1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
3 years ago
14

Which statement describes one of the responsibilities of a computer programmer?

Computers and Technology
1 answer:
galben [10]3 years ago
6 0

Answer:

d i think

Explanation:

You might be interested in
Help i need 76 more points to rank up can some one nice get me those? please please please
lutik1710 [3]
????????????????????????
6 0
3 years ago
Read 2 more answers
Which of the following could occur when both strong and weak ciphers are configured on a VPN concentrator? (Select TWO) A. An at
Elza [17]

Answer:

A. An attacker could potentially perform a downgrade attack.

E. The IPSec payload reverted to 16-bit sequence numbers.

Explanation:

When both strong and weak ciphers are configured on a VPN concentrator, the following are likely to occur;

An attacker could potentially perform a downgrade attack

The IPSec payload reverted to 16-bit sequence numbers

3 0
3 years ago
Which view shows how the document will look when printed?
DIA [1.3K]
Please provide photos for your question.
7 0
3 years ago
? Which console was the first to use CD-ROM storage? PlayStation Atari Jaguar PlayStation 3 Xbox 360
kaheart [24]

that is incorrect! Playstation is the correct answer

7 0
3 years ago
Active Directory and __________ are critical in centralizing control of authentication and security policies in a domain environ
vagabundo [1.1K]

Answer:

DNS(Domain Name Services) is the correct answer.

Explanation:

DNS is the type of directory system which is distributed that finds the solution of a hostname which is readable by the human being. It is also critical in centralizing control of the confirmation and policies of the security in the environment of the domain with Active Directory. That's why the following answer is correct.

4 0
3 years ago
Other questions:
  • ​Which SQL keyword is used to search for records?
    8·1 answer
  • How do online note-taking tools support students’ academic goals? Check all that apply.
    9·2 answers
  • La computadora es un medio de comunicacion moderno?
    8·1 answer
  • Grace Hopper led the development of ______, a programming language for business applications.
    6·2 answers
  • Mechanisms that combine memory, processing speed, and knowledge to regulate the analysis and flow of information within the info
    5·1 answer
  • Concentric circles on a disk platter where data is stored;________
    8·1 answer
  • .Ashley is creating a new logo for her client that should be a vector graphic. Which is classified as a vector editing software?
    8·1 answer
  •  Which device containing sensors send signals to the computer whenever light changes are detected? 
    11·1 answer
  • Output each floating-point value with two digits after the decimal point, which can be achieved by executing cout << fixed
    7·1 answer
  • Software is the brain of computer. Explain this starement
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!