rest are incorrect
4 0
4 years ago
Why the computer is known as versatile and diligent device ? explain.<br>​
Scrat [10]

Answer:

Computer is called versatile and diligent device because it is used in almost all the fields for various purposes and it can perform the task repeatedly without loosing its speed and accuracy for long time.

5 0
2 years ago
Write a program that reads in an array of type int . you may assume that there are fewer than 50 entries in the array. your prog
Alla [95]
This may be a difficult thing to do so for anyone to ACTUALLY answer this you migghttt want to up the amount of points you get for answering maybe, 20-40 points.
7 0
3 years ago
Other questions:
  • A modern information-processing model that views memories as emerging from particular activation patterns within neural networks
    6·1 answer
  • Create a cell array, called A, with the following contents: a. Make a copy of A called B. (Nothing complicated: B = A is suffici
    10·1 answer
  • According to a recent study, more than 75 percent of teens between the ages of twelve and seventeen in the United States have a
    11·2 answers
  • Forensic computer investigators must _____.
    6·2 answers
  • Assume the system with 256B memory and 64B cache and the block size of 16 bytes. I.e., there are 4 blocks in the cache.
    12·1 answer
  • Write: In a five-paragraph essay that is two to three pages in length, address the
    13·1 answer
  • What happens to a message when it is deleted?
    5·2 answers
  • Write a function that dynamically allocates an array of integers. The function should accept an integer argument indicating the
    8·1 answer
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • You are the IT security administrator for a small corporate network. The HR director is concerned that an employee is doing some
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!