Answer:
The term code switching has been expanded and can encapsulate in any situation that speaker find to be switch from vocabulary.
Explanation:
It is a truly remarkable skill when you communicate your emotions, thoughts and opinion to others. It does not mean that we just to communicate our language but our language influence our thought, emotions and language and self identity.
we communicate our culture that is reflected in our language. Our language tells that who we are and from where we comes.
Code switching is related to the speakers alternates use of multiple language. in the one communication.
For example: Grace for beautiful gift ( Esta awesome).
Explain why computer users should use the cloud?
Developing in the cloud enables users to get their applications to market quickly. Hardware failures do not result in data loss because of networked backups. Cloud computing uses remote resources, saving organizations the cost of servers and other equipment.
ATM machines respond to request in__________
Answer:
Atm machine respond to request in atm card
ATM machines respond to requests in ATM card.
What is an ATM Machine?ATM simply known as Automated Teller Machine is an electronic machine used by financial institutions to perform financial transactions. It is an automated banking operation which does not require the effort of man.
ATM card is a payment card that is issued by a financial institution which enables a customer to access their financial accounts through the automated teller machine (ATM) and other point of purchase transactions.
Hence, the ATM card gives commands to the ATM machine.
Read more on atm machine:
https://brainly.com/question/24471380
#SPJ2
{Netiquette Question Worth 50 points}
[Which would be a responsible use of technology used by victims of cyber bullying]
•Finding ways to strike back at bullies online
•Buying software that allows them to track down bullies
•Changing passwords and screen names regularly
•pretending to be someone else to hide their identity
Answer:
Changing passwords and screen names regularly
Explanation:
I did it on edgenuity
In the development stages where an application is not yet sufficiently mature enough to be able to be placed into a test environment, which of the following techniques are applicable?
a. Static Binary Code Analysis and Manual Binary Review
b. Static Source Code Analysis and Manual Code Review
c. Dynamic Binary Code Analysis and Static Binary Review
d. Dynamic Source Code Analysis and Automatic Code Review
Answer:
A and C
Explanation:
Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was when the employee last performed a backup. Which type of network is the company more than likely using?
WWW/ World Wide Web.
What is "social
comparison"?
A. When you compare your social life to others' social
life
B. When you compare your life to others' social media
posts and feel like your life is worse
C. When you compare your online posts to others'
online posts and feel like yours are worse
D. When you compare your life to others' online posts
and feel like your life is better
Answer:
A. When you compare your social life to others.
Answer:
A. When you compare your social life to others' sociallife...........
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n) __________ attack.
Answer:
"Advanced persistent threat " is the right one.
Explanation:
APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period. They represent compound channel assaults that use different components including various approaches of attack.which is the correct APA format in books?
Answer:
It includes the author's last name, the year, and a page number. In the reference list, start with the author's last name and initials, followed by the year. The book title is written in sentence case
To create a list to store integers, use:________
a. ArrayList list = new ArrayList();
b. ArrayList list = new ArrayList();
c. ArrayList list = new ArrayList();
d. ArrayList list = new ArrayList();
Answer:
ArrayList<Integer> list = new ArrayList<>();
Explanation:
From the list of given options a to d
ArrayList represents the list name
Also, the syntax is similar to java programming language. Hence, I'll answer this question base on the syntax of Java programming language.
In java, the syntax to declare a list is
[Variable-name]<list-type> list = [Variable-name]<list-type>();
Replace [Varable-name] with ArrayList
ArrayList<list-type> list = ArrayList<list-type>();
From the question, the list is meant to store integers;
So, replace list-type with integer...
This gives
ArrayList<Integer> list = new ArrayList<>();
The place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___
Answer:
Ram or random access memory
Explanation:
which of the following is something that an information systems (IS) professional would do? A. devise new ways to use computers B. turn information into meaningful decisions C. help people with their technology needs D. create and maintain computer network
Answer:B
Explanation:
it professionals build and repair computers, create and aunts in networks, and help people with their technology needs.
An example of something that an information systems (IS) professional would do is: B. turn information into meaningful decisions.
An information system (IS) can be defined as a set of components or computer systems, that is typically used to collect, store, and process data, as well as for the dissemination of information, knowledge, and the distribution of digital products.
Basically, an information system (IS) interacts with its environment by receiving data in raw forms while information are received in a usable format.
Generally, all organizations make use of an information system (IS) in the following areas:
Supply chain management.To process financial accounts.Manage their workforce.Marketing channels to reach their customers or potential customers.Transform information into meaningful decisions.In conclusion, the transformation of an information into meaningful decisions that are in tandem with organizational goals and objectives is something that an information systems (IS) professional would do.
Read more here: https://brainly.com/question/25162387
Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease ____ are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery
Complete Question:
Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease ____ are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery.
Group of answer choices
A. servers
B. PaaS
C. IaaS
D. SaaS
Answer:
D. SaaS
Explanation:
Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease software as a service (SaaS) are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery.
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
Cloud computing comprises of three (3) service models and these are;
1. Software as a Service (SaaS).
2. Platform as a Service (PaaS)
3. Infrastructure as a Service (IaaS).
In Computer science, one of the most essential characteristics or advantages of cloud computing is rapid elasticity.
Which attitudes are most common among successful IT professionals?
Answer:
understanding the problem very well
writing documention to every piece of code you write
write clear and concise code
follow Industry accepted format for data storage
avoid recursion if possible
write modular code
Why is taking care of your camera important?