1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PtichkaEL [24]
3 years ago
15

Focusing on the general characteristics of a problem or object, while ignoring the details, is a technique called

Computers and Technology
1 answer:
Taya2010 [7]3 years ago
5 0

Answer:

Abstraction

Explanation:

In computer science, abstraction has a similar definition. It is a simplified version of something technical, such as a function or an object in a program. The goal of "abstracting" data is to reduce complexity by removing unnecessary information. At some level, we all think of computers in abstract terms.

You might be interested in
Assume that speed = 10 and miles = 5. What is the value of each of the
Assoli18 [71]

a. speed + 12 - miles * 2  = 10 + 12 - 5 * 2. With order of operations, we do the multiplication first so the equation is now 10 + 12 - 10 = 22 - 10 = 12

b. speed + miles * 3  = 10 + 5 * 3 and again, order of operations gives us 10 + 15 = 25

c. (speed + miles) * 3  = (10 + 5) * 3 = 15 * 3 = 45

d. speed + speed * miles + miles  = 10 + 10 * 5 + 5 = 10 + 50 + 5 = 60 + 5 = 65

e. (10 – speed) + miles / miles = (10 - 10) + 5 / 5 = 0 + 5 / 5 = 5 / 5 = 1

5 0
4 years ago
Did batman die in endgame? I dont have enough money to see the movie can you tell me what happens. It said batman died from some
kotykmax [81]

Answer: The Marvel batman, otherwise known as Iron Man did.

Explanation: Movie was pretty good.

5 0
3 years ago
An engineer plans to acquire data from a disk. The disk is connected to the forensics workstation and is ready for the engineer.
aksik [14]

The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

<h3>Is non-repudiation an aspect of integrity?</h3>

In general, nonrepudiation is known to be a term that puts together or combines authentication and integrity.

Note that Nonrepudiation is said to be a key or one of the pillars that pertains to information assurance.

The integrity in cyber security is known to be the act of keeping safe against any form of an improper information modification or destruction.

Hence, The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

Learn more about acquisition from

brainly.com/question/11412887

#SPJ1

8 0
2 years ago
You have repaired a broken LCD panel in a laptop computer. However, when you disassembled the laptop, you bent the hinge on the
Romashka-Z-Leto [24]

Answer:

Listen carefully to the customer and avoid getting defensive or even offensive.

Explanation:

The customer have every right to be angry since he might be ignorant of the work done and only act base on what he sees. In this scenario you need to listen carefully to his complain avoid been defensive and also avoid getting him/her more angry by been offensive. after he has laid out his complain you can then go ahead to explain why it is necessary to bend the hinge on the lid.

5 0
3 years ago
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
Hoochie [10]

Answer:

I suggest a core !3

Explanation:

Its pretty good for beginners

3 0
3 years ago
Other questions:
  • David needs to create a password. He uses "rtjjkliusfvwr." Which of the following best explains the weakness in his password?
    9·2 answers
  • Gunther is filling in his own input mask. He wants to format the Social Security numbers of his clients. The field must contain
    7·1 answer
  • What does the "e" in eSATA stand for?
    13·2 answers
  • Which of the follow represents a form of disruptive technology? Tend to open new markets and destroy old ones A new way of doing
    11·1 answer
  • When you're working with a word processing document and you press the del key, what happens?
    5·1 answer
  • A company has a number of employees. The attributes of EMPLOYEE include Employee ID (identifier), Name, Address, and Birthdate.
    11·1 answer
  • Both instructions and data in a digital<br>computer are represented as binary<br>digits. True False​
    13·1 answer
  • Need to know? Anyone feel like helping me not fail
    13·1 answer
  • If I bought mine craft p.e. for 7.99 and hook my Micro soft account up, will i get java edition
    11·1 answer
  • If you schedule a message to be delivered at 6 p.m., but you log out of your computer at 5 p.m., what will happen to the message
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!