1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
3 years ago
9

Sometimes we write similar letters to different people. For example, you might write to your parents to tell them about your cla

sses and your friends and to ask for money; you might write to a friend about your love life, your classes, and your hobbies; and you might write to your brother about your hobbies and your friends and ask for money. Write a program that prints similar letters such as these to three people of your choice. Each letter should have at least one paragraph in common with each of the other letters. Your main program should have three method calls, one for each of the people to whom you are writing. Try to isolate repeated tasks into methods.
Computers and Technology
1 answer:
OleMash [197]3 years ago
4 0

?

?????????????????????

You might be interested in
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
Zepler [3.9K]

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

3 0
3 years ago
Read 2 more answers
A group of Automation Anywhere Enterprise users are required to automate bots for a customer change requirement. The users find
stich3 [128]

There are a number of tools that have emerged since Automation was born. One such tool is the Automation Anywhere. It is a good example of an RPA tool that is used to automate various tasks and upload task bots. Automation Anywhere is made up of three main components. These components include Bot Creators, Bot Runners, and Control Room.

Further explanation

To answer the question, it is most likely that these users have a Community edition which does not allow them to upload bots to the control room. It is also most likely that the users are running a developer license and not a runner (Enterprise) license. Whether or not this is the case, the administrator needs to assign them an administrator role and not a developer one which I assume they are using

Community edition helps users interact with the most basic features of the tool before they are comfortable enough to upgrade to the Enterprise version. These users are able to automate bots for customers only if they have the Administrator role option. The Administration option is found on the Enterprise edition only and not the community edition.

Learn more about

brainly.com/question/11317405

brainly.com/question/11317405

#LearnWithBrainly

6 0
2 years ago
Name the character encoding standard that enables up to 128 different commonly used characters,
Lelechka [254]

Answer:

ASCII character set.

Explanation:

ASCII is an acronym for American Standard Code for Information Interchange and it was developed from a telegraph code. It is typically a character encoding standard that comprises of seven-bit (7-bit) set of codes.

ASCII character set is the character encoding standard that enables up to 128 different commonly used characters, numbers and symbols to be used in electronic communication systems. The ASCII character set is only used for encoding English language and it comprises of both the lower case and upper case letters of the 26 alphabets, number 0 to 9 and symbols.

8 0
3 years ago
Which of the following is true about a hot site?
swat32

Answer:

Option(d) is the correct answer to the given question.

Explanation:

A hot site is a place off site in which the task of a corporation could restart during a massive failure.The hot site seems to have all the needed equipment for such the corporation to schedule the normal activities, such as phone jacks, replacement data, laptops, and linked devices.

  • The main objective of hot sites provide an useful backup mechanism for any corporation that wishes to pursue its business in the presence of exceptional circumstances or events.
  • All the others options are not related to hot site that's why they are incorrect option.
8 0
3 years ago
Explain the concept of an engineering trade-offs and give an example
makvit [3.9K]

ytfjkhm,MNbkvjhmb,kn.l">

k

8 0
3 years ago
Read 2 more answers
Other questions:
  • The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont
    6·1 answer
  • In databases and database-related software, which choice is not a Boolean operator?
    7·2 answers
  • What is a critique of the feature detector model of object recognition?​?
    8·1 answer
  • Given num_rows and num_cols, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
    8·1 answer
  • How a computer encodes text, how it is processed and how computer data is represented.
    6·1 answer
  • How can you specify a page has the highest priority?
    7·1 answer
  • im in honors comupter science and one of my questions is evaluate 18% 7 does anyone know how to answer that
    6·1 answer
  • What feature should be used before a document is printed
    8·1 answer
  • 31
    10·1 answer
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual whi
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!