1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aivan3 [116]
3 years ago
12

?trophic levelNYIGVU.;/IO9YK7,'0;

Computers and Technology
1 answer:
grin007 [14]3 years ago
7 0

please add more information, about your answer {history restored}

go to brainly.com for [HELP]

You might be interested in
What is the current record holder for the fastest car in the world? What is the top speed of it? 100 points to whoever gets it c
olchik [2.2K]
It’s 257 mph

Hope this helps !!!!!
7 0
3 years ago
Read 2 more answers
Everyone interacts with various information systems every day: at the grocery store, at work, at school, even in our cars. Make
Alex73 [517]

Answer:

- RFID tags in shopping mall.

- Browsing the internet.

- Mobile phone calls

Explanation:

Radio frequency identification tag (RFID) in a device that holds personal information of a user electromagnetically. it is used in shopping mall, installed in the shopper's phone or a card, in which all payments are done automatically.

The internet is a global network of devices. With a subscription to a internet service provider, a user can surf the internet at any time of the day.

Mobile phones are portable devices, procured by a user for on-the-go calls. This cell phones have databases with information of cell tower connections, for easy switching for flexible but quality call adaptation.

5 0
3 years ago
What kind of network connection do you think is used to connect most wireless video game controllers to consoles, and why would
Ostrovityanka [42]

Answer:

I would say Lan

Explanation:

5 0
3 years ago
You are the leader of your school's Go Green Club, which supports environmentally friendly choices and lifestyles. Your club wil
miskamm [114]

Answer:

(Answers may vary.)

My Considerations

The Go Green Club has a total of 100 members. I plan to photograph each of them in front of our club's "Go Green" sign. I have a deadline of 30 days to deliver the ID cards. Therefore, I have to ensure that all the cards are printed and ready for delivery in 20 days, with 10 days of buffer time (in case the cards require any edits or changes). Additionally, after I have submitted the draft for review, I will need the coordinator's final approval on the design and layout of the ID card.

Hardware Requirements

  • a desktop computer or laptop with adequate memory to run the software to create the ID cards
  • some external storage devices, such as pen drives and DVD disks, to share the design and layout for the coordinator to review; I will also need these devices to store the final digital file for print
  • a color scanner to scan hand-drawn artwork and signatures, which I will place on the ID card
  • a digital camera to capture photos of members, and to transfer them to the computer/laptop
  • a printer to make hard copies of the cards.
  • Software Requirements

I intend to use Scribus to create the ID cards because it is a free DTP application, and has most of the common features I'd need to create an ID card.

Formatting Techniques

  • I plan to use the following techniques to design the club ID cards.
  • I'll use the landscape or horizontal orientation. This will enable proper spacing for the ID card elements.
  • I'm planning to use a card measuring 3.370 inches × 2.125 inches. A card this size will ensure that all the elements of the card are visible.
  • I am planning to place the club logo on the top left corner, because the eye normally follows the path of the letter Z. This'll help the viewer to see the logo and identify/recognize the club.
  • Next I'll place the club name; I'll use the top-center alignment and also vertically align it to the logo. I'll use the sans serif font for the club name.
  • Following the Z-path rule, I'll place the member's photo to the right and the member's name under the photo. In this position, the photo and the name will be visible, and will not get mixed up with other elements. I'll print the member name with a serif font.
  • Finally, again in line with the Z-path rule, I'll position the club seal and the club director's signature at the right lower bottom. Although these elements are essential on an ID card, they do not require as much viewer attention as the club logo, name, and member photo.

Explanation:

I used Canva for this card.

8 0
3 years ago
ven if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are
makkiz [27]

Complete Question:

Even if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are;

Group of answer choices

A. policy and procedure development

B. use case activity diagram testing

C. method design and coding

D. data conversion and user training

Answer:

C. method design and coding

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are six (6) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Deployment.

6. Maintenance.

Among the listed stages, there are two (2) most important stages which cannot be ignored in the creation of a software application are.

<em>Hence, even if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are method design and coding.</em>

I. Method design: this is the third step of the software development life cycle, it comes immediately after the analysis stage. This is the stage where the software developer describes the features, architecture and functions of the proposed solution in accordance with a standard.

II. Coding (development): this is the fourth step in the software development process and it involves the process of creating a source code which would enable the functionality of the software application.

3 0
3 years ago
Other questions:
  • Which type of security personnel may work for government as well as for private security agencies?
    7·2 answers
  • You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network I
    13·1 answer
  • 13. You're expecting an important call from Mr. Suarez, a potential customer. While waiting for this call, your supervisor calls
    15·1 answer
  • What is a Limited Purpose credit card
    11·2 answers
  • You use a ____ following the closing brace of an array initialization list.
    12·2 answers
  • This process can be applied to help workers choose the best telecommunications technology to do a specific task.
    6·2 answers
  • Briefly explain what is net neutrality and why is it important today
    15·1 answer
  • Complete the following statement: Sustainability is: Choose all that apply.This task contains the radio buttons and checkboxes f
    10·1 answer
  • Generally speaking, problems are rarely caused by motherboards. However, there are some instances in which a motherboard can fai
    12·1 answer
  • I’m gonna ask this again because I REALLY need an answer.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!