Answer:
I think it’s really cool. You don’t have to find someone’s Gm ail and then write a subject and whatever else. You can just send it like a message. I love how it has the call option because it means that you don’t have to have a number to call your friends or family. And you can do business em ail while messaging whoever you need to instead of going back and forth.
You can promote your business. You can also promote your video and share your screen. It is also a good way to talk to customers to discuss what you need to. A bunch of people have emails and it’s fairly simple to just add your friend and text them.
It might be hard to figure out at first. But when you get used to it it’s fairly simple. It can also shut down due to a bug and stop working, which makes it even more complicated. You can also get creeps that can hack into your Gm ail and read all of your information.
Explanation: heres a better one with no typos
they will wash the car change into tag question
Answer:
They will wash the car, won't they?
Explanation:
A tag question usually comes after an independent clause. The tag question is most times attached with the intent of affirming the statement made in the independent clause. Our independent clause in the answer above is; "They will wash the car". The tag question, "Won't they?" is meant to affirm that statement.
Another example is, "They are going to school, aren't they?" In this example also, the independent clause makes a sentence that is to be confirmed by the tag question.
Label the following website navigation methods
according to their importance, where 1 is most
important and 3 is least important.
Site map:
Navigation menu:
Site search:
Answer:
Technology is very important
Answer:
Site map: 3
Navigation menu:1
Site search:2
Explanation:
Which of the following is NOT a benefit of pair-programming?
Code takes 15% less time to write than with a solo programmer.
Programs have fewer bugs than if written by a single programmer.
Code solutions are more creative.
o o
Bias in programs is reduced.
Answer:
Programs have fewer bugs than if written by a single programmer.
Explanation:
this is what I think personally
Coupled with risk reduction and knowledge sharing within an organization, pair programming is a key technique for producing faster, higher quality code. Thus, option B is correct.
What is the role pair programmer in the programs?Two programmers collaborate at the same workstation while using the agile software development technique known as pair programming.
The observer or navigator reads each line of code as it is entered while the driver, who is also the code writer, types it in.
Pair programming is a method where two programmers collaborate on the same block of code while using just one computer.
This introduces the idea of pair programming roles, where one performs the function of the driver (writing code) and the other that of the navigator (ensuring the accuracy of the code).
Therefore, Programs have fewer bugs than if written by a single programmer.
Learn more about pair programmer here:
https://brainly.com/question/14190382
#SPJ2
Choose the comparison operator that will create a true statement in scratch
Answer:
the first one
Explanation:
think about it. 60 equals 60! this is true!
Answer:
A is correct
Explanation:
i took this same test
Why is it important to think about the programming language to use?
Answer:
"The choice of programming language determines the type of game you can make."
Explanation:
Programming language enables us to write efficient programs and develop online things based on the certain type of code.
Which one of the following is NOT a use of a database? sales statement patient list customer list inventory list
Answer:
a sales statement
Explanation:
From the different options provided, the only one that is not a use of a database would be a sales statement. These statements usually made at the end of the month or year which detail the companies' entire sales amount for that given time period. These hold alot of information but are mainly created once every cycle so there is never a need to use a database for such files. Also, these statements are rarely modified or requested so database usage would be wasted.
The following table represents the addresses and contents (using hexadecimal notation) of some cells in a machine's main memory.Starting with this memory arrangement , follow the sequence of instructions and record the final contents of each of these memory cells: Address Contents 00 AB 01 53 02 D6 03 02 Step 1. Move the contents of the cell whose address is 03 to the cell at address 00. Step 2. Move the value 01 into the cell at address 02. Step 3. Move the value stored at address 01 into the cell at address 03.
Answer:
I DON'T KNOW THE ANSWER SO SORRY
Explanation:
BUT THANKS FOR THE POINTS
Q3: State whether each of the following is true or false. If false, explain why. 1. A generic method cannot have the same method name as a nongeneric method. 2. All generic method declarations have a type-parameter section that immediately precedesthe method name. 3. A generic method can be overloaded by another generic method with the same methodname but different method parameters. 4. A type parameter can be declared only once in the type-parameter section but can appearmore than once in the method’s parameter list. 5. Type-parameter names among different generic methods must be unique. 6. The scope of a generic class’s type parameter is the entire class except its staticmembers.
Answer:
3
Explanation:
CodeHS 6.3.8: Area of a Square with Default Parameters
Write a program that will calculate and print the area of a square where its side length is given by the user.
To compute the area, write a function named calculate_area that takes a single parameter, side_length. The parameter should be given a default value of 10.
If the user enters a length value of 0 or less, call calculate_area and use the default value. Otherwise, use the length value given as the parameter value.
For example, if the following input is given:
Enter side length: 0
The following output should be printed:
The area of a square with sides of length 10 is 100.
The programming language is not stated. I will answer this question using Python.
The program in Python where comments are used to explain each line is as follows:
#This defines the function
def calculate_area(side_length):
#This check if the side length is 0 or less
if side_length<1:
#If yes, the side length is set to 10
side_length = 10
#This prints the area of the square
print("The area of a square with sides of length",side_length,"is",(side_length**2))
#The main begins here
#This gets input for the length of the square
length = int(input("Enter side length: "))
#This calls the calculate_area function
calculate_area(length)
#The program ends here
At the end of the program, the area of the square is calculated and printed.
See attachment for a sample run
Read more about Python programs at:
https://brainly.com/question/22841107
Question:
How many hours do you spend on the Internet per day? Can you live without the Internet for a week? How many aspects of your life depend on the Internet? How many times have you complained about your Internet connection speed?
Answer:
Living with no internet is indeed a possibility and a reality for many.
It's virtually impossible to go without internet for a significant period of time. Not only do you miss out on social events, but your work suffers too. However, I'd also recommend logging off occasionally; even if just for a day or two.
Read articles offline.
Listen to podcasts offline.
Do a "brain dump" writing exercise.
Come up with a few weeks' worth of blog topics.
Interact with other humans.
Hold an impromptu staff meeting.
Take some time to relax.
Make some phone calls.
Explanation:
I spend around 6-8 hours on the Internet each day. This includes using it for work-related tasks, browsing social media, watching videos, reading news, and other online activities.
How many hours do you spend on the Internet per day?Can you live without the Internet for a week?
While you rely heavily on the Internet for work and communication, you believe you can manage without it for a week. However, it would require adjustments to your routine and finding alternative ways to handle tasks typically done online.How many aspects of your life depend on the Internet?
Numerous aspects of your life depend on the Internet. Apart from work-related tasks, you use it for staying connected with friends and family, online banking, shopping, accessing information, streaming entertainment, and more. The Internet has become an integral part of your daily life.Read more about Internet here:
https://brainly.com/question/2780939
#SPJ3
You are working as a security expert in an e-commerce enterprise. Your company recently decided on a short-term collaboration with a small business named BuyMe, and the following issue arose. Whenever your customers purchase any product from BuyMe, the e-commerce website redirects them to the BuyMe website, asking for additional authentication. This results in customers abandoning their purchases. To solve this issue, both enterprises agree to use a single authentication process wherein the users, once logged in to your website, can purchase from BuyMe without additional steps.
How should you implement this without storing the customers' credentials on the BuyMe server?
a. Use RADIUS authentication
b. Use Using Kerberos authentication
c. Use TACACS+
d. Use SAML
Answer:
Use TACACS+. IT IS THE BEST
Explanation:
IT IS THE BEST
Answer: Use SAML
Explanation:
Homework: Insertion Sort
Create a public class named InsertionSorter. It should provide one class method sort. sort accepts an array of Comparables and sorts them in ascending order. You should sort the array in place, meaning that you modify the original array, and return the number of swaps required to sort the array as an int. That's how we'll know that you've correctly implemented insertion sort. If the array is null you should throw an IllegalArgumentException. You can assume that the array does not contain any null values.
To receive credit implement insertion sort as follows. Have the sorted part start at the left and grow to the right. Each step takes the left-most value from the unsorted part of the array and move it leftward, swapping elements until it is in the correct place. Do not swap equal values. This will make your sort unstable and cause you to fail the test suites.
Answer:
Explanation:
I have written the code in Java. It contains the class Insertion Sorter which has the InsertionSort function. This function uses the insertion sort algorithm to sort a comparable array and if it fails to do so for whatever reason it throws an Illegal ArgumentException. If it sorts the array correctly it returns the number of changes that needed to be made in order to correctly sort the array. Due to technical difficulties I have attached the code as a text document below and proof of output in the picture below as well.
_________is a type of bullying that occurs when a person continuously pursues another and gives
unwanted attention
Answer:
stalking ?
Explanation:
Answer:
stalking
Explanation:
Which of the following job duties would a software developer perform?
A. developing a product that is easy to use and meets a customer’s need
B. establishing security procedures to protect important information
C. managing and securing data
D. writing the code to make a new application work
Answer:
Either B or D but I think mostly B cause it makes more sense
Answer:
A. developing a product that is easy to use and meets a customer’s need
Explanation:
lnao its easy
definitely not b or d
Consider four Internet hosts, each with a TCP session. These four TCP sessions share a common bottleneck link - all packet loss on the end-to-end paths for these four sessions occurs at just this one link. The bottleneck link has a transmission rate of R. The round trip time, RTT, for all fours hosts to their destinations are approximately the same. No other sessions are currently using this link. The four sessions have been running for a long time. What is the approximate throughput of each of these four TCP sessions
The correct response is - The TCP protocol creates a three-way connection between hosts on a network to send packets. It is a connection-oriented protocol. It is a protocol found in the OSI network model's transport layer. Given that all lost packets are sent again, it is trustworthy.
What is a TCP protocol?One of the key protocols in the Internet protocol family is the Transmission Control Protocol. It was first used to supplement the Internet Protocol in the first network installation. TCP/IP is the name given to the full suite as a result.
The usage of TCP allows for the safe exchange of data between the server and the client. No matter how much data is transferred across the network, it ensures its integrity. It is therefore used to transfer data from higher-level protocols that demand the arrival of all sent data.
The usage of TCP allows for the safe exchange of data between the server and the client. No matter how much data is transferred across the network, it ensures its integrity.
To read more about TCP protocol, refer to - https://brainly.com/question/27975075
#SPJ6
Which of the following is NOT a common type of mic:
A. Lavalier
B. Shotgun
C. Stick
D. Parabolic
E. Handheld
Answer:
Uhh all of them are mics
Explanation:
Describe about abacus
An abacus is a calculation tool used by sliding counters along rods or grooves, used to perform mathematical functions. In addition to calculating the basic functions of addition, subtraction, multiplication and division, the abacus can calculate roots up to the cubic degree.
Answer:
An abacus is a calculation tool used by sliding counters along rods or grooves, used to perform mathematical functions. In addition to calculating the basic functions of addition, subtraction, multiplication and division, the abacus can calculate roots up to the cubic degree.
Which option is the default configuration of the Junk Email Options in Outlook 2016?
No Automatic Filtering
Low
High
Safe Lists Only
Answer:
No Automatic Filtering
Answer:
NO automatic filtering
Explanation:
i took the quiz
Hiding text in a picture is known as?
Answer:streganography
Explanation: it allows you to hide text in an image without anyone knowing
a paragraph about the different types of college degrees
Answer:
There are four major categories of degrees available for postsecondary students. These college degrees in order of complexity are associate, bachelor's, master's, and doctoral degrees. Earning one of these degrees can take 2-8 years, depending on the level of the degree and field of study. Graduate-level university degrees may require students to complete one or more undergraduate programs prior to enrollment. When comparing different degrees, students can consider which program best fits their career goals and academic interests. Keep in mind that all college degrees require completion of a high school diploma first.
Explanation:
Multiple Choice: We have been assigned the task of developing a software testing tool (tester) that can assess reachability of statements in a program. Namely, given a program and a statement x in the program (line in the code), the tester should produce a sequence of inputs that demonstrates that the program can reach statement x, or declare that statement x is not reachable under any input sequence. What should we respond to the manager who assigned this task
Answer:
A. There is no algorithm to decide whether this can be done or not.
Explanation:
We should respond to the manager who assigned this task that there is no algorithm to decide whether this can be done or not. This is because there are many unknowns with the program that is provided. There are various programming languages and each one has its own structure and requirements in order to test them. Also, each function is created differently with different inputs that are necessary and different algorithms used. It is impossible to design a single algorithm that works to test every single provided program. That is why testers have to create custom test cases for each function.
When people become more dependent on digital technology in their lives, the potential for data misuse will grow.
Explain the above sentence in your opinion.
Answer and I will give you brainiliest
Answer:
abbjiaj
zzz
Explanation:
uuwuwahsbsbsssiaaivab njw
As a student, how can you sustain focus and attention with technology distracting you from things that matter (academic, personal relationships, community involvement)?
To be able to sustain focus and attention with technology distracting you, one can make sure that they have no social media account, have an analogue cell phone and no use of the TV regularly.
How is technology a distraction to students?The use of technology by college students have been found to have its usefulness as well as its effect on student.
The ways to stop Internet Distractions are:
Make up your mind on what Really Matters.Know that the use of Smartphone can support and be of issue to your Work.Turn Off Notifications. Deactivate your social media account.Conclusively, by doing the above, on can be able to stop technology Distractions.
Learn more about technology from
https://brainly.com/question/25110079
In the file Calculator.java, write a class called Calculator that emulates basic functions of a calculator: add, subtract, multiply, divide, and clear. The class has one private member field called value for the calculator's current value. Implement the following Constructor and instance methods as listed below: public Calculator() - Constructor method to set the member field to 0.0 public void add(double val) - add the parameter to the member field public void subtract(double val) - subtract the parameter from the member field public void multiply(double val) - multiply the member field by the parameter public void divide(double val) - divide the member field by the parameter public void clear( ) - set the member field to 0.0 public double getValue( ) - return the member field
Answer:
Explanation:
The following calculator class written in Java has all the methods and variables requested in the question, each completing their own specific function to the member variable.
class Calculator {
private double member;
public Calculator() {
this.member = 0.0;
}
public void add(double val) {
this.member += val;
}
public void subtract(double val) {
this.member -= val;
}
public void multiply(double val) {
this.member *= val;
}
public void divide(double val) {
this.member /= val;
}
public void clear() {
this.member = 0.0;
}
public double getValue() {
return this.member;
}
}
How is advertising using social media different from using traditional advertising?
Answer: Social media marketing allows for more succesful and personalized messaging, but traditional marketing tactics are usually more static with a harder reach of audience.
Mikayla is listening to music while she completes research for a school assignment. The input and output devices are able to communicate with each other because the computer has
central processing memory
a central processing unit
random access memory
read-only memory
Answer:
A central processing unit (CPU)
The link between violence in the media and school shootings has been proven to be direct. True/false?
Answer:
most of the time a school shooting will be done by a kis that has been bullied and picked on a lot (aka the quiet kid ) if we could stop bullying we could decreese the number of school shootins by a lot
Explanation:
Answer:
False
Explanation:
At least in my assignment the correct answer was false.
Introduction to Programming Workbook
Draw flowchart to find the largest among threu different numbers entered by a user
Can somebody describe at least two cryptocurrencies with applicable/appropriate examples and discuss some of the similarities and differences?
6.20 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase and whose output is an acronym of the input. If a word begins with a lower case letter, don't include that letter in the acronym. Assume there will be at least one upper case letter in the input. Ex: If the input is: Institute of Electrical and Electronics Engineers the output should be: IEEE
Answer:
Explanation:
The following code is written in Python. It creates a function that takes in a phrase as an argument. Then it splits the phrase into a list of words. Next, it loops through the list and adds the first letter of each word into the acronym variable if it is a capital letter. Finally, returning the acronym variable. Output can be seen in the attached picture below.
def accronymGenerator(phrase):
phrase_split = phrase.split(' ')
acronym = ""
for x in phrase_split:
if x[0].isupper() == True:
acronym += x[0]
else:
pass
return acronym