1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pachacha [2.7K]
3 years ago
13

Jack needs to create a technical drawing for a new tool.

Computers and Technology
2 answers:
kati45 [8]3 years ago
8 0

Answer:

so blueprints? jack needs to know the name and action of each part

Delicious77 [7]3 years ago
4 0

Answer:

Jack should send an e-mail out to all of their clients and BCC them on it (so that they don't have each others information) and distribute the information quickly. E-mail is one fastest ways to get information sent to a large amount of people at one time

You might be interested in
Can you think of a situation that might create a problem for a website’s security? What could a back-end developer do to prevent
Yuki888 [10]

A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Others are;

  • Lack of authentication in company security.
  • Access control-linked misconfigurations.
  • A Software misconfigurations.

<h3>What could a back-end developer do to prevent this situation from occurring?</h3>
  • Always Encrypt sensitive data:
  • Do not use weak encryption algorithm.

The back end in cyber security is know to be a sort of a kind of a repository of all that entails your web presence and also that of your mobile apps and it is one that makes it to run smoothly.

Hence, A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Learn more about website’s security from

brainly.com/question/10450768

#SPJ1

4 0
2 years ago
If a while loop iterates forever,what is the most likely cause?
miv72 [106K]

Answer:

Runtime error probably. The program won't make it past the while loop in the code.

5 0
2 years ago
Hannah weighs 210 pounds using the English System of measurement. If we convert her weight to the Metric System, she would weigh
tatyana61 [14]

Answer:

Check the explanation

Explanation:

C++ PROGRAM

#include <iostream>

using namespace std;

int main()

{

float pounds;

float kilograms;

cout<<"Please enter the weight in pounds :";

cin>>pounds;

kilograms=pounds*0.454;

cout<<"The weight in Kilogram is:"<<kilograms<<"kilograms";

return 0;

}

Kindly check the attached image below for the code output.

3 0
3 years ago
State and explain 5 importance of ICT in an organization​
gogolik [260]

Answer:

Explanation:

ICT simply refers to Information technology and it is the digital technologies used in various sectors to help economic agents make use of information.

The importance of ICT include:

1. Communication: ICT is vital for communicating in organizations as information are spread faster and employees have quicker access to information.

2. Marketing and Sales: ICT is vital for the marketing of products as products can be advertised on social medias etc.

3. Efficiency and effectiveness: There's efficiency and effectiveness on the part of the organization as the needs of the customers are attended to quickly.

4. Improvement in management decision: ICT is also vital in the enhancement of management decisions.

5. It is also vital is the storage of vital data's in the organization.

5 0
3 years ago
Decisions are individual and reflect the situations that are in your own personal life true or false
Nesterboy [21]
It is false because some decisions can effect other people as well
6 0
4 years ago
Read 2 more answers
Other questions:
  • What software is typically used for larger systems?
    11·1 answer
  • An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b)
    5·1 answer
  • A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s
    14·1 answer
  • A Chief Information Security Officer (CISO) needs to establish a KRI for a particular system. The system holds archives of contr
    13·1 answer
  • You want to save twenty of your vacation pictures on your computer. Which is the best place to save them?
    6·2 answers
  • The most common Unicode transformation formats are UTF- ______ and UTF-16.
    9·1 answer
  • What are the OSHA construction standards also called ?
    10·1 answer
  • 2. How do cell phone users stay connected to the network as users move between cells?
    10·1 answer
  • 8.10 quiz edhesive A swap is: a variable used to find the smallest value in an array an algorithm used to find a value in an arr
    12·1 answer
  • Which item is developed last in the cyclical design process
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!