1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikitadnepr [17]
2 years ago
11

Tasks on a checklist should be written in as general terms as possible so that developers and artists have enough creative freed

om to create interesting products.
O true
O false
Computers and Technology
2 answers:
vladimir2022 [97]2 years ago
8 0
True is the answer of the queen
GrogVix [38]2 years ago
7 0

Answer:  True

Explanation: Developers who design always take on idea that was created and add to it. Creating a piece of artwork/ Item.

You might be interested in
A __________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers
pychu [463]
Firewall
Dont forget to thanks and give brianliest.
4 0
3 years ago
Int [] val = { 3, 10, 44 };
Shtirlitz [24]

Answer:

4) 3 11 44

Explanation:

Given data

int [] val = { 3, 10, 44 };

The total number of parameters of given array are 3, so total length of array is also 3.

The indexing of array starts with '0', Therefore the indexes of array with length zero are: {0,1,2}

The value of array at index 0 is = 3

similarly,

value at index 1 = 10

value at index 2 = 44

Here, Int i = 1 is storing the value '1' in integer variable i.

In addition to that, any value of index 'i' of an array is selected using array[i].

Therefore,

val[i] is selecting the value of array located at index '1' because i = 1.

val[i] = val[1] = 10

val[i]+1 is selecting the value of array located at index 'i' that is (1) and adding 1 to it

=> val[i] = 10

=> val[i]+1 = 10+1 = 11

Finally,

val[i] = val[i]+1; is copying the val[i]+1 = 11 to value placed at index 1 (10). Hence, the output would be {3 11 44}. So 4th option is correct.

6 0
2 years ago
Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company c
professor190 [17]

<u>The wireless network:</u>

Wireless networking and internet access are essentials when it comes to the smooth functioning of an enterprise. Certain information can be transferred from one computer to another within a specified if they are connected to a network.

In this case, as the company shares the building with the branch office of a rival company there may be repercussions. First of all, the company's wireless network should be equipped with a strong password and it should be changed regularly too.

Next, the officials responsible for networking should also monitor the range of their wireless network. There is no point in keeping the range of wireless network wide as it is to be used by employees only and they can access it on the company's premises.

5 0
2 years ago
HELP ASAP
vladimir2022 [97]

Answer:

B

Explanation:

took the test on egdenuity

7 0
3 years ago
Backup software creates backups and prevents you from losing all your data, so would backup software be considered an applicatio
GuDViN [60]

Answer: B

Explanation:

WHATS GOOD DAVE STRIDER? WHATS UP MAN I -  i man put the bunny back in the box what pumpkin apple juice?

ok so application software performs specific tasks for an end user and utility software just runs routine maintenance on your computer to ensure it runs smoothly. in this sense, the answer is B because if your computer crashed then you have no backup. things do not run smoothly obviously.

think of utility software as things such as antivirus, compression tools, defragmenter, and the other boring stuff that is meant for your computer to run smoothly

4 0
2 years ago
Other questions:
  • ________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are store
    8·1 answer
  • In which type of land contract does the seller earn interest on the difference between what the seller owes on an existing loan
    14·1 answer
  • On what basis can you categorize the generations of computers?
    5·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    10·1 answer
  • A new employee has reported that print jobs are printing as garbled text. Which of the following is MOST likely the reason for t
    8·1 answer
  • What is a URI (include example)
    7·1 answer
  • Assume that you want two C# or C++ programs to share some data. You can write the first program so that it writes it's output to
    5·1 answer
  • Recommend how could you integrate positive aspects of digital literacy into your own
    13·1 answer
  • A business needs to open at the right ___________ and the right ______________. Choose all correct answers.
    9·1 answer
  • What underlying concept is edge computing based on?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!