Bullying that takes place through the use of digital technologies is known as cyberbullying. Due to increasing technology, cyberbullying is increasing day by day.
What is cyberbullying?Cyberbullying happens on social media, messaging platforms, gaming platforms, and mobile phones, among other places.
It is a pattern of behavior intended to frighten, anger, or shame those who are being targeted.
Thus, bullying that takes place through the use of digital technologies is known as cyberbullying. Due to increasing technology, cyberbullying is increasing day by day.
Learn more about cyberbullying
https://brainly.com/question/8142675
#SPJ1
what devices do not allow data stored on them to be modified.
Answer:
Read-only memory (ROM) is a type of non-volatile memory used in computers and other electronic devices. Data stored in ROM cannot be electronically modified after the manufacture of the memory device.
The question is provided in the image below.
Answer: b
Explanation:
Sarah has to draw a shape that looks like a revolving circle for her class project in technical drawing. What should Sarah draw?
A cylinder
B. cone
C. sphere
D. ellipsoid
E. prism
The drawing that Sarah should draw so that it looks like a revolving circle for her class project in technical drawing is a sphere.
What is a sphere?
A sphere is a three-dimensional equivalent of a two-dimensional circle. A sphere is a collection of points in three-dimensional space that are all the same distance r from a particular point.
Despite the fact at which angle you look, a sphere always looks like a circle. This property of the sphere can be used by Sarah. And hence, the drawing that Sarah should draw so that it looks like a revolving circle for her class project in technical drawing is a sphere.
Learn more about Sphere:
https://brainly.com/question/11374994
#SPJ1
How has motherboard evolved over time ?
Answer:
more devices were integrated into the motherboard.
Explanation:
It was a slow trend initially though, as I/O ports and disk controllers
Select the correct text in the passage.
Which of the following statements is true with regards to satellite Internet access?
It is cheap.
It is the slowest internet access technology.
It can be used in rural and remote areas.
It requires direct line-of-sight to work.
It requires major installation of new infrastructure.
It covers a large geographical area.
An information system can enhance core competencies by
Answer:
An information system can enhance core competencies by: encouraging the sharing of knowledge across business units.
Explanation:
Hope this helps you ! please mark me brainless
The Greater Than sign (>) is an example of
operator.
Answer:
logical
Explanation:
the greater than sign (>) is an example of logical operator.
A > sign asks if the first value is greater than the second value. That is, is the value or expression to the left of the > sign greater than the value or expression to the right side? For example, the statement (A > B) is true if A is greater than B
https://brainly.in/question/6901230
What is installing?
the process of putting new software on a computer
the process of replacing an older version of software with a newer version
O the process of limiting who is allowed to access your information
O the process of programming a language to use on a web page
The process of putting new software on a computer
What kind of internal factors influence the process of business enterprise
Answer:
The three main internal factors are:
Human resources
Finance
Current or modern technology
Explanation:
Financial resources like funding, investment opportunities, and sources of income.
Physical resources like the company's location, equipment, and facilities.
Human resources like employees, target audiences, and volunteers.
Calvin is creating a 3D shell of a turtle. He is creating a sculpted, intricate design for the pattern he wants on the shell, but wants it to tile across the surface of the shell. What tool can he use to do this?
A.
Dynamic Topology
B.
Symmetry
C.
Remesh
D.
Masking
(This is a question from edmentum's 3d modeling class)
2. Write the pseudocode to print all multiples of 5 between 10 and 25 (including both
10 and 25)
Answer:
Read code below
Explanation:
n = 10
while n is <= 25{
print(n)
n +=5
}
This while loop will print all multiples of 5 between 10 and 25 by starting with 10 as n, printing n, then incrementing n by 5 until n is greater than 25.
You are creating a game in which players lose their silver if they are robbed by pirates. Which line of code would remove the silver from the list of treasures? O A. treasures.pop("silver") O B. treasures.remove("silver") OC. treasures.pop["silver"] O D. treasures.remove["silver"]
The line of code that would remove the silver from the list of treasures is treasures.remove("silver").
What is needed to create a game?In the development of a game, it's vital to know what is needed in the creation of that game. Especially in the area of inputs such as coding.
Conclusively, The line of code that would remove the silver from the list of treasures is treasures.remove("silver"). as it contains the information on the silver removal.
Learn more about game from
https://brainly.com/question/857914
#SPJ1
Which of the following best describes the impact of Creative Commons?
Creative Commons gives creators of digital content the ability to indicate how their works can be legally used and distributed, enabling broad access to digital information.
Creative Commons gives Internet users the right to legally use and distribute any previously copyrighted work, enabling broad access to digital information.
Create Commons provides lossless transmission of messages, enabling reliable distribution of digital information.
Creative Commons provides private transmission of messages, enabling secure distribution of digital information.
Answer:
it’s just a screenie hope it helps
What is the function of a primary key in a table? to uniquely identify each record in the table to uniquely identify foreign keys in the table to secure table data to secure the foreign keys in the table
Answer:
A. To uniquely identify each record in the table
brainliest pls?
A system is being developed to help pet owners locate lost pets. Which of the following best describes a system that uses crowdsourcing?
A mobile application and collar that uses GPS technology to determine the pet’s location and transmits the location when the owner refreshes the application
A mobile application and collar that uses wireless technology to determine whether the pet is within 100 feet of the owner's phone and transmits a message to the owner when the pet is nearby
A mobile application that allows users to report the location of a pet that appears to be lost and upload a photo that is made available to other users of the application
A mobile application that transmits a message to all users any time a lost pet is returned to its owner
Crowdsourcing is used by mobile application that allows users to report the location of a pet that appears to be lost.
What is a mobile application?A mobile application is known to be a kind of computer app or program that has been made to handle or run itself on a mobile device e.g. phone, etc.
Conclusively, the option that best describes a system that uses crowdsourcing is the mobile application that allows users to report the location of a pet that appears to be lost and upload a photo that is made available to other users of the application and thus everyone can help to look for it.
Learn more about mobile application from
https://brainly.com/question/9477543
#SPJ1
what is e-bidding? explain in 3 lines
Answer:
An ‘‘‘electronic bidding system ‘‘‘ is an electronic bidding event according to defined negotiation rules. A buyer and two or more suppliers take part in this online event.
The probability of event A occurring is 10/10. The probability of event B occurring is 0/10. What is the entropy of this system? Please show work.
The events A and B are the outcomes of the probabilities in the system
The entropy of the system is 0
How to determine the entropy?The probabilities are given as:
P(A) = 10/10
P(B) = 0/10
The entropy is calculated using:
[tex]H(x) = -\sum \limits^{n}_{i = 1} p_i * \log_2(p_i)[/tex]
So, we have
[tex]H(x) = -10/10 * \log_2(10/10) - 0/10 * \log_2(0/10)[/tex]
Evaluate the products
[tex]H(x) = -\log_2(10/10) - 0[/tex]
Evaluate the sum
[tex]H(x) = -\log_2(10/10)[/tex]
Evaluate the quotient
[tex]H(x) =- \log_2(1)[/tex]
Express 1 as 2^0
[tex]H(x) =- \log_2(2^0)[/tex]
Apply the power rule of logarithm
[tex]H(x) =- 0\log_2(2)[/tex]
Evaluate the product
H(x) =0
Hence, the entropy of the system is 0
Read more about probability at:
https://brainly.com/question/25870256
fghfghgfhgfhgfhfghgfhgfhfghgfhgfh
Answer:
Stay safe, stay healthy and blessed.
Have a good day !
Thank you
Answer:
are you okay
Explanation:
just want to know
Identify the calculation performed by the following code.
function calcArea(length, width) {
var rectArea = length*width;
return rectArea;
}
var x = 8;
var y = 6;
calcArea(x, y);
a.
48
b.
96
c.
28
d.
56
Answer:
48
Explanation:
The function returns length * width
In the function call, the values are legnth: 8 and width: 6 this means the function is returns 8 * 6 wich is 48.
Discusse five advantages of utilising DBMS over a file based system
Answer:
Data concurrency – ...
Data searching – ...
Data integrity – ...
System crashing – ...
Data security –
Explanation:
100 PTS! The first network was called:
A. the Internet
B. ARPANET
C. the network
D. networking
Answer:
B
Explanation:
.....................
Answer: B. ARPANET
Explanation:in full Advanced Research Projects Agency Network, experimental computer network that was the forerunner of the Internet.
Which statement describes a difference between front-end and back-end databases?
Answer:
So a statement could be the front-end is what we see and the back-end is what we don't see, the behind the scenes. Like a play, we see the characters and them acting out a story but we dont see who is doing the lights, playing the music, fixing the costumes and makeup etc..
Explanation:
The term front-end means interface while the term back-end means server. So imagine you go on your social media app, what you can see like your friends list and your account and the pictures you post, who liked the pictures and all of that is called the front-end and is what you as a user can interact with; front-end development is the programming that focuses on the visual aspect and elements of a website or app that a user will interact with its called in other words the client side. Meanwhile, back-end development focusing on the side of a website users can't see otherwise known as the server side, its what code the site uses and what it does with data and how a server runs and interacts with a user on whatever device surface they're using.
Answer:
B is the answer
Explanation:
Some one in the first response said it not me but he just saved me from a C
Can anyone help me how to fix this code? The output aren't the same as the datafile. It can't be in a matrix shape in the data file.
#include <iostream>
#include <fstream>
using namespace std;
int main()
{
ofstream myfile("Matrix.dat",ios::app);
int A[100][100], B[100][100], row1, co11, row2, co12, i, j, k;
cout << "Enter no. of rows for matrix A: ";
cin >> row1;
cout << "Enter no. of columns for matrix A: ";
cin >> co11;
cout << "Enter no. columns for matrix B: ";
cin >> row2;
cout << "Enter no. of rows for matrix B: ";
cin >> co12 ;
myfile << row1 <<endl;
myfile << co11 <<endl;
myfile << row2 <<endl;
myfile << co12 <<endl;
myfile << endl;
while (co11!=row2)
{
cout << "Sorry! Column of matric A is not equal to row of matrix B.";
cout << "Please enter rows and columns for matrix A: ";
cin >> row1 >> co11;
cout << "Please enter rows and column for the maxtrix B: ";
cin >> row2 >> co12; }
//read matrices
//Storing elements of matrix A
cout << endl << "Enter elements of matrix A:" << endl;
for(i = 0; i < row1; ++i)
for(j = 0; j < co11; ++j)
{
cout << "Enter element A" << i + 1 << j + 1 << " : ";
cin >> A[i][j];
}
//Storing elements of matrix B
cout << endl << "Enter elements of matrix B:" << endl;
for(i=0; i < row2; ++i)
for(j=0; j < co12; ++j)
{
cout << "Enter element B" << i + 1 << j + 1 << " : ";
cin >> B[i][j];
}
//Displaying output of two matrix
{
cout << " \n Matrix A: \n " << endl;
for(i = 0; i < row1; ++i)
{
for(j = 0; j < co11; ++j)
cout << A[i][j] << " ";
cout << endl;
myfile << A[i][j] << " ";
myfile << endl;
}
cout << "\n Matrix B: \n " <<endl;
for(i = 0; i < row2; ++i)
{
for(j = 0; j < co12; ++j)
cout << B[i][j] << " ";
cout << endl;
myfile << B[i][j] << " ";
myfile << endl;
}
return 0;
}
}
Answer:
#include <iostream>
#include <fstream>
using namespace std;
int main()
{
ofstream myfile("Matrix.dat", ios::app);
int A[100][100], B[100][100], row1, co11, row2, co12, i, j, k;
cout << "Enter no. of rows for matrix A: ";
cin >> row1;
cout << "Enter no. of columns for matrix A: ";
cin >> co11;
cout << "Enter no. columns for matrix B: ";
cin >> row2;
cout << "Enter no. of rows for matrix B: ";
cin >> co12;
myfile << row1 << endl;
myfile << co11 << endl;
myfile << row2 << endl;
myfile << co12 << endl;
myfile << endl;
while (co11 != row2)
{
cout << "Sorry! Column of matric A is not equal to row of matrix B.";
cout << "Please enter rows and columns for matrix A: ";
cin >> row1 >> co11;
cout << "Please enter rows and column for the maxtrix B: ";
cin >> row2 >> co12;
}
//read matrices
//Storing elements of matrix A
cout << endl << "Enter elements of matrix A:" << endl;
for (i = 0; i < row1; ++i)
for (j = 0; j < co11; ++j)
{
cout << "Enter element A" << i + 1 << j + 1 << " : ";
cin >> A[i][j];
}
//Storing elements of matrix B
cout << endl << "Enter elements of matrix B:" << endl;
for (i = 0; i < row2; ++i)
for (j = 0; j < co12; ++j)
{
cout << "Enter element B" << i + 1 << j + 1 << " : ";
cin >> B[i][j];
}
//Displaying output of two matrix
{
cout << " \n Matrix A: \n " << endl;
for (i = 0; i < row1; ++i)
{
for (j = 0; j < co11; ++j)
{
cout << A[i][j] << " ";
myfile << A[i][j] << " ";
}
myfile << endl;
cout << endl;
}
myfile << endl;
cout << "\n Matrix B: \n " << endl;
for (i = 0; i < row2; ++i)
{
for (j = 0; j < co12; ++j)
{
cout << B[i][j] << " ";
myfile << B[i][j] << " ";
}
myfile << endl;
cout << endl;
}
return 0;
}
}
Explanation:
I believe the issue was just a matter of when << endl; was being used.
My results:
2
2
2
2
1 2
3 4
5 6
7 8
I'm not exactly how this is supposed to look, but based on the image, this seems like the target output format.
Please test this code. If it is not what you were looking for, then tell me what's wrong with the output.
How to write a C++ program that lets the user guess if a randomly generated integer is even or odd then the computer lets them know if they are correct or incorrect
#include <iostream>
using namespace std;
int main() {
string input;
string rand_type;
int number=rand()%100+1; //number between 1 and 100
if ( number % 2 == 0)
rand_type= "even";
else
rand_type="odd";
cout << "your guess: ";
cin >> input;
if ( input== rand_type)
cout << "correct.\n";
else
cout << "incorrect.\n";
return 0;
}
drive.
safely*
How many years was Eric sentenced to prison?
life
22 years
30 years
5 years
Answer:
22
Explanation:
Thabo has a small barber shop and he uses Microsoft applications to keep track of his stock and to create posters for advertising his barber shop. Thabo is worried about customers coming to the barber shop during the pandemic, as there might be difficulties adhering to social distancing rules and controlling overcrowding. You have informed Thabo about a great information system that could be used by his customers to place book for specific time slots as well as communicating with Thabo. Thabo needs some convincing about implementing a computerised information system.
Q.1.1 In your quest to convince discuss at least five benefits of implementing an information system in Thabo’s business.
Q.1.2 Thabo understand the benefits of implementing an Information system in his business. However, Thabo requires more information regarding what entails a successful information system.
Discuss, using appropriate examples, the components of an Information system and their role applicable to Thabo’s barber shop
An information system is crucial to the success of a business. Itemized below are five benefits of operating an information system in a business.
What are the benefits of an Information System?Information systems are important because:
An information system requires the following:
Hardware for the computer workstation and addendumsSoftwareA network communication amongst the computers and hardwarea map of the company's processes and the people responsible for such processesA procedural manual.Existing data from the business.For the barber's shop, for example, some of the components of the information system he must put in place are:
A workstation that collects information about:
ClientsDetails of SalesExpensesCompliance dates and records etc.Learn more about Information Systems at:
https://brainly.com/question/25226643
y library> COMP 107: Web Page Design home > 49. LAB Auto loan (CSS) Students: Section 4.9 is a part of 1 assignment Week 7 LAB: Auto Loan (CSS) 4.9 LAB: Auto loan (CSS) Create an external stylesheet so the provided HTML produces the following web page Comparison of Dealer Incentives and Loan Offers Purchase Offer 1 Purchase Offer 2 am Cost Purchase price $33.500 Purchase price Cash incentive rebate $0 Cash incentivebate Loan term (months) 48 Loan term (mores Annual percentage rate (APR) 32 Annual porcentago (APS) Monthly payment 572530 Monthly payment search D O 方 E
This lab requires that you create an external stylesheet to style the web page. You should include elements such as font size, font family, font weight, font style, font color, background color, background image.
What is the elements?Elements are the basic substances that make up all matter in the universe. They are the fundamental building blocks of all matter and are made up of atoms. There are currently 118 known elements, including hydrogen, oxygen, carbon, nitrogen, and iron. Elements are organized on the periodic table according to their chemical and atomic properties. They are classified by their atomic number, number of protons, and chemical properties. When elements combine, they form compounds, which can have properties that are different from the elements that make them up.
To learn more about elements
https://brainly.com/question/29338740
#SPJ1
Which of the following is an example of how high student loan debt can
impact a person's life decisions?
Student loan debt is the debt owed by the students to a financial institution. The person has to choose public transportation over a personal vehicle as they cannot afford a downpayment.
What is the impact of the student loan?Students loan are the debt that is incurred by the students for educational purposes and affects the quality of the life of a person as they need to save money to pay the debt.
The student owing money cannot afford to buy their vehicle because of the downpayment and will choose to use public transportation over buying a car to save money.
Therefore, high student loans will lead to the use of public transportation instead of buying cars.
Learn more about loans here:
https://brainly.com/question/27205887
#SPJ1
How do I code strings in java
Answer: Below
Explanation:
Prescribe variable as string, and anything assigned to it will be a string.
Example:
String java_string;
java_string = "Hello world";
Which CPT icon should be considered when entering CPT codes into a spreadsheet for numerical sorting
Answer:
##
Explanation:
Hashtag (#) symbols identifies codes out of numerical sequence. These codes are listed in Appendix N. Star symbols identify codes that, when appended by modifier 95, can be used to report telemedicine services.