1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
3 years ago
9

Lawanda starts a new job today at a company that delivers thousands of packages each day. Identify three ways in which Lawanda's

computer skills could be used on her first day.
Computers and Technology
1 answer:
jek_recluse [69]3 years ago
7 0

Answer:

use your own opinion

Explanation:

You might be interested in
Special keys that allow you to use the computer to perform specific functions
Pavel [41]

Answer:

Examples are Ctrl, Alt, Fn, Alt Gr, Shift, Caps Lock, Tab, Scroll Lock, Num lock, Esc, Windows Key, Backspace, Enter...

8 0
3 years ago
Define
3241004551 [841]

Computational thinking- the thought processes involved in formulating a problem and expressing its solution(s) in such a way that a computer—human or machine—can effectively carry out. Computational Thinking is an iterative process based on three stages.

Problem solving process- The process of working through details of a problem to reach a solution. Problem solving may include mathematical or systematic operations and can be a gauge of an individual's critical thinking skills.

Data- facts and statistics collected together for reference or analysis.

Information- facts provided or learned about something or someone.

Algorithm- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

Aggregate data- aggregate data are data combined from several measurements. When data are aggregated, groups of observations are replaced with summary statistics based on those observations. In a data warehouse, the use of aggregate data dramatically reduces the time to query large sets of data.

Discovery Data- in the context of IT, is the process of extracting actionable patterns from data. The extraction is generally performed by humans or, in certain cases, by artificial intelligence systems.



3 0
3 years ago
Which best describes IMEI?
Delicious77 [7]

Answer:

A unique identifier for a mobile phone

Explanation:

There are different codes and tracking number assigned to different devices such as laptop, mobiles and other devices. The purpose of this task is to make sure the security of device in all aspects. The tracking number that is used to track mobile phone is named as IMEI that stands for International Mobile Equipment Identity.

IMEI is the the unique identity of mobile phone device that consists of 15 digits. It is the unique number that is assigned to phones.

8 0
3 years ago
Write a short note on "History of WWW" (word limit = 100-150 words)​
mihalych1998 [28]

Explanation:

it looks like there aren't many great matches for your search

Tip Try using words that might appear on the page that you’re looking for. For example, 'cake recipes' instead of 'how to make a cake'.

I hope you help

4 0
2 years ago
Read 2 more answers
What is a benefit of using client/server network?
ANTONII [103]

The answer is centralization

A client-server network is a server which acts as one powerful computer that provides information to other sub-ordinate workstations called the client. The biggest benefit of this setup is centralization or the central management of the server. Only a single server functions as a host that all clients request and use. Having a single centrally managed server is cost effective and is easily manageable. This centralized control can also be used to deploy processes, allocate user resources and delegate access permissions easily and effectively.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Declare a character variable letterStart. Write a statement to read a letter from the user into letterStart, followed by stateme
    12·1 answer
  • How can you achieve an effect like that shown in the image
    6·2 answers
  • If your laptop is not able to connect to your wireless network, which of the following might be a likely cause of the problem?
    11·2 answers
  • 3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
    7·1 answer
  • On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control
    5·1 answer
  • One of the most common encryption protocols in use today. It is an asymmetric protocol that enables the sharing of a secret key
    7·1 answer
  • Cash cows are always in
    7·1 answer
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    5·1 answer
  • ....is an act of introducing an invention into market on business basis for profit​
    12·1 answer
  • Write a FOR loop that displays the following numbers exactly like this (you must use a loop):
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!