1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnesinka [82]
2 years ago
5

What does it mean by does the author create an emotional connection toward the readers?

Computers and Technology
1 answer:
andreyandreev [35.5K]2 years ago
6 0

Answer:

the author makes an emotional connection between you and the character

Explanation:

short version:you feel the characters emotion

You might be interested in
Write about virus in five points.​
kvasek [131]
A computer virus is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions. It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
5 0
3 years ago
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
Alekssandra [29.7K]

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

5 0
3 years ago
Which C99 function can be used to convert a string to a double?
nordsb [41]

Answer:

atof

Explanation:

atof function is used to convert a string to a double.

It takes a single parameter of type const char * and returns a double value.

The function signature is: double atof (const char* str);

In order to use this function in the code, you need to include the header file <stdlib.h>

For example:

#include <stdio.h>

#include <stdlib.h>  

int main()

{

   char str[5] = "0.01";

   double d = atof(str);

   printf("Value = %f\n", d);

   return 0;

}

5 0
3 years ago
Which of the following best describes the protocols used on the Internet?
max2010maxim [7]

Answer:

D: The protocols of the Internet are open and used by all devices connected to the network

Explanation:

There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly.  There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.

5 0
3 years ago
Why would an online survey of 2,000 visitors to your college’s Web site be of little use in assessing the neighboring community’
musickatia [10]

Answer: the sample is not representative of the community.

Explanation:

Online surveys or surveys in general are made to obtain relevant information about a particular issue. If samples are not representative of that issue, they end up having little use.  

4 0
3 years ago
Other questions:
  • WILL UPVOTE ALL.
    7·1 answer
  • Which device lets you hear audio on your computer?
    12·2 answers
  • Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
    8·1 answer
  • What is the benefit of a cloud computing infrastructure? ○ Companies have full control over the data that is hosted. ○ Companies
    11·1 answer
  • Troubleshooting a printer that does not work includes a. connecting the printer to your computer b. checking to see if there is
    13·1 answer
  • Which type of NAC agent will be used during the posture assessment before allowing access to the VPN users?
    9·1 answer
  • What electronic device can represent a KiloByte?
    14·1 answer
  • Window frame will expand to fill the entire desktop when you
    12·1 answer
  • Who would win in a fight iron man or bat man​
    5·2 answers
  • A company has an Aruba solution. The company wants to host a guest login portal with this solution, and the login portal must gi
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!