1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zzz [600]
3 years ago
12

The code selection above is taken from the Color Sleuth activity you just completed. This selection would count as an abstractio

n on the Create PT, but to earn Row 8 you will need to describe how this abstraction manages complexity. Write response 2d describing the abstraction above. Use the writing prompt and scoring guidelines as a guide.
Computers and Technology
1 answer:
Vinvika [58]3 years ago
4 0

Answer:

b

Explanation:

You might be interested in
What are the keys in all rows that sit between the touch keys?
AysviL [449]
The keys in all rows that's sit between the touch keys are the stretch key
6 0
3 years ago
What is administrator access? Multiple Choice refers to how quickly a system can transform to support environmental changes perf
IrinaVladis [17]

Answer:

Administrator access is:

refers to the varying levels that define what a user can access, view, or perform when operating a system refers to the time frames when the system is operational

Explanation:

The reasons behind this answer are that in the first place the administrator role is the maximum role an account can have in the operating system. Controlling the different levels of access the rest of the accounts can have on the system. It then is a hierarchical role, not the changes someone can execute in a certain environment, these are called rules.

3 0
3 years ago
Data are made anonymous by Destroying all identifiers connected to the data. Requiring all members of the research team to sign
mestny [16]

Answer:

Destroying all identifiers connected to the data.

Explanation:

Identifiers are your virtual location when navigating, if you destroy your 'Virtual ID', nobody could identify you. Also, you could hide your identifiers, in this case, there's a small risk.

3 0
3 years ago
In media literacy,
Bas_tet [7]

what is mean by computers

7 0
3 years ago
Match the following technologies with their applications.
kap26 [50]

Answer:

3d printing

Explanation:

7 0
3 years ago
Other questions:
  • During slideshow mode hitting the b key will do which of these
    5·1 answer
  • The elements of an integer-valued array can be set to 0 (i.e., the array can be cleared) recursively as follows: An array of siz
    8·1 answer
  • You can sort data in a table or_____?<br><br><br> A. Report<br> B. Form<br> C. Field<br> D. Record
    7·2 answers
  • What is a relationship between a object and a class?
    7·1 answer
  • Plz help<br> What is an ASCII?
    10·2 answers
  • 19. Fair use applies to which of the following situations?
    14·1 answer
  • Can you give me a long list of kid's cartoons
    11·2 answers
  • 5.During a recent network attack, a hacker used rainbow tables to guess network passwords. Which type of attack occurred
    9·1 answer
  • JAVA- If you have an int as the actual parameters, will it change to fit the parameters if it requires a double, or will the cod
    15·1 answer
  • Anyone have any website ideas I could use for my computing website project? Thank you.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!