1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tigry1 [53]
2 years ago
14

Assume that students in a course are required to produce a written report on an ICT-related

Computers and Technology
1 answer:
Sindrei [870]2 years ago
5 0

Based on the information given, the measures of work content that can be utilized will be:

  • The student's knowledge of the subject.  
  • The work's difficulty.
  • The student's research hours.

In order to create a model to estimate how long it should take a student to

complete such an assignment, the important measures include the knowledge of the student on the subject, research hours, etc. This may be evaluated on a scale of 0 to 10.

The factors that may influence the degree of difficulty include:

  • The student's access to materials for the assignment.
  • The student's familiarity with the work.
  • The amount of time required to fully grasp the subject.

Learn more about a model on:

brainly.com/question/17764105

You might be interested in
Describe the Order of Operations in Java programming.
cestrela7 [59]

Answer:

It stands for Parentheses, Exponents, Multiplication/Division, Addition/Subtraction. PEMDAS is often expanded to the mnemonic "Please Excuse My Dear Aunt Sally" in schools. Canada and New Zealand use BEDMAS, standing for Brackets, Exponents, Division/Multiplication, Addition/Subtraction.

5 0
2 years ago
What port number is the well-known port used by web servers to distribute web pages to web browsers?question 3 options:?
stira [4]
This is port 80 for clear-text connections and 443 for encrypted (TLS) connections.
5 0
2 years ago
Which team behavioral characteristic helps team members to freely express ideas and foster approachability?
vlada-n [284]

Communication is the right answer.

6 0
3 years ago
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
Lynna [10]

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

7 0
3 years ago
What's your opinion on sentrent (it's a Pokemon)​
Vadim26 [7]

Answer:

Hes really nice

TSUNAMI SUSHI HAS A TSUNAMI OF ADMIN ABUSE!! TSUNAMI SUSHI HAS A TSUNAMI OF ADMIN ABUSE!! TSUNAMI SUSHI HAS A TSUNAMI OF ADMIN ABUSE!! TSUNAMI SUSHI HAS A TSUNAMI OF ADMIN ABUS!Chicken wing

Chicken wing

Hot dog and baloney

Chicken and macaroni

Chillin with my homies

Chicken wings

Chicken wings

4 0
2 years ago
Read 2 more answers
Other questions:
  • Can some one fix this <br> input ("Enter a number: ") <br> print (num * 8)
    9·1 answer
  • What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
    10·1 answer
  • You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why
    11·1 answer
  • The computer has had far-reaching effects on our lives.how has the computer effected your life?
    8·1 answer
  • What is a row of data in a database called?<br> Field<br> File<br> Record<br> Title
    10·1 answer
  • What is a relationship between a object and a class?
    7·1 answer
  • Write an algorithm that gets as input your current credit card balance, the total dollar amount of new purchases, and the total
    8·1 answer
  • What is the meaning of web browser
    11·1 answer
  • I NEED HELP SOMEONE HELP ME PLEASE
    10·1 answer
  • Text,Audio and graphic is entered into the computer using
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!