1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stella [2.4K]
3 years ago
5

A student is having trouble finding enough time in his busy schedule to work on his school science project. He has a demanding s

chedule after school working at a job and taking music lessons. When he starts his homework in the evenings, he often falls asleep at his desk.
----------------------------------------------------------------------------------------------------------------------------

What is the first step the student should take to resolve his problem?

A: He can ask to work in a group for the project.

B:He can think creatively about the project.

C: He can create a study-time survey.

D:He can make a contract for the project.\
Computers and Technology
2 answers:
tatuchka [14]3 years ago
6 0

Answer:

The answer is C. He can create a study-time survey.

Explanation:

Katena32 [7]3 years ago
3 0

Answer:c

Explanation:

got it rii

You might be interested in
Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?
laila [671]

Answer:

c. Full Sandbox

d. Partial Sandbox

e. Developer Pro

Explanation:

Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?

a. Test Sandbox

c. Test Sandbox

c. Full Sandbox

d. Partial Sandbox

e. Developer Pro

From the question, we are informed that Universal Containers wants to use a sandbox with real data in it. In this case I will recommend Full Sandbox, Partial Sandbox and Developer Pro.

Sandboxes. In cybersecurity sandbox can be explained as security mechanism that is utilized to separate running programs, and this is an effort utilized to curb system failure as well as software vulnerabilities to disperse.

Sandboxes are crucial when executing suspicious code, it helps to do this so that the host device is is not put to risk of harm. Since, Containers wants to use a sandbox with real data in it then the three types of sandboxes can be use.

✓Full sandboxes allows performance testing as well as staging it can be regarded as copy of production org, and these can be objects attachment and others

✓Partial Copy Sandbox can be allows copying of configuration and part of one's data, in order to allow new configuration testing with one's real data.

5 0
3 years ago
Connection-oriented protocols protect against dropped data by forming connections and using what type of constant stream?
nataly862011 [7]

Answer:

A real constany

Explanation:

5 0
3 years ago
Danielle is analyzing logs and baselines of the systems and services that she is responsible for in her organization. She wants
GalinKa [24]

Answer:

b. Machine learning

Explanation:

The technique that is being described in this situation is known as Machine Learning. This is a fairly new technology that has become popular over the last decade. Machine learning uses artificial intelligence to analyze data and learn from it. Every time the system analyzes the data it learns something new, saves it, and implements it to its processes. Therefore, the more times it repeats the more it learns. These systems are continuously getting better and learning more, which makes them incredibly efficient.

5 0
3 years ago
Smartphones can have virtual keyboards or physical keyboards. What are 3 advantages and disadvantages to each one?
masha68 [24]
Advantages to virtual keyboards:
- You have easy shortcuts
- Cooler emojis <span>
- And we have google voice (or Siri) with a click of a key
Disadvantages to a virtual keyboard: 
- It is very easy to send something you don't want to send by     
     accidentally touching the send button
-  It is harder for people with big hands to use
-  </span>typing speed will likely be negatively impacted on a virtual keyboard<span>.
</span>
Advantages to using a physical keyboard:
- <span> The keyboard takes up no space on the front panel or on the display area.
</span>- <span>you are making use of muscle memory, which increases your speed
</span>- Typing on a touchscreen requires an on-screen keyboard, which lacks the tactile response of a real keyboard.

Disadvantages to using a physical keyboard:
- <span>For the average consumer, phones with a physical keyboard are a bit bulkier.</span>
- Most phones with a physical keyboard have to be designed a certain way to minimize space and increase efficiency.
- I<span>t is a slow method when you need to write a long piece of writing when there are faster ways such as scanning and dictation</span>
5 0
3 years ago
A computer never gets tired or bored while working for a long time .. ​
Angelina_Jolie [31]

Answer :Computers never get tired or bored because of doing the same task continuously. They work in the same manner all the time. A computer can store large amount of information in its memory.

Explanation: it is quality which makes the user to be dependent on computer. As we all know, computer systems do repetitive tasks without any boredom, tiredness, or fatigue.

5 0
3 years ago
Other questions:
  • Artists who draw images on a computer often use a stylus in conjunction with special _________ tablets, which offer extra-sensit
    15·1 answer
  • WILL MARK BRAILIEST IF ANSWERED FAST!!!
    8·1 answer
  • Given non-negative integers x and n, x taken to the nth power can be defined as: x to the 0th power is 1 x to the nth power can
    7·1 answer
  • Advantages of a personal area network
    5·1 answer
  • Which business filing process puts documents or data in the order by date? a. Linear
    7·1 answer
  • Assume that name and age have been declared suitably for storing names (like "Abdullah", "Alexandra" and "Zoe") and ages respect
    8·1 answer
  • Computers are often referred to as _____.
    15·1 answer
  • After correctly configuring a new wireless enabled thermostat to control the temperature of the company's meeting room, Joe, a n
    6·1 answer
  • Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability o
    6·1 answer
  • In Microsoft word you can access the blank command from the mini toolbar
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!