1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
3 years ago
6

What is your F O R T N I T E name

Computers and Technology
2 answers:
kolbaska11 [484]3 years ago
6 0

Answer:

don't have name, but would be something cool.

Explanation:

poor, have a splendid day.

Keith_Richards [23]3 years ago
4 0

here you go ^^ i could not do it so i took a screen shot

You might be interested in
Using the notation exemplified in following question , list a set of tables and attributes (and identify keys) to represent the
Paha777 [63]

Answer:

Entities are - Students, CourseList, Advisor and CourseSelection.

Explanation:

The database is structure is designed using Crow Foot Database Notation as attached

6 0
3 years ago
The valid call to the function installApplication is
Zanzabum

Answer:

B. installApplication(‘A’, 1);

Explanation:

Given

The above code segment

Required

The correct call to installApplication

The function installApplication is declared as void, meaning that it is not expected to return anything.

Also, it receives a character and an integer argument.

So, the call to this function must include a character and an integer argument, in that order.

Option D is incorrect because both arguments are integer

Option C is incorrect because it passes no argument to the function.

Option A is incorrect because it receives an integer value from the function (and the function is not meant not to have a return value).

Option B is correct

8 0
3 years ago
Write 8 tips for cyber safety
alina1380 [7]

Answer:

8 tips for cyber safety

1. Keep Personal Information Professional and Limited

2. Keep Your Privacy Settings On

3. Practice Safe Browsing

4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection

5. Be Careful What You Download

6. Choose Strong Passwords

7. Make Online Purchases From Secure Sites

8. Be Careful What You Post

8 STEPS TO STOP YOUR CHILD’S CYBERBULLY

Resist The Urge To Respond Or Retaliate

Document The Bullying

Get Help

Block The Bully

Keep Passwords Secret

Be A Teammate

Approach The Parents

Support Your Child With A Stress-Free, Supportive Home

Explanation:

5 0
3 years ago
What are some differences between CUI and GUI ?
ollegr [7]

Answer:

Even though both are interfaces and serve its purpose of attempting to run the strategies, their components as well as the manipulate they will get from the patient differ.

Explanation:

CUI (Character User Interface) :-

  • It's a sort of user interface that only uses binary data and pseudographics for interface-output and data sessions.
  • That's characterized by low availability for operating systems I / O resources (act with integrity) and high speed with a display of data.

GUI (Graphical User Interface (GUI):-

  • Using graphical elements such as windows, icons, menus helps the user to communicate with the program.
  • It is a kind of user interface along which people interact with electronic equipment through characterizations of visual indicators.
3 0
3 years ago
Tom wants to send an image by email to his friend Nadia. He needs to reduce
erica [24]

<u>1</u><u>s</u><u>t</u><u> </u><u>Method:</u>

  • Reduce the size of the image in <u>Paints.</u>

<u>2</u><u>n</u><u>d</u><u> </u><u>Method:</u>

  • Right-click the selected file you want to send.
  • Click on <u>Send To</u> > M<u>ail Recipient</u>.
  • The Send Pictures via E-mail dialog box appears.
  • Click <u>Make all my pictures smaller</u>, and then click OK.

Hope you could understand.

If you have any query, feel free to ask

6 0
3 years ago
Other questions:
  • You took a fantastic photograph that you want to use in the report you're writing using DTP software. To import the photo into y
    6·2 answers
  • What is an enterprise system
    14·2 answers
  • Which of the following journals is not aimed at the public as well as scientists?
    7·1 answer
  • What may happen if there is too much harmony in a design?
    14·1 answer
  • Consider the following program segment: //include statement(s) //using namespace statement int main() { //variable declaration /
    9·1 answer
  • Such a class might store information about the account balance, the name of the account holder, and an account number. What inst
    13·1 answer
  • When using correct ergonomic technique be sure to _____.
    11·2 answers
  • Design 3 classes: Computer - Superclass
    11·1 answer
  • You designed a program to create a username using the first three letters from the first name and the first four letters of the
    6·1 answer
  • Question # 5
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!