1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Usimov [2.4K]
3 years ago
11

What is the name of tool

Computers and Technology
1 answer:
AlexFokin [52]3 years ago
8 0

Answer:

bro the pic is hazy

Explanation:

but it is looking like octagon

hope it helps you

please mark me as brainlist

You might be interested in
Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and the categorie
inessss [21]

Answer:

1 – Paul will be able to READ the document classified (SECRET, {B,C}) (No read up, no write down!)

2 – Anna will not be able to access the document since she is not in the category-set

3 – Jesse will be able to READ the document classified (CONFIDENTIAL, {C}) (No read up, no write down!)

4 – Sammi will be able to READ the document classified (confidential, {A}) (No read up, no write down!)

5 – Robin will be able to WRITE do this document, but not read it (No read up, no write down!)

Explanation:

1 – Paul will be able to READ the document classified (SECRET, {B,C}) (No read up, no write down!)

2 – Anna will not be able to access the document since she is not in the category-set

3 – Jesse will be able to READ the document classified (CONFIDENTIAL, {C}) (No read up, no write down!)

4 – Sammi will be able to READ the document classified (confidential, {A}) (No read up, no write down!)

5 – Robin will be able to WRITE do this document, but not read it (No read up, no write down!)

8 0
4 years ago
Consider what fact-finding techniques you would use to identify the important facts needed to develop a database system. Please
8090 [49]

Answer:

Examples of Fact-finding techniques includes:

  1. Prototyping
  2. Questionnaires
  3. Research and sites visit
  4. Interviews

Explanation:

It is important to note that a database system is a tool that allows users to define, create, maintain, and control access to a collection of logically related data and description of these data, designed to meet the information needs of an organization.

<u>Prototyping </u>

<em>Advantage:</em>  enables testing and understanding of the system in advance before final implementation of solution, while requiring less time for research.

<em>Disadvantage:</em> Training and Development cost consumes resources.

<u>Research and site visit </u>

<em>Advantage :</em> better time management if the problem has been researched upon before.

<em>Disadvantage:</em> appropriate permission is often needed before using research materials.

<u> Questionnaires </u>

<em>Advantage: </em>This technique is not expensive, and responses can be calculated and analysed quickly.

<em>Disadvantage:</em> There may be Incomplete answers received from users and body language of user cannot be observed.

<u>Interviews</u>

<em>Advantage:</em> The body language of interviewees is been perceived.

<em> Disadvantage: </em>Interviewing is time consuming and costly.

3 0
3 years ago
A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest ad
victus00 [196]

Answer:

The minimum number of bits necessary to address 8K words is 13.

Explanation:

You have the number of words to address that is 8000 words, a word is the smallest addressable memory unit.  

8000 words can be addressed with 2^{n}  units. Now you have to find the value of n that approximates to the number of words.  

2^2=4\\2^4=16\\2^7=128\\2^{10}=1024\\2^{12}=4096\\2^{13}=8192

So you can see that 13 bits are needed to address 8K words.

7 0
3 years ago
Does anyone know to hack personally
julsineya [31]

Answer:

I wish but just make an administrator account in your settings

Explanation:

8 0
3 years ago
Read 2 more answers
Write a function called count_types that returns a dictionary with keys that are Pokemon types and values that are the number of
Gnom [1K]

Answer:

Explanation:

The following code is written in Python. It creates a function called count_types which takes in three parameters. The pokemon in question, the data set, and a dictionary with all the pokemon types and values (Empty to start). Then it simply uses the built-in Python count feature to count the number of times that the Pokemon appears in the data set. Finally it saves that pokemon as a key and count as a value to the dictionary.

def count_types(pokemon, data, my_dict):

   count = data.count(pokemon)

   my_dict += {pokemon: count}

6 0
3 years ago
Other questions:
  • In a flow chart, both the decision structure and the repetition structure use the diamond symbol to represent the condition that
    9·1 answer
  • Object Oriented Programming (OOP) allows us to handle complex code in an organized structure and break down the problem by model
    5·1 answer
  • The most frequently applied heuristic in problem solving is a(an) _________, which involves repeated tests for differences betwe
    13·1 answer
  • What product category does the brand fit into?
    7·1 answer
  • A(n) ____ is an entry in a cell that contains text such as "2016 Sales" or "Travel Expenses."
    10·1 answer
  • 1.Can ICTs be innovatively used in the absence of minimum literacy levels among the poor?
    5·1 answer
  • Which terms means device that converts one voltage to another ?
    15·1 answer
  • Question 7 of 25
    10·1 answer
  • If a company saw an online photo of you playing basketball, it might try to sell
    5·1 answer
  • A start-up employs interns. The following details of interns are stored
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!