1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
3 years ago
8

Conceptual note-taking is the act of writing down information in the order it is given. drawing attention to details with a mark

er or pen. adding main ideas and details to a graphic organizer. creating lists to organize homework and study time.
Computers and Technology
2 answers:
melisa1 [442]3 years ago
6 0

Answer:

What the guy said above

Explanation:

its right

Dvinal [7]3 years ago
4 0

Answer:A

Explanation:Conceptual notetaking is the act of writing down information in the order it is given.

You might be interested in
The traditional role of a manager is that of a(n):__________ a. encoder. b. sensegiver. c. communication champion. d. informatio
GREYUIT [131]

The traditional role of a manager is that of a(n):<u> information processor.</u>

<u></u>

<h3>What is called as information processing?</h3>

information processing , the acquisition, recording, organization, retrieval, display, and dissemination of information. In recent years, the term has often been applied to computer-based operations specifically. information processing.

<h3>What is information processing in computer?</h3>

Information processing refers to the manipulation of digitized information by computers and other digital electronic equipment, known collectively as information technology (IT). Information processing systems include business software, operating systems, computers, networks and mainframes.

To learn more about Information processing , refer

brainly.com/question/6392847

#SPJ4

7 0
2 years ago
To store non-duplicated objects in the order in which they are inserted, use:______
Umnica [9.8K]

Answer:

b. LinkedHashSet

Explanation:

A LinkedHashSet is an ordered version of HashSet that maintains a doubly-linked List across all elements. When the iteration order is needed to be maintained this class is used. LinkedHashSet maintains a linked list of the entries in the set, in the order in which they were inserted.

4 0
4 years ago
Write a while loop that lets the user enter a number. The number should be multiplied by 10, and the result assigned to a variab
pentagon [3]

Answer:

#include <stdio.h> // header file inclusion

int main() // main function declaration

{

    int number,product=0; // variable declaration

    while(product<100) // while loop

   {

       scanf("%d",&number); // input a number

       product= number*10; // multiply the number by product

       printf("%d\n",product); // print the value of product

   }

 return 0; // return statement

}

Output:

  • If the user enter 10 then the loop terminates for the first time and the output is 100.
  • If the user enter 5,10 then the loop executes in 2 times and the output is 50 and 100.

Explanation:

  • Firstly there is an inclusion of header file which understands the meaning of printf() and scanf() function.
  • Then there is the main() function definition
  • Then we declare a two-variable (number and product) of integer type.
  • Then we define a while loop and check the condition that product value is less than 100 or not.
  • Then we take input and multiply by 10.
  • Then we assign the value in the product and print the product value.
6 0
3 years ago
An organization is trying to decide which type of access control is most appropriate for the network. The current access control
alisha [4.7K]

Answer: D.) Discretionary access control

Explanation: Access control modes provides networks with a security system used for moderating, risk prevention and privacy maintainance of data and computing systems. Several access control modes exists depending on the degree of control required. In the discretionary access control approach, users are afforded the freedom and flexibility of making choices regarding permissions granted to programs. Hence, in this mode, permission are user-defined and as such sets privileges based on how the user deems fit.

8 0
3 years ago
About computer in manufacturing​
Karolina [17]


Computer-integrated manufacturing is the manufacturing approach of using computers to control the entire production process


7 0
3 years ago
Other questions:
  • Max magnitude Write a method maxMagnitude() with two integer input parameters that returns the largest magnitude value. Use the
    13·1 answer
  • The default primary key for an access database is the id field true or falser
    7·1 answer
  • Digital art is created by using __?
    5·1 answer
  • Money from a Coverdell Education Savings Account can be used for:
    11·1 answer
  • Computers can think for themselves<br><br> True<br><br> False
    6·2 answers
  • It is necessary tto save updates often when working in google docs? True or false
    11·2 answers
  • Congress are smart becuase.....
    11·1 answer
  • A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless connectivity.
    6·1 answer
  • Which statement best describes network security?
    7·1 answer
  • Select the correct answer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!