1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
3 years ago
11

A. Learning Situation 1:

Computers and Technology
1 answer:
pentagon [3]3 years ago
3 0

Answer:

See Explanation

Explanation:

Integer literary means numbers (whether positive or negative) without decimal points. Using that logic, we'll answer the question.

1:  {..., -4, -3, -2, -1, 0, 1, 2, 3, 4, ...}, is a set of integer because none of them have decimal points.

2. (-2) + 5 =

(-2) + 5 = -2 + 5 = 3

a. Is -2 an integer? Yes

b. ls 5 an integer? Yes

c. is the sum of -2 and 5 also an integer?​ Yes, the sum is 3

You might be interested in
When measuring processor speed,a megahertz is much faster than a gigahertz.true or fals
Nat2105 [25]

Answer: False

Explanation:

The statement in the question is wrong. When measuring processor speed, a megahertz is slower than a gigahertz.

We should note that:

1 megahertz = 1 million cycles per second

1 gigahertz = 1 billion cycles per second.

Therefore, we can see that a gigahertz is faster than a megahertz.

4 0
3 years ago
Block elements start a new line when rendering? (true or false)
bekas [8.4K]

Answer:true

Explanation:

3 0
3 years ago
There are a number of classifications that can be applied to security controls.
kodGreya [7K]

Answer:

Preventive control is not a classification that can be applied to security controls.

Explanation:

At the most basic level, we should protect resources and assets that are of value to an organization by mitigating the risk to those assets and resources. Security controls include any type of policy, technique, procedure, or solution that help mitigate risks. There are models that define security control objectives and are classified by control type and by function

By Control Type

  1. Physical control: Anything that can be touched and can be used to detect and prevent unauthorized access from adversaries and threat actors. Examples include CCTV, electric fences, Biometrics
  2. Technical controls: Examples include firewalls, AMSI solutions, IDSs and IPSs that help protect an organization’s resources and assets. They can be both hardware and software solutions.
  3. Administrative controls: These are the overall design of the protocols or guidelines that define business needs based upon the organization’s security goals that help implement a secure environment. Things like staff awareness and training are among the examples of administrative controls.

Learn more about Security Control classification

brainly.com/question/13239384

brainly.com/question/14409331

#LearnWithBrainly

5 0
4 years ago
What is the simplest way to permanently get rid of an unwanted file? A. Cancel the file. B. Go to the Start menu and then delete
Morgarella [4.7K]
Go to the Start menu and then delete the file <span>is the simplest way to permanently get rid of an unwanted file</span>
5 0
4 years ago
Which of the following is a way to prevent wastes from contaminating the environment? A) Use absorbent pads to collect floor was
Firlakuza [10]

Answer

Dispose of absorbents as hazardous waste in its own hazardous waste container

Explanation

Hazardous waste is a waste that has chemical composition and properties which makes it capable of causing illness, death  or harm to humans and other life forms when released to the environment without proper management. The characteristics of such wastes include: toxic, ecotoxic, infectious substance, poisonous, explosive and flammability. Hazardous wastes can be destroyed by incineration, chemical process, and temporary on-site waste storage facilities such as waste piles and lagoons/ponds



8 0
4 years ago
Read 2 more answers
Other questions:
  • In today's society, unethical actions are: A) Easier than ever to get away with, because the general public and insurers are les
    13·2 answers
  • Which of the following courses would an aspiring film composer most likely take?
    12·2 answers
  • Liz will use a CD-R compact disk to write to more than once. Carlo will use a CD-RW compact disk to write to more than once. Who
    8·1 answer
  • To specify AutoCorrect rules and exceptions to the rules, click File to open the Backstage view, click ____ , and then click Pro
    6·1 answer
  • Which of the following statements is true of content management systems?
    11·1 answer
  • 2.20 Write an expression involving a three-letter string s that evaluates to a string whose characters are the characters of s i
    6·1 answer
  • CSCU EXAM TEST FINAL1-A software or hardware that checks information coming from the Internet and depending on the applied confi
    6·1 answer
  • A. Fill in the blanks:
    6·1 answer
  • Example of vector image format​
    12·1 answer
  • Write a function named swapFrontBack that takes as input a vector of integers. The function should swap the first element in the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!