1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldi70 [24.7K]
3 years ago
15

If they spend all night writing computer programs, Laurence can write 10 programs while Carrie Anne can write 5. If they spend a

ll night making sunglasses, Laurence can make 6 while Carrie Anne can make 4. We know that:
Computers and Technology
1 answer:
kondaur [170]3 years ago
3 0

Answer:

Laurence can write 10 programs while Carrie Anne can write 5.

Laurence can make 6 sunglasses while Carrie Anne can make 4

Explanation:

You might be interested in
Using ________, GoPro encourages its millions of customers to submit their best content to the GoPro website to earn rewards and
coldgirl [10]

Answer:

UGC- User Generated Content

Explanation:

<em>It is a combination of making and user generated content a virtual shoe-tie for Go Pro. Go Pro has established a content marketing plataform able to grew into an extreme ecommerce success history.  Instead of renting media company's audience, they use the brand-building services of millions of costumers.</em>

<em>The marketing team provide the tools and plataform to enable their costumers to share the videos and images they capture.</em>

5 0
3 years ago
Complete the sentence to identify advantages of top-down programming design. Choose all that apply.
yanalaym [24]

Answer:The original choice to write apply_fg so that it accepts function arguments is a good one, because it increases interoperability. When the callable arguments to apply_fg use a single protocol, we can easily exchange them: #include <functional> float log2(float); int a = apply_fg(5.Of, int b = apply_fg(3.14f,

Explanation:

3 0
4 years ago
Read 2 more answers
If you were a developer of software, what kind of software package would you develop? why ?​
Goshia [24]

Answer:

Software that would help my grandparents in the North end much money and help stop post harvest loss due to inadequate weather information Climate change etc

Explanation:

The app willbe able to tellif a soil is suitable forCropsthrough my othertechnologiesthat willcome with app it will alsodetect the whetherpattern accuratelyprovide securityin the farmand help farmers selltheir products online

7 0
3 years ago
You need to apply security settings to the registry on a Windows server. Which command should you use
Mekhanik [1.2K]

There are different kinds of measures taken in security. The command should you use is   Certutil.

<h3>What is Certutil</h3>

Lawrence Abrams was known to be the man that mad Windows to have a built-in program called CertUtil.

This is often used to manage certificates in Windows where one can install, backup, delete, manage, and perform a lot of functions related to certificates and certificate that are saved in Windows.

See full question below

You need to apply security settings to the registry on a Windows server. Which command should you use?

certutil

regedit

regex

cipher

Learn more about Certutil from

brainly.com/question/24931496

7 0
2 years ago
Computer forensics is practiced _____. A. Only by specially trained government and law-enforcement personnel B. By many organiza
laiz [17]

Answer:

Option B is the correct answer.

<h3>Computer forensics is practiced by many organizations, including public- and private-sector organizations such as hospitals, law enforcement, and businesses. </h3><h3 />

Explanation:

Computer forensics can be defined as a branch of digital forensics that deals with the evidences and and proofs found on all digital storage media such as computers.

It is basically a step for enhancing security bases of communication. Therefore it is mainly used by law-enforcement personnel but it can also be practiced by other institutions for the purpose of self security.

<h3>I hope it will help you!</h3>
4 0
3 years ago
Other questions:
  • Write a static method, getBigWords, that gets a single String parameter and returns an array whose elements are the words in the
    15·1 answer
  • The algorithm ADDN implements N-bit fixed-width binary addition for non-negative integers and ignores overflows. For example, AD
    13·1 answer
  • Define cyber law and cyber crime with examples.​
    11·1 answer
  • Which of the following terms is computed as cash provided by operations less capital expenditures and cash dividends? A : adjust
    5·1 answer
  • In excel, the applied theme has a set of complimentary ________, which are defined sets of formatting characteristics, such as f
    12·1 answer
  • )What item is at the front of the list after these statements are executed?
    8·1 answer
  • A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate
    5·2 answers
  • 334. Universal Containers uses a custom field on the account object to capture the account credit status. The sales team wants t
    12·1 answer
  • Edhesive 4.6 lesson practice <br><br> Range is an example of a_______.
    10·2 answers
  • In windows, you use _____ to reorder, move, and navigate between folders.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!