answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
1 year ago
10

Identify the tips to create a well-designed digital portfolio.

Computers and Technology
1 answer:
Levart [38]1 year ago
8 0

Answer:

B. She created a person website with a unique URL for her online portfolio

Explanation:

You might be interested in
Write pseudocode for a program which will ask a user to enter two numbers a and b. It then asks what operation is to be performe
sleet_krkn [62]

get int input for a

get int input for b

get string input for operator

if a is not int or b is not int throw exception and print error

if operator is not * / // or % throw exception and print error

if operator is * do multiplication of a and b and make answer c

else if operator is / do division of a and b and make answer c

else if operator is // do floor division of a and b and make answer c

else if operator is % do floor modulo of a and b and make answer c

print c

5 0
2 years ago
As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 employees who work fro
Strike441 [17]

Answer:

To provide remote network access to the users to work, the network administrator can use virtual private network (VPN) along with some firewall to protect the system from hackers and other security threats.

Explanation:

Virtual Private Network (VPN) can be used to provide remote access to the users who are currently working from some remote areas. Many companies who have their branches or franchises in different parts of the city uses VPN to connect then all with the company server.

In this way, a firewall has been needed that protect the systems of users as well as company to protect from different security hazards such as hackers, authorization of the users and other security threats.

in this case, 12 em[employees who need remote access to the network can be connected through VPN along with the installation of some suitable firewall.

8 0
2 years ago
Which describes a query? A query organizes, summarizes, and presents data in an easy-to-view format. A query allows for retrieva
notka56 [123]
There can be multiple definitions of Query in a database, however, If we go as per the definitions given above, i think most suited description is that the Query allows retrieval of information from multiple tables based on the criteria specified by the user.
0 0
2 years ago
Which technology concept uses computer resources from multiple locations to solve a common problem?​
umka2103 [35]

Answer:

Distributed memory systems

Distributed memory systems use multiple computers to solve a common problem, with computation distributed among the connected computers (nodes) and using message-passing to communicate between the nodes.

Explanation:

5 0
2 years ago
Enter a nested function in cell G8 that displays the word Flag if the Payment Type is Credit and the Amount is greater than or e
stira [4]

Answer:

IF(AND(Payment_Type = 'Credit', Amount >= 4000),'Flag')

Explanation:

Given

Search criterion 1: Payment Type: Credit

Search Criterion 2: Amount ≥

$4000

Given the above search criteria, the nested function is as follows;

IF(AND(Payment_Type = 'Credit', Amount >= 4000),'Flag')

The above statement will display the word 'Flag' without the quotes if and only if the two conditions in the brackets are satisfied

Condition 1: Payment_Type = 'Credit'

Here, Payment_Type is used because when naming a column, it's preferred to avoid space or blank characters.

So, if this condition is satisfied (i.e. if payment type is credit) it checks for condition 2

Condition 2: Amount>=4000

This mean the amount must be at least 4000.

Both conditions must be satisfied because of the AND clause in the statement.

8 0
2 years ago
Other questions:
  • When you examine a computer chip under a microscope, what will you see?
    6·1 answer
  • Social networking sites like Office Online, PayPal, and Dropbox are used to develop social and business contacts.
    6·2 answers
  • B.) Define latency and jitter for service flow in a fixed wireless system.
    11·1 answer
  • During which phase of web publishing would you use a text editor to enter codes that instruct the browser how to display webpage
    5·1 answer
  • Write the 8-bit signed-magnitude, two's complement, and ones' complement representations for each decimal number: +25, + 120, +
    11·1 answer
  • Problem 2 - K-Best Values - 30 points Find the k-best (i.e. largest) values in a set of data. Assume you are given a sequence of
    13·1 answer
  • Let's revisit our lucky_number function. We want to change it, so that instead of printing the message, it returns the message.
    10·1 answer
  • #Write a function called string_finder. string_finder should #take two parameters: a target string and a search string. #The fun
    14·1 answer
  • A school has 100 lockers and 100 students. All lockers are closed on the first day of school. As the students enter, the first s
    10·1 answer
  • A large offshore oil platform needs to transmit signals between different devices on the platform with high reliability and low
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!