1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
13

Explicar de qué se ocupa la Administración.

Computers and Technology
1 answer:
nevsk [136]3 years ago
6 0

Answer: nani

Explanation:

You might be interested in
Lonnie has several workbooks that contain financial and sales data. He needs to ensure that if the data in a single cell in one
Rzqust [24]

Answer: Linked cell

Explanation: I just did a test

7 0
3 years ago
Which statement best describes the logic in a while loop?bringing an umbrella to determine if it is rainingbringing an umbrella
Murljashka [212]

Answer:

B. If it is raining, bring an umbrella regardless.

Explanation:

Here is the code syntax:

<em>while </em>_ = <em>true</em>

<em> print</em>(rain)

In short words, this syntax is basically saying while a condition is true, do this. "This", is the function run under the true condition. For while loops to work, at least one condition of anything must be true.

  1. Hope this helps!
  2. If that's the case, please give thanks!

5 0
2 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
2) A language that changes code to machine-readable code one command at a time is known as what
iogann1982 [59]

Answer:

2) Interpreted programming languages (e.g. Python, Perl)

3) In computer science, the syntax of a computer language is the set of rules that defines the combinations of symbols that are considered to be correctly structured statements or expressions in that language. That means that the each programing language has its own specific rules.

4) Pseudocode

5) Cryptographic coding, examples: The Caesar shift, Kryptos

5 0
3 years ago
Put the steps you would use to insert and label an endnote in order.
Sholpan [36]

Answer:

2nd- step 1, 3rd- step 2, 1st- step 3, 4th- step 4

Explanation:

1. locate the reference tab

2. click the insert endnote option

3. type your endnote label

4. type the text you want the endnote to follow

3 0
3 years ago
Other questions:
  • True or False? When shooting OTS shots of two actors / subjects speaking to each other, it is best to place the camera(s) over t
    10·1 answer
  • How do i know if i got flash installed onchrome
    5·1 answer
  • The Microsoft Developer Network is an example of a software development company. software development marketplace. developer for
    5·1 answer
  • Which of the following best supports the utilization of environmental engineers on a civil engineering hydraulic project?
    13·1 answer
  • Your Windows PC has an AMD processor installed that includes AMD-V technology and the motherboard fully supports this processor.
    12·1 answer
  • What has happened (or is still happening) to make this speech occur? armageddon
    15·1 answer
  • When adopting and implementing a Software as a Service (SaaS) platform such as Salesforce for your business, which responsibilit
    7·1 answer
  • Why do we need on output device?​
    11·2 answers
  • Please help me asapppp!​
    8·2 answers
  • Information should be________to ensure more than one source provides the same factual information. a. repeated c. cross-lined b.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!