1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex_Xolod [135]
3 years ago
15

2.13.4 Colorful Caterpillarhel ????

Computers and Technology
1 answer:
exis [7]3 years ago
3 0

Answer:

sorry don't know :(8685

You might be interested in
An effective technology for e-training and e-learning is __________, which uses computer graphic displays that the user can adju
ruslelena [56]

Answer:d)Visual interactive simulation (VIS)

Explanation:Visual interactive simulation (VIS) is the technology that works in a system for its development and simulation application for making the system display dynamic.

The dynamic display is preferred because it creates the interest in clients and is also used for the e-learning purpose. It also helps in decision making in accordance with competitive process.

LOT, Flash and WebEx does not provide the  service for the e-teaching services with the dynamic display feature.Thus , the correct answer is option(d).

4 0
3 years ago
Organizations should communicate with system users throughout the development of the security program, letting them know that ch
Fed [463]

Answer:

Yes it is true.The organization should indeed communicate with a system user throughout the development of a security program. A corporation needs a security policy that must be developed by management at all levels, including organization and employees at the operational level. For a corporate security plan, it is essential to reduce the resistance of the expected changes and define the objective.

Explanation:

Three objectives of the security plan in an organization are:

  • Identify the sensitive system and plan
  • Create and define the strategy and control of the system.
  • Develop and implement the training programs.

Security Information is one of the essential factors in the organization.For an organization, the information should be protected.

7 0
3 years ago
Program ___________________ are written explanations that are not part of the program logic but that serve as documentation for
Aleks04 [339]

Answer:

Program Comments

Explanation:

program comments are explanations. They are not executable code and the can actually appear anywhere in your code. Their main function is code documentation for the future. In Java programming language for example three types of comments is used. These are

// Single line comments  (This starts with two forward slashes

/* Multiple Line

comment

Style*/    

The third is the javadoc that gives a description of a function. I looks like the multiple line but is has two asterics

/** This is javadoc

comment

style*/

8 0
4 years ago
Whate are some creatures/animals that the robot rex imitates?
Rzqust [24]

<span>The Rex robot imitates the dinosaur perfectly. In terms of its structure, the robot looks like a dinosaur, and this is seen in the robot’s serrated teeth. To some extent, the robot imitates the cheetah due to its speed ability.</span>

3 0
4 years ago
Consider the following code:
Art [367]

Answer:

The output is 252

Explanation:

To get the output, I'll analyze the lines of code one after the other.

Here, user enters 78. So, start = 78

start = int(input("Enter the starting number: "))

Here, user enters 45. So, stop = 45

stop = int(input("Enter the ending number: "))

This initializes x to -10

x = -10

This initializes sum to 0

sum = 0

This iterates from 78 to 46 (i.e. 45 + 1) with a decrement of -10 in each successive term

for i in range (start, stop, x):

This adds the terms of the range

     sum = sum + i

This prints the calculated sum

print(sum)

The range starts from 78 and ends at 46 (i.e. 45 + 1) with a decrement of -10.

So, the terms are: 78, 68, 58 and 48

And Sum is calculated as:

Sum = 78 + 68 + 58 +48

Sum = 252

<em>Hence, 252 will be printed</em>

8 0
3 years ago
Other questions:
  • Ann is in the middle of completing her first 1040EZ tax form. She has some questions about an instruction on the form. What shou
    8·2 answers
  • Match the element of a presentation program to its description
    11·1 answer
  • How many rows and columns does ms-excel 2007 have???
    10·1 answer
  • BOTH INTERNATIONAL &amp; INLAND Which procedure(s) shall be used to determine risk of collision?
    14·1 answer
  • George wants to edit the font of the title text in his presentation. Where can he find the option to edit it?
    6·2 answers
  • What is the first thing you should do when troubleshooting a computer problem
    5·2 answers
  • BUURTAIS
    7·1 answer
  • What is used to accurately position objects on the slide using a single horizontal and vertical line that intersects in the cent
    5·2 answers
  • When entering information for a new contact in the address book, Outlook will automatically create a _____. A. Invitation B. Res
    7·1 answer
  • 6
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!