1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darina [25.2K]
3 years ago
15

20. The following are considered as ICT skills EXCEPT

Computers and Technology
1 answer:
kykrilka [37]3 years ago
3 0

Answer:

b

Explanation:

You might be interested in
Suppose that a queue is implemented using a circular array of size 12. What is the value of last after the following operations?
otez555 [7]

Answer:

10

Explanation:

An enqueue operation is a function that adds an element(value) to a queue array. A dequeue operations removes an element from a queue array. Queue arrays follow a first-in-first-out approach, so elements that are first stored in the queue are removed/accessed first(enqueue operations add elements at the rear of the queue array).

The following operations leave 10 elements in the queue of array size 12 after its done:

10 enqueue operations= adds 10 elements

5 dequeue operations= removes 5 elements( 5 elements left in queue)

6 enqueue operations= adds 6 elements(11 elements in queue)

10 dequeue operations= removes 10 elements(1 element left in queue)

8 enqueue operations= adds 8 elements(9 elements in queue)

2 dequeue operations= removes 2 elements(7 elements left in queue)

3 enqueue operations= adds 3 elements(10 elements in queue)

Therefore there are 10 elements in the queue after enqueue and dequeue operations.

8 0
3 years ago
Alice is adding a chart in a spreadsheet. Which option will allow her to give the chart a suitable title and subtitle?
jek_recluse [69]
It's D.Chart elements 
6 0
3 years ago
Read 2 more answers
Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.
frez [133]

Answer:

The answer is below

Explanation:

The major procedures that investigators must use to collect network trace evidence of computer-related crimes include the following:

1. Establish appropriate guidelines to follow: before starting the actual investigation, all the legal procedures and instructions to follow must be clearly stated and shown to everybody involved in the investigation process.

2. Assess the Evidence: the investigators must assess all the available evidence by checking the computer through a specific means. The assessment includes checking of hard drives, email accounts, social networking sites, or similar digital prints that can be used as proof of the criminal activities

3. Acquire the Evidence: here the investigators must find an appropriate means of gathering the evidence formally and legally. This may involve the removal of any form of hardware such as hard drives, and software-related items that can be extracted.

4. Examine the Evidence: this involved examination of the acquired evidence, to determine if it can be used as proof or not. This involved analyzing the evidence to check if they correlate with the criminal activities under investigation. Some of the things to check include, date of formation of the evidence, the names attached to it, the routes those data were sent or received from, etc.

5. Prepare a report and document them appropriately: this involved the proper detailing and recording of the information derived from the evidence. It includes the time of evidence examination and methods used in examining them. Also, the means at which they acquired the evidence among others.

8 0
3 years ago
Within the Chart Design tab, which section is used to change the data of a previously created chart?
Liula [17]
A. Edit Data because if you want to change something you can edit and rewrite it.
6 0
3 years ago
Write a while loop that prints user_num divided by 2 until user_num is less than 1. The value of user_num changes inside of the
rewona [7]

Answer:

user_num >= 1

while true do

print "user_num/2"

Explanation:

First, you write that the user_num is equal to or is greater than 1. Then you write in the while loop that while that's true, print user_num divided by two.

6 0
2 years ago
Other questions:
  • Is a set of standards that define how email is to be processed between mail servers is exactly the same as smtp copies an e-mail
    10·1 answer
  • Which option is used to apply formatting to multiple objects on a single slide while still maintaining the ability to manage the
    14·2 answers
  • There are generally two ways of implementing dynamic programming solutions to problems, which have equal asymptotic time complex
    13·1 answer
  • Select the TRUE statement from those listed below. (Select 1)(1pts) Question 11 - Select the TRUE statement from those listed be
    14·1 answer
  • Is phone data used when connected to wifi
    12·1 answer
  • You need to implement a web application that is split in three parts, namely, Webpage, PHP and MySQL. Each of them will be used
    13·1 answer
  • Hello<br> mini crewmate :) ඞ
    12·2 answers
  • In which genre of games do players most often have the power to shape how the story will end?
    12·2 answers
  • In remote areas,your gps device may lose reception. its good idea to have a
    13·1 answer
  • Technology is defined as human ________________ in action that involves the generation of knowledge and processes to develop sys
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!