1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
11

I need help ASP 3rd grade math ​

Computers and Technology
2 answers:
kotegsom [21]3 years ago
7 0

Answer:

What is the question? ..

atroni [7]3 years ago
5 0
I don’t see any picture?
You might be interested in
List and briefly defined categories of security services.
Fynjy0 [20]
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
7 0
4 years ago
Kurtz & Kemeny created an easy-to-learn programming language called?
vampirchik [111]

BASIC

(Beginners' All-purpose Symbolic Instruction Code)

4 0
3 years ago
Alex leads a team of eight members. Arrange his tasks in sequential order of phases of group dynamics. What are the stages in gr
Alborosie

Answer and Explanation

There are five stages of group development which Alex should follow.

i) Stage 1: Forming-this is where he forms a team which will follow the other stages.

ii)Stage 2: Storming - In this stage is where the members set their goals and boundaries.

iii)Stage 3: Norming- This is where the team comes together in terms of ideas. In this stage members are ready to move forward with big expectations.

iv)Stage 4: Performing.-This is where  now the team is now accomplishing or implements their ideas and they are now getting the benefits.In this stage members argue positively.

v)Stage 5: Adjourning-This is the stage where the group has accomplished their mission.And now the group is dissolved

7 0
3 years ago
Explain what a wiki is and list its advantages.
Drupady [299]

Explanation:

Wikis are defined as a form of a website or web page or a database where the users can work on the data, they can even add or edit the data. Wikis use a very quick as well as a easy syntax that allows the users to format the text and create various links between the pages. The users need internet browsers for that.

One of the main advantage of wiki is that it provides ability to collaborate asynchronously, and also without  time constraints.Besides it also provides a beneficial function of something. It is free and not expensive.

5 0
3 years ago
Which of the following statements about light emitting in diodes is correct
andriy [413]

<span>The options attached to the question above are as follows:</span>

<span>
A. Light-Emitting diodes are used as indicators in circuits

B. Light-Emitting diodes are used as defectors in circuits

C. Light-Emitting diodes have very short life-spans in circuits

D. Light-Emitting diodes conduct current in either direction in circuits</span>

ANSWER

The correct option is A.

Light emitting diodes [LED] refers to a semi conductor diode that glows when current flows through it by converting electrical energy into light. LED has many applications and one of it is that is used as an indicator in electric circuits. The circuit symbol of LED is made up of two arrow marks, which is used to indicate the radiation that is emitted by the diode.

3 0
4 years ago
Other questions:
  • What is the basic difference between x.509 and pgp in terms of key hierarchy and key trust?
    12·1 answer
  • How it print media used? ​
    9·1 answer
  • 9) If you are working on the part of 5-15 minutes, time-stamping (every 30 seconds) should start at: a) [00:05:00] b) [00:00:00]
    9·1 answer
  • Can somebody help me with this problem
    10·1 answer
  • The is a global information system logically linked together by a globally unique address space based on the Internet Protocol o
    5·1 answer
  • True / False You should always consider your business requirements before deciding which designs are best for your environment.
    13·1 answer
  • The span was so long, the height so great, and the enterprise likely to be so costly, that few thought of it as something begun
    9·2 answers
  • Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users im
    8·1 answer
  • What Is The First Computer Brought In Nepal ? <br>​
    10·1 answer
  • give the tightest asymptotic bounds you can for the following recurrences and provide a short explanation for your solution. you
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!