During the game, the quotes helped by enabling you to use Multiple Choice over-the-top processing. top-down processing. bottom-up processing. in-through-the-out-door processing.

Answers

Answer 1

Answer:

top-down processing.

Explanation:


Related Questions

Discussion Topic 2 Using complete sentences post a detailed response to the following. How do you manage your online presence? What kind of sites are you most active on, and what steps can you take to manage your image on these sites better?
NEED HELP ASAP WILL GIVE BRAINIST TO BEST AWNSER ​

Answers

Answer:

bro

Explanation:

This is an opinion thing; you answer what you do!  But if your search history takes a turn...

EDUCATIONAL SITES THAT HELP YOU UNDERSTAND TOPICS MORE

can you edit header or footer? if yes, how​

Answers

Answer:

It depends on the type of document you are trying to edit, but normally you can edit the header/footer.

Explanation:

For docs, you just double click near the top/bottom of the page.

The storage capacity of Go ogle drive can be increased from ____________.
a. 5GB to 15 GB
b. 15GB to 1TB
c. 100GB to 30TB.

Answers

Answer:

c. 100GB to 30TB

Explanation:

Please mark me as brainliest and hope this helps :)

Answer:

The answer is C.

Explanation:

The storage capacity of Go ogle drive can be increased from 100GB to 30TB.

Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt?.

Answers

That is calld a bruteforce attack

Study the graph and answer the questions. The numbers on the left side of the graph are in thousands.



The Past: In 1971, integrated circuits had about
transistors.

Answers

Answer:

2012 4,500,000,000

Explanation:

:) :P

Answer:

100 thousand

Explanation:

Which sentence describe internet safety precautions?

Answers

Which sentences describe Internet safety precautions? It is advisable to install anti-virus software on your computer. You should use strong passwords for your Internet accounts. In addition, you should avoid sharing personal information over the Internet.

#hope it helps ^_^

mark me as brainliest please

The sentence describe internet safety precautions are it is advisable to install anti-virus software on your computer. You should use strong passwords for your Internet accounts. In addition, you should avoid sharing personal information over the Internet. Therefore, option C, D and E are correct.

What are internet safety precautions ?

Over the internet, your computer can be attacked in a variety of ways. Viruses and spyware can delete files and allow criminals to search your computer for sensitive information. Your computer could even be compromised.

It is recommended that you install anti-virus software on your computer. For your Internet accounts, you should use strong passwords. You should also avoid sharing personal information over the Internet.

Thus, option C, D and E are correct.

To learn more about the internet safety precautions, follow the link;

https://brainly.com/question/12276583

#SPJ2

The _____, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system.

Answers

Answer:

I am pretty sure it is the RSA

Explanation:

In order to communicate over the Internet computers send small bits of data called ______ to eachother.

Answers

Answer:

communication

Explanation:

............

The FastEthernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Enter global configuration mode, Enter interface configuration mode, Enable the interface, Verify the interface is disabled.

Answers

The appropriate configuration step and command to connect a workstation to the switch are:

Enter global configuration mode: config t.Enter interface configuration mode: int fa0/0.Enable the interface: no shut.Verify the interface is disabled: show interface status

What is a command?

A command can be defined as a set of instructions that are typically used to configure a network device such as a switch, so as to enable it perform certain tasks automatically during network communication.

In Computer networking, commands can be used to ensure the interfaces (ports) on a switch are active and open for connections from other network devices such as:

WorkstationRouter

Read more on switch here: https://brainly.com/question/13243868

Similarities between master file and reference file

Answers

Explanation:

What is a master file?

A collection of records pertaining to one of the main subjects of an information system, such as customers, employees, products and vendors.

What is a reference file?

A reference file is a type of overlay

Biometric authentication can’t be reset. TRUE or FALSE

Answers

Answer:

True

Explanation:

Once it's breached, it's breached forever

lmk if this helps

Which of the following tabs on the Ribbon contains the commands for adding tables, pictures and shapes into a publication? Question 19 options: Insert Page Design Home Mailings.

Answers

Answer:

it is insert

Explanation:

What is by far the most popular dns server software available?.

Answers

Answer:

I use the server

8.8.8.8

and

8.8.4.4

Explanation:

BIND (Berkeley Internet Name Domain) is by far the most popular DNS server software available.

What is the BIND?

BIND(Berkeley Internet Name Domain) is open-source software that executes the Domain Name System (DNS) protocols for the internet. It is widely used on Unix-like operating systems, including Linux and macOS, as well as on Microsoft Windows.

BIND is developed and sustained by the Internet Systems Consortium (ISC), a nonprofit organization that encourages the development of the internet.

It is the most widely deployed DNS software in the world and is used by many internet service providers, businesses, and organizations to manage their DNS infrastructure.

Thus, BIND (Berkeley Internet Name Domain) is by far the most widely used DNS server software.

To learn more about DNS server software click here:

https://brainly.com/question/13852466

#SPJ12

Reggie is having trouble signing into his email account at work. He picks up the phone to call someone in IT, and then checks the phone list to see who to call. Which IT area should Reggie call

Answers

The IT area that Reggie should call is called; Information Security

What are the functions of an Information Technology Department?

The IT department that Reggie should call is called Information Security department.

This is because Information security protects sensitive information from unauthorized activities such as inspection, modification, recording, and any disruption or destruction.

The aim of this department is to make sure that the safety and privacy of critical data such as customer account details, financial data or intellectual property are safe.

Read more about information technology at; https://brainly.com/question/25920220

The mouse, keyboard, and speakers are some of the things that would be plugged into _____ on the back of the system unit

Answers

Answer:

USB PORT are on the back on the system case

What symbol should you look for to determine who owns the intellectual property of a website? the logo the web address the domain suffix the copyright symbol.

Answers

Answer:

the answer is d

Explanation:

took the test

Answer:

d

Explanation:

edge2023

if the bookstore sold 8 books for $66 at that rate how much was one book

Answers

$8.25

Explanation:

To find the amount of money one book costs, we have to divide 66 by 8.

66÷8= 8.25

1 book costs $8.25

Answer:

8.25$ per book

Explanation:

So, $66 for 8 books and we can get the rate by dividing 66/8 which gives us 8.25$

One method to delete a worksheet is to right-click on a sheet _______ and select Delete from the shortcut menu.

Answers

One method to delete a worksheet is to right-click on a sheet tab (name) and select Delete from the shortcut menu.

Ways to Delete a worksheet?

The ways to delete a worksheet is that:

First you have to Right-click the Sheet tab and then click select. Delete.You can also select the sheet, and then later select Home ,Delete  and lastly select Delete Sheet.

A worksheet is known to be a sheet that is often used in creating preliminary plans, auxiliary inputs, notes, etc.

Learn more about worksheet from

https://brainly.com/question/25130975

After creating a webpage with html code, what do you need to do so that others can access it on the internet?.

Answers

After creating a webpage with HTML, you will need to upload them to a location on AFS so that others can access it on the internet.

What is internet?

The meaning of the internet is the climate of the information based on World wide web network.

There is large network of computers connected together in offices or organizations to explore the internet.

The webpage formed using HTML code has to be uploaded on AFS. AFS is the platform everyone can view the content whichever is uploaded.

Thus, After creating a webpage with HTML, you will need to upload them to a location on AFS so that others can access it on the internet.

Learn more about internet.

https://brainly.com/question/13308791

#SPJ2

The goal of the step of the etl process is to take the source data from all the various sources and convert it into a single format suitable for processing.

Answers

It should be noted that goal of the Transform step of the ETL process is to take the source data from all the various sources and convert it into a single format.

What is ETL?

ETL,  can be explained as data integration process which make use of data from multiple data sources into a single one.

It stands for;

extract transformload,

It turns all the various sources and convert it into a single format.

Learn more about ETL at;

https://brainly.com/question/24313597

How do you flatten a 2D array to become a 1D array in Java?

Answers

Answer:

With Guava, you can use either

int[] all = Ints.concat(originalArray);

or

int[] all = Ints.concat(a, b, c);

Explanation:

Use GUAVA

Select the correct answer. If a = 4, what is the value of the expression 12 - a/4 ? A. 1/2 B. 4 C. 11 D. 12

Answers

Answer:

C)

Explanation:

Because if 4 = A, then we're doing 12 - 4/4.
4/4 is equal to 1/1, which is equal to 1 as a whole number, and 12 - 1 is 11.

Suppose you have a multithreaded program with 3 threads. One thread spends most of its time in a busy waiting loop. The other two threads are tightly coupled so that they one thread is often waiting on the other. What kind of threads would provide the most efficient execution

Answers

The kind of thread that will give the most efficient execution in this scenario is the tapered thread.

What is a tapered thread?

It should be noted that a tapered thread simply means a thread that simply tapers along the thread profile.

In this case, since a thread spends most of its time in a busy waiting loop while the other two threads are tightly coupled, then the tapered thread is appropriate.

Learn more about threads on:

https://brainly.com/question/25004623

Credit sales to customers are: ____________
a) Recorded using a Create Invoices window
b) Recorded in a Credit Card Sales window
c) Recorded using the Create Sales Receipts window
d) Recorded using the Enter Bills window

Answers

Answer:

C. Recorded using a Create Invoices window

Explanation:

Credit sales refers to the purchases made by customers for which payment is delayed. A reasonable payment delay allows customers to make additional purchases as delayed payments allow customers to generate cash with the purchased goods which in turn can be used to pay back the seller.

These are purchases made by a customer that do not require a full payment  at the time of purchase.

Credit sales to customers are recorded using a Create Invoices window.

________ has the ability to drag windows to the edges or corners of your screen and have them snap into place.

Answers

Answer:

Snap Assist

Explanation

Snap Assist lets you snap a window to one side of your screen without having to move it around and resize it manually.

____________________ uses an algorithm to encrypt a ciphertext document from a plaintext document, and when the information is needed again, the algorithm is used to decrypt the ciphertext back into plaintext.

Answers

The Advanced Encryption Standard (AES), is a symmetric encryption algorithm and one of the most secure.

Choose the best answer from the options below to complete the following sentence.

Storage is different from RAM because for storage, information is _________, even if power is turned off.

preserved

temporary

deleted

unsaved

Answers

Answer:

its A. the answer to your question is preserved. :)

Answer:

A

Explanation:

How to get the id of a document in firebase in react.

Answers

Answer:I don’t know

Explanation:yea I don’t know you can get caught

What is the purpose of a return statement?

a
to pass a value from inside a function to the main program

b
to print a value to the user

c
to go back to the beginning of a loop

d
to begin printing on a new line

Answers

What is the purpose of a return statement?

a - to pass a value from inside a function to the main program

How many bytes does it take to represent a color in the rgb color model?.

Answers

Answer: 3 bytes

Explanation: Hope this helps if not sorry.

Other Questions
Overpopulation of a species occurs when: Point T is reflected over the y-axis. Determine the coordinates of its image.T (2,5)O (2,-5)O (2,5)O (-2,-5)O (-2,5) Lorene plans to make several open-topped boxes in which to carry plants. She makes the boxes from rectangular sheets of cardboard from which she cuts out 5 inches squares from each corner. The length of the original piece of cardboard is 10 inches more than the width. If the volume of the box is , 2520in^(3) determine the dimensions of the original piece of cardboard. HELPPPPPPPP ASAPPPPP:What is the president's purpose in the State of the Union speech? a. to explain why legislation was vetoed b. to give Americans a message of hope c. to announce presidential appointments d. to recommend legislation What happened to the culture of the enslaved Africans once they were brought to the West Indies/Caribbean? Factors to consider when making a careers decision He throws the ball to blankherhersthemtheirs points :D first one gets brainliest Explain how the social hierarchy in the Shogun period of Japan was different from the Heian period. Find the value of X. _Na +_Cl2 __NaciHow many moles of NaCl are created from 1.5moles Na? Whats the answer?????? In the following equation, what are the products of the reaction?C6H12O6 + O2 + CO2+ H2Oa. C6H12O6 and 02b. 602 and CO2C. C6H12O6 and H2Od. CO2 and H2O I need help please I don't get it at all Why is debris soil not suitable for agriculture in mountain region I want this answer now please help in this question What is a trade barrier. Will give brainliest Which of the following is a place that would most likely be part of the ecumene?Question 3 options:a) Temperate climate landsb) High landsc) Dry landsd) Wetlands Helpppp!!!!!!! Sodium is an alkali metal that reacts violently with water. Calculate the total number of atoms in a 58.2 grams sample of sodium and express in correct scientific notation. Hydrogen (H2) and oxygen (O2) combine to make water (H2O) in the following equation.6H2 + 3O2 ?H2OHow many water molecules would be produced?Can you please post all the answers for Claiming Conservation Quick Check to check my answers.