1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
7

Quais os jogos mais vivenciados ?

Computers and Technology
1 answer:
DENIUS [597]3 years ago
3 0

Answer:

Ni se q mierda escribi

Olá

Obrigado pelos pontos :)

Explanation:

You might be interested in
identify at least three additional ethical responsibilities expected from a computer professional. In brief, explain each respon
kompoz [17]

The ethical responsibilities for computer professionals are:

Respect Confidentiality.

Maintain professional competence.

Respects and protection of personal privacy.

Explanation:

  • Computer professionals are expected to conduct themselves in an ethical manner.
  • Codes of ethics exist in this field to help these professionals make good decisions about the manner of their professional work.
  • A computer professional must strive to provide the highest quality of work possible by acquiring and maintaining professional competence. He should be knowledgeable in the laws pertaining to his profession and not violate them.
  1. Respect Confidentiality : Confidentiality refers to protecting information from being accessed by unauthorized parties. Only the people who are authorized to do so can gain access to sensitive data. All the security incidents reported in the media today involve major losses of confidentiality.
  2. Maintain professional competence : The capability to perform the duties of one's profession generally, or to perform a particular professional task, with skill of an acceptable quality. Maintaining professional competence allows individuals to learn throughout their career, to develop technical skills, and to keep pace with accountancy changes.
  3. Respects and protection of personal privacy : Privacy computing includes all computing operations by information owners, collectors, publishers, and users during the entire life-cycle of private information, from data generation, sensing, publishing, and dissemination, to data storage, processing, usage, and destruction.

8 0
4 years ago
What should you do first when designing a program?
Nady [450]

Answer: talk about da progrm

Explanation:

6 0
3 years ago
Read 2 more answers
In what way, if any, is a model different from a simulation?
madam [21]

Answer:

Models and Simulations are completely different in that they achieve diffenet results.

Explanation:

Modeling is the act of building a model. A simulation is the process of using a model to study the behavior and performance of an actual or theoretical system. In a simulation, models can be used to study existing or proposed characteristics of a system. ... Simulating is the act of using a model for a simulation.

6 0
3 years ago
nadine is the systems administrator for a network with a single subnet. The subnet uses 192.168.1.0 with a mask of 255.255.255.0
weeeeeb [17]

Answer:

Authorize Srv11

Explanation:

In order to fix this problem, Nadine should Authorize Srv11. The problem is most likely being caused due to failure of authorization of the server. This would prevent this server from being on the same scope as Srv1 and therefore, it is why the IPaddress being given is different. DHCP is an automatic protocol and would not be able to provide an IP address in the same scope if the server is not Authorized to do so.

3 0
3 years ago
What is the process or technique of "making something that allows" human beings to share their knowledge, perform a task, or ful
Mashcka [7]

Answer:Technology

Explanation: it can be define as process or technique of making something that allows human beings to share their knowledge, perform a task or fulfill a function

-tool or invention that, once created and used, is intended to solve a problem or improve on past understandings of how to do something.

7 0
3 years ago
Other questions:
  • A computer emergency response team is called at midnight to investigate a case in which a mail server was restarted. After an in
    8·1 answer
  • You copy several files from one folder to another folder within the same drive. what permissions do the files in the destination
    14·1 answer
  • Answer the following questions:
    7·1 answer
  • A bakery collects data on sales. Each sales record includes the date of the sale and some metadata about the items that were par
    11·1 answer
  • Related to Image Classification
    13·1 answer
  • An internet layer is a quantity of data that is transmitted on a netowrk without concern for whether it is accurate or whether i
    5·1 answer
  • Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3,
    10·1 answer
  • An employee is working on building a new computer application for a friend. For this purpose, he uses the software that is regis
    5·1 answer
  • What data type is this statement defined as in Python?
    13·1 answer
  • Suppose that​ 30% of the female students and​ 40% of the male students in a college history class are from a major city. If ther
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!