1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
3 years ago
14

Quiz 6.8 Lesson Practice

Computers and Technology
2 answers:
marta [7]3 years ago
7 0

Answer:

Where is the question?

Explanation:

Zinaida [17]3 years ago
3 0
I’m confused on your exact question
You might be interested in
An experimenter discovers that the time for people to detect a string of letters on a computer screen is 400 milliseconds, and t
nadya68 [22]

Answer:

The correct answer to the following question will be Option D (Subtractive method ).

Explanation:

  • This approach essentially requests a participant to construct two activities that are already in almost every way similar, except for a mental process that is assumed to also be included in any of the activities although omitted in another.
  • This method will be much more valuable when deciding the period for phonemic awareness, despite text-string identification.

The other three options are not related to the given scenario. So that Option D is the right answer.

3 0
3 years ago
Waht is the difference between authorization and access control? Access control specifies what a user can do, and authorization
spayn [35]
<h2>Answer:</h2>

Authorization specifies what a user can do, and access control enforces what a user can do.

<h2>Explanation:</h2>

Authorization is simply granting access to an authenticated user of an application. It specifies what a user can and/or cannot do. For example, for a user to access their banking details in an online banking service, they have to be authorized by first authenticating them to prove their identity. Another example is in an organizational system where some users (normally called admins) can access certain database info whereas some other users (normally called the regular users) cannot.

Access control is used to enforce the policies dictated by authorization. In other words, access control enforces the policy of what a user can and/or cannot do. Access control makes authorization possible. It is sometimes called privileges or permissions. For example, the <em>security tab </em>in the operating system of Windows, allow to set access privileges for certain files and/or folders. Another example is in an organizational system where some files on the organization's server are configured in such a way that access to it is restricted and dependent on some further authorization.

5 0
3 years ago
Read 2 more answers
Is there a link between the fields of multimedia and animation?
PtichkaEL [24]
They're (Almost) the same thing, Silly!
4 0
3 years ago
You'll apply the concepts of Lesson 1 to create pseudocode and a flowchart for a modular program. The body mass index (BMI) is o
Kobotan [32]

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

  1. //Ask user for height & weight//
  2. "Enter weight (in pounds):"
  3. "Enter height (in inches"
  4. //Calculate the person's (BMI)//
  5. "BMI = weight * (703 / pow(height, 2));"
  6. //Display the person's (BMI)//

<h3>What is a flowchart?</h3>

A flowchart is also referred to as flow diagram and it can be defined as a graphical representation of an algorithm for a work process or workflow.

<h3>What is a pseudocode?</h3>

A pseudocode can be defined as a description of the steps contained in an algorithm, especially through the use of a plain (natural) language.

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

  1. //Ask user for height & weight//
  2. "Enter weight (in pounds):"
  3. "Enter height (in inches"
  4. //Calculate the person's (BMI)//
  5. "BMI = weight * (703 / pow(height, 2));"
  6. //Display the person's (BMI)//

Read more on pseudocode here: brainly.com/question/13208346

#SPJ1

8 0
2 years ago
In a formal business document, a Works Cited list usually appears
kompoz [17]

Answer:

Cited work list is usually appears <u>at the end</u> of the document.

Explanation:

In formal documents, the work from other authors and document has been used to validate our work. we explain their work in our document and with the support of that t work we tries to validate the work that we are doing. This work is written in our document that is called cited work or reference. Each of the cited work is written in different paragraphs and assigned a number at the end of citation in ascending order.

At the end of the document, we quote the document reference where it has been published online in same order as in document. This list of cited works is appears at the end of the document called references and Bibliography.

6 0
3 years ago
Read 2 more answers
Other questions:
  • You use the _____ sheet in the format cells dialog box to position data in a cell by centering it, for example.​
    8·1 answer
  • True or false: when considering data backups, it is most important to verify that the integrity of the backup file or data is va
    9·1 answer
  • What is the name of the program file that you can enter in the Windows search or Run box to execute Event Viewer? What process i
    12·1 answer
  • You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You ch
    13·1 answer
  • Which of the following is not a valid SQL command? (Points : 2) UPDATE acctmanager SET amedate = SYSDATE WHERE amid = 'J500';
    11·1 answer
  • Which of the following are the lines defining the borders of a shape? (1 point)
    12·1 answer
  • Which of the following is NOT areserved word in Java?intpublicstaticnum
    9·1 answer
  • In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow
    9·1 answer
  • Which part of a computer is responsible for executing the software programs?
    10·1 answer
  • Why might you want to save a downloaded file to your computer first instead of running it immediately?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!