1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inessss [21]
3 years ago
15

Question 1 (1 point)

Computers and Technology
1 answer:
FrozenT [24]3 years ago
4 0

Answer:

  1. costumes
  2. systematic thinking
  3. sensing
  4. motion
  5. cap block

Extra answers if you have more than 5 answers. (I did this before and it had more answers.)

  • stack block
  • computational thinking
  • programming
  • computational thinking

Brainlist Pls!

You might be interested in
How has the global marketplace used emerging technologies to expand businesses
madam [21]

Answer:

Information Technology (IT) has revolutionized the way organizations conduct business by enabling small and medium businesses to level the playing field with larger organizations. Small businesses use an array of technology based on everything from computer server stations to portable mobile devices to expand competitive advantages in the global economic marketplace and marketing environment. So, small & medium business organizations owners are considering implementing information technology (IT) in their planning process for streamlined integration. Thus, this process is leading to future business expansion locally as well as globally. This decision allows proprietors to create smooth business operations using the most effective information technology available. On the other hand, the Internet has further linked the overseas suppliers of goods and services and their buyers. During the e-commerce era, internet traffic is increasing day by day, and e-commerce business is in the hyper growth stage. Information technology tremendously helps to boost the expansion of the current and future of marketing environment; communication technology became faster than ever. Though, globalization creates a little challenge for multinational companies to share resources and knowledge across a number of businesses inside and outside the country. Outsourcing and freelancer ease this challenge because multinational companies recruit talent freelancers and outsource their projects to the highly expert vendors and then the works are done through the team of people very effectively and efficiently.

Explanation:

6 0
2 years ago
If i tell you my email will you give me a joke
pentagon [3]

Answer:

i don't want ur email but here's a joke more like a riddle: I speak without a mouth and hear without ears. I have no body, but I come alive with wind. What am I?

answer an echo

Explanation:

5 0
2 years ago
What happens? In word 2016 when the home ribbon tab is clicked on ?
RideAnS [48]

When you clicked on the ribbon tab in word 2016, you'd be brought to the home tab, where all of the basic controls are displaced for you to see.

Hope I could help! :)

5 0
3 years ago
Read 2 more answers
An important principle in information security is the concept of layers of security, which is often referred to as layered secur
Eva8 [605]

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

5 0
2 years ago
Which presentation guideline helps people with vision disabilities?
Alina [70]
Providing audio with images
4 0
3 years ago
Read 2 more answers
Other questions:
  • which of the following is involved in ordering an outline. A.grouping B.merging C.organizing D.arranging
    10·1 answer
  • A result of the Gibbons v. Ogden (1824) decision was that states​
    11·1 answer
  • Do routers have ip addresses? if so, how many?
    10·1 answer
  • On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance
    10·1 answer
  • A red wavy line under a word means _____. a change has been made in the text a new word was inserted in the document there is a
    11·2 answers
  • The Internet acts as a(n) blank services such as The World Wide Web and email
    6·2 answers
  • Tom teaches in a high school. He wishes to sort a spreadsheet containing students' marks in various subjects by descending order
    14·1 answer
  • Which storage is faster than secondary storage​
    14·2 answers
  • The Power of If Worksheet
    13·2 answers
  • Where can i make a 3d animation for free ( pls don't trick me)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!