answer: A number with a decimal
Answer: A number with a decimal.
Explanation:
Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?
A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.
Answer:
C. Configure a safe sender
Explanation:
It’s dabest thing to do
As per the given scenario, Walt should need to configure a safe sender. The correct option is C.
What is configuration?A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.
Configuration frequently involves picking the right hardware, software, firmware, and documentation.
A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.
The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.
Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.
Thus the correct option is C.
For more details regarding configuration, visit:
https://brainly.com/question/13410673
#SPJ2
how do you start a convo with a specific person?
While reading, David encounters a word he doesn’t know. What is the first step he should take to figure out the meaning of the word?
Read around the unfamiliar word.
Find clues in the words surrounding the unfamiliar word.
Read the sentence using a substitute word.
Skip the sentence and continue reading.
Answer:
David should read around the unfamiliar word. Hope this helps! :)
The first option is correct.
The following information should be considered:
At the time of reading, David does not know the word. So here he should read around the non-familiar word so that he could understand what the word wants to convey.Therefore we can conclude that the first option is correct.
Learn more: brainly.com/question/9269318
CAN SOMEONE PLEASE HELP ME
ITS DUE TODAY
BRAINILIEST WILL BE GIVEN!!!!!!!!!!!!
( THIS IS ACTUALLY GRAPHIC DESIGN)
ma'am dont count this as answer but WHAT ARE YOU TELLING PPL TO DO THIS IS TO MUCH TO ASK FOR T_T
Which action does not happen in each iteration of the repeat loop in the
code?
O A. The shark position is set to the top left of the screen.
O B. The number of sharks decreases.
O C. The program pauses for 2 seconds.
D. The shark follows the fish at a speed of 20.
The action does not happen in each iteration of the repeat loop in the code is the number of sharks decreases.
What does iteration mean?In terms of IT and computer programming, the word iterative is known to be a term that connote the act where the set up of a product or application is said to be improved through the use of repeated review and also that of testing.
Note that based on the program above, the action does not happen in each iteration of the repeat loop in the code is the number of sharks decreases as it does not concern it.
Learn more about iteration from
https://brainly.com/question/25754804
#SPJ2
I need help now with YT
How do I change the barrier surrounding the video?
Usually it's black but mine is white! please help!
Answer: You might have dark mode on. You can check by going to settings and there should be a dark mode option. If that is on, turn it off and it should be back to normal.
Answer:
you probably have dark mode on, go to your settings and turn it off
Explanation:
What is the name of a coding sequence that is executed multiple times in a program?
a break
a pass
a loop
a suite
Answer:
a loop
Explanation:
a loop basically means something is stuck doing the exact same thing multiple times, so it means the same for programing
20 points and brainliest please help
Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:
1. Decide on the message you would like to display to the screen. Some ideas include:
1. Your favorite book title or TV show and why you like it
2. A few sentences sharing information about you
3. Your favorite sport and team or athlete
2. Use two variables to store your message.
Answer:
Main Module()
Declare String P1 = "The Fourth Closet"
Declare String P2 = "because it's about FNAF"
Do
Display P1
Display P2
End Module
Explanation:
You can put whatever in P1 and P2
Answer:
Explanation:
Insert your pseudocode here:
Begin Program
My name is Sophia, favorite book is “I found you” because the author had well described the book.
I was born on February 18th, 2008
Name my first variable (About me)
Name my second variable (Birth date)
Print my first variable (About me)
Print my second variable (Birth date)
End Program
(This is what I did}
Choose all statements that identify the benefits of programming design.
It allows programmers to be more creative in writing the code.
It provides a design approach to a specific type of problem.
It ensures that all code will work together.
It results in fewer lines of code.
i hope this helps ( B and C)
b and c
Explanation:
b and c.........................
Help me Please Due today
Answer:
1. Syntax search looks for matching documents that contain one or more specific words
2. quotation marks can be used to make a keyword search more specific when looking for a specific phrase
3. Boolean operators can be used to broaden (OR) or narrow (AND) a search
Answer:
1. A keyword search looks for matching documents that contain one or more specified words.
2. Quotation marks can be used to make a keyword search more specific when looking for a specific phrase.
3. Boolean operators can be used to broaden (OR) or narrow (AND) a search.
Explanation:
A type of search that looks for matching documents that contain one or more words specified by the user.
If you put quotation marks around a word or phrase, the search results will only contain results that match exactly the word or phrase in the quotes.
Boolean operators can broaden (expand) and narrow (restrict) searches to increase the number of relevant search results we retrieve.
and there you go
sorry its saying my thing is tooo small
Answer:
Global knowledge
Explanation:
It has been proved by scientists that the earth is round
Hope this helps!
Try to guess my favorite music genre and i will give you a brainliest.
Answer:
Rock n' roll. This I know for sure.
will I be able to play among us?
Answer:
yea
Explanation:
Answer:
no clue but this gives me 10 points.
Explanation:
How do I find/search for someone???
I've been looking forever. Please help!!!
Answer:
if you have seen their profile before and know their name, search their name in your history, or if you know someone who is friended them and your friends with them, then look at your friends, friends list and they should be there, or if they have commented and or answered somewhere you have been, you can search there.
Explanation:
Which are ways cybercriminals act? Select 3 options.
log keystrokes of other users
destroy information
sell usernames and passwords
share open-source software
correct social injustice
Answer:
Destroy information, log keystrokes of other users and sharing open-source software
Explanation:
Log keystrokes of other users, destroy information, Sell usernames and passwords are the three ways in which cybercriminals act.
What are cybercriminals?Cybercriminals are individuals or groups who use technology and the internet to commit crimes, including theft, fraud, identity theft, and other malicious activities.
Cybercriminals operate in three ways:
Logging other users' keystrokes: This is a type of cyber attack in which the attacker uses software or hardware to record every keystroke a user makes on their computer or mobile device.Attempt to destroy or alter data stored on a computer or network: Cybercriminals may attempt to destroy or alter data stored on a computer or network in order to cover their tracks or to cause harm to the organisation.Selling usernames and passwords is a common way for cybercriminals to make money.Thus, share open-source software and correct social injustice are not ways in which cybercriminals act.
For more details regarding cybercriminals, visit:
https://brainly.com/question/31148264
#SPJ3