_______tools enable people to connect and exchange ideas.A) Affective computing. B) Social media. C) Debugging D) Computer forensics.

Answers

Answer 1

Answer:

B) Social media.

Explanation:

Social media is well, a media, that allows you to share things with people and have discussions.


Related Questions

Which of these browsers was the first widely adopted?
1. Internet Explorer
2. Chrome
3. Firefox
4. Netscape

Answers

Answer:

netscape

Explanation:

Complete the statement below with the correct term.

A single-mode
uses a single ray of light, called a mode, to transmit data.

Answers

Answer:

Its Fiber

Explanation:

Trust me

Answer:

Data transfer through the core using a single light ray (the ray is also called a mode).

The core diameter is around 10 microns.

At distances up to 3 km, single mode delivers data rates up to 10 Gbps.

Cable lengths can extend a great distance. Or FIBER

Explanation:

hope this helps

Suppose you have a class Ship, which was written by another programmer who used to work for your employer. Ship is used in several different applications. Ship contains a public method called getBearing() that consults gyroscopes and a compass to determine the direction in which the ship is moving and returns a Location object. You need to refactor the code to use a GPS receiver instead. You should

Answers

Answer:

Research of the GPS features and the modules and packages needed by the programming language to implement and receive data from a GPS tracker.

Explanation:

The Ship class is a blueprint that holds a data structure of a ship's location in coordinates. The location variable can be changed using the getBearing method and an instance of the ship class can be made several times for different ships in the harbor. This class depicts the power of object-oriented programming.

Refactoring is a concept in software engineering where source codes are modified to achieve code efficiency and speed. All programming language source code should be refactored where needed with the right packages or modules.

Which statement is true about the purpose of a work in process constraint?

Answers

The available options are:

A. It identifies possible constraints for Solution completion.

B. It helps analyze, approve, and track Portfolio Epics and Enablers.

C. It captures where all new "big" ideas come from.

D. It encourages collaboration and enables

Answer:

It identifies possible constraints for Solution completion

Explanation:

Work in Process is an activity or operational related term that describes a form of self-assigned restriction by a team or organization to aid them in regulating their responsibility, exercise corporate reasoning, and recognize alternatives for lasting development.

Hence, in this case, considering the available option, the correct answer is that Work in Process " identifies possible constraints for Solution completion."

The statement is true about the purpose of a work in process constraint is that it identifies possible constraints for Solution completion.

The WIP limits is often called the work-in-process limits. They are known as fixed constraints. it is implemented on Kanban boards, and it aids teams actively to remove waste from their processes.

It also helps teams to optimize their workflows for value delivery.

The WIP limits is used in agile development as it set the maximum amount of work that can exist in each status of a workflow.

Learn more from

https://brainly.com/question/15395767

The full question is below

Which statement is true about the purpose of a work in process constraint?

The options to the question are:

A. It identifies possible constraints for Solution completion.

B. It helps analyze, approve, and track Portfolio Epics and Enablers.

C. It captures where all new "big" ideas come from.

D. It encourages collaboration and enables

Question 4
When something is saved to the cloud, it means it's stored on Internet servers
instead of on your computer's hard drive.

Answers

Answer:

Wait is this a question or are you for real

Answer:it is stored on the internet server instead

of your computer's hard drive.

Explanation:

the cloud is the Internet—more specifically, it's all of the things you can access remotely over the Internet.

write a program that first asks the user to enter three real numbers using GUI input. Print the sum if all three numbers are positive, print the product of the two positive numbers if only one is negative - use a nested if. Then, ask the user to enter two real numbers from the console. If both numbers are negative, print the quotient.

Answers

Answer:

Here is the complete program:

import javax.swing.JOptionPane;  //to use GUI in JAVA application

import java.util.Scanner;  //to take input from user at console

public class Main {

public static void main(String[] args) {  //start of main function body

 String num1, num2,num3;  //declare three variables to store strings of numbers for input dialog

 double number1, number2, number3, sum,product; //declare three double type variables to hold the real numbers  

 num1 = JOptionPane.showInputDialog("num1");  //shows a dialog box prompting user to enter value of first number i.e. num1

 number1 = Double.parseDouble(num1);  //scans and reads the value of first input number i.e. number1    

 num2 = JOptionPane.showInputDialog("num2");  //shows a dialog box prompting user to enter value of second number i.e. num2

 number2 = Double.parseDouble(num2);   //reads number2  

               num3 = JOptionPane.showInputDialog("num3");  //shows a dialog box prompting user to enter value of third number i.e. num3

 number3 = Double.parseDouble(num3);   //reads number3  

   if(number1>0&& number2>0 && number3>0){  //checks if all three numbers are positive

   sum = number1 + number2+ number3;  //displays the sum by adding all three positive numbers

   JOptionPane.showMessageDialog(null, "the sum is : " + sum , "Results", JOptionPane.PLAIN_MESSAGE );      }   // displays the result of sum in a message dialog box

 

    if(number1<0 && number2>0 && number3>0)      {  //checks if number2 and number3 are positive

   product = number2*number3;  //computes product

   JOptionPane.showMessageDialog(null, "the product is : " + product , "Results", JOptionPane.PLAIN_MESSAGE );      }  //displays the result

   else if (number2<0&&number1>0&&number3>0){  //checks if number1 and number3 are positive

    product = number1*number3;  //computes product

JOptionPane.showMessageDialog(null, "the product is : " + product , "Results", JOptionPane.PLAIN_MESSAGE );      }  //displays the result

   else if (number3<0 && number1>0 && number2>0)     {  //checks if number1 and number2 are positive

     product = number1*number2;  //computes product of 2 positive numbers

     JOptionPane.showMessageDialog(null, "the product is : " + product , "Results", JOptionPane.PLAIN_MESSAGE );      }  //displays the result

   else     {  /.if all the numbers are positive.

/*However this part is optional. You can just use else part for above else if statement and exclude this else part. In this way the product of all three positive numbers is not computed and product is only computed when only two numbers of the three are positive */

     product = number1*number2*number3;  //computes product of all three positive numbers

     JOptionPane.showMessageDialog(null, "the product is : " + product , "Results", JOptionPane.PLAIN_MESSAGE );      }   //displays the result

Scanner scan = new Scanner(System.in);  //creates a Scanner class object

double value1 , value2, quotient;  //declares variables to hold the values of two real numbers and the result of division of the two real numbers is stored in quotient variable

System.out.println("Enter the first real number: ");  //prompts user to enter the value of first real number from the console

value1 = scan.nextDouble();  //reads the first number from user

System.out.println("Enter the second real number : ");  //prompts user to enter the value of second real number from the console

value2 = scan.nextDouble();  //reads the second number from user

if(value1<0&&value2<0)  {  //checks if both the numbers are negative

quotient = value1/value2;  //compute the quotient

JOptionPane.showMessageDialog(null, "the quotient is : " + quotient , "Results", JOptionPane.PLAIN_MESSAGE );    }  //displays result

 else  //if both numbers are not negative

JOptionPane.showMessageDialog(null, "Both numbers are not negative" );   //displays this message in a dialog box

  }  }

Explanation:

In the above given code if you want to display the outputs in console then alter the following statements as follows:

   if(number1>0&& number2>0 && number3>0){

   sum = number1 + number2+ number3;

  System.out.println("the sum is :  " + sum); }      

 

    if(number1<0 && number2>0 && number3>0)      {

    product = number2*number3;

      System.out.println("the product is :  " + product); }          

   else if (number2<0&&number1>0&&number3>0){

          product = number1*number3;

System.out.println("the product is :  " + product);      }

   else if (number3<0 && number1>0 && number2>0)     {

     product = number1*number2;

     System.out.println("the product is :  " + product);     }

   else     {

     product = number1*number2*number3;

      System.out.println("the product is :  " + product);      }

Scanner scan = new Scanner(System.in);

double value1 , value2, quotient;

System.out.println("Enter the first real number: ");

value1 = scan.nextDouble();

System.out.println("Enter the second real number : ");

value2 = scan.nextDouble();

if(value1<0&&value2<0)  {

quotient = value1/value2;

 System.out.println("the quotient is :  " + quotient);   }

 else  

System.out.println("Both numbers are not negative");

Notice that all the JOptionPane.showMessageDialog statement are changed with System.out.println which prints the results on the console.

Which of the following is used to encrypt web application data?
a. MD5
b. AES
c. SHA
d. DHA

Answers

Answer:

b. AES

Explanation:

AES is an acronym for Advanced Encryption Standard and it is a cryptographic or symmetric block cipher that is based on a substitution-permutation network (SPN) used for the encryption of sensitive data over the internet or web. AES uses a key length of 128, 192 or 256 bits and a block length of 128 bits to encrypt data on web applications.

It is an encryption standard of the government of the United States of America and is supported by the National Institute of Standards and Technology (NIST).

Hence, AES is used to encrypt web application data and it uses an algorithm developed by Vincent Rijmen and Joan Daemen, known as the Rijndael algorithm.

Research and a well-written problem statement are important because A)they give a clear understanding of the problem and its solution. B)they ensure that anyone in the general public will be able to understand and solve the problem. C)they give a list of the needs of the stakeholders. D)they ensure that questions still need to be asked about the problem.

Answers

Answer:

A. they give a clear understanding of the problem and it's solution

Explanation:

Research and a well-written problem statement are important because they give a clear understanding of the problem and its solution.

Answer:

Research and a well-written problem statement are important because

they give a clear understanding of the problem and its solution.

they ensure that anyone in the general public will be able to understand and solve the problem.

they give a list of the needs of the stakeholders.

they ensure that questions still need to be asked about the problem.

Explain demand paging with a proper example

Answers

Demand paging :

In computer operating systems, demand paging (as opposed to anticipatory paging) is a method of virtual memory management. In a system that uses demand paging, the operating system copies a disk page into physical memory only if an attempt is made to access it and that page is not already in memory (i.e., if a page fault occurs). It follows that a process begins execution with none of its pages in physical memory, and many page faults will occur until most of a process's working set of pages are located in physical memory. This is an example of a lazy loading technique.

which of the file names below follows standard file naming convention

Answers


A File Naming Convention (FNC) is a framework for naming your files in a way that describes what they contain and how they relate to other files. Developing an FNC is done through identifying the key elements of the project, the important differences and commonalities between your files.

To ensure that files are sorted in proper chronological order the most significant date and time components should appear first followed with the least significant components. If all the other words in the filename are the same, this convention will allow us to sort by year, then month, then date.

Files should be named consistently
File names should be short but descriptive (<25 characters) (Briney)
Avoid special characters or spaces in a file name
Use capitals and underscores instead of periods or spaces or slashes
Use date format ISO 8601: YYYYMMDD
Include a version number (Creamer et al.)
Write down naming convention in data management plan

BUS-APP_QUZ_CH02_V01

Chunking is a good strategy for completing large assignments because it makes the work
O less boring.
more thorough.
less difficult
O more manageable.

Answers

I think it would be the fourth answer choice.

Answer:

D. more manageable

Explanation:

it wouldn't make the work less boring, wont make work less difficult and and it wont help u get more through quicker

Proper numeric keyboarding technique includes all of these techniques except
O keeping your wrist straight
O resting your fingers gently on the home keys
O looking at the keys
O pressing the keys squarely in the center

Answers

The answer is looking at the keys

Answer: Its the 1st choice, 2nd choice, and the final one is the 4th one. (NOT the third answer choice)

Explanation: (I just took the test)... Hopefully this helps and good luck.

A disadvantage to using open source software is

it may restrict your ability to customize the software to suit your needs.

a higher level of technical skill may be required to install, use, or modify it.

you will need to find the developers who created the software to request their permission to reuse the source code.

you can use the software only if you make a donation to an open-source nonprofit organization

Answers

Answer: a higher level of technical skill may be required to install, use, or modify it.

Explanation:

Answer:

B. a higher level of technical skill may be required to install, use, or modify it.

Explanation:

Digital information processed into a useful form is

Answers

Answer:

Output

Explanation:

Which of the following HTML structures arranges text in multiple rows and columns?
a.
b.
c.
d.

Answers

Answer:

b. <table>

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.

A <table> is a HTML structure that arranges text in multiple rows and columns. Other data that can be arranged into rows and columns in a HTML table are images, links, and other tables. Each row in a table is denoted with a <tr> tag.

How is a Creative Commons license different from a regular copyright? As a reminder, in the warm-up we saw the this scenario: ----------------------------------------------------------------------------------------------------------------------- Imagine you were using some of our pixelation tools to create an image and you posted it online for your friends to see - but, a week later you find out someone took that image and put it on a T-shirt that they’re selling for $10 each. -------------------------------------------------------------------------------------------------------------------- Now that we understand Copyright, what would need to change in order for the scenario from the warm-up to be okay?

Answers

Explanation:

You need to change the whole thing and do it differently.. And register it.

The thing that'll need to be changed in order for the scenario from the warm-up to be okay is to create a creative common license which will  give room for people to be able to use my work and sell items that have my work on them.

In this case, the creative commons license enables one to share copyrighted work easily. It should be noted that intense protections are put on a work when the work is copyrighted.

With the creative common, a person can allow others use their work as long as the person abide to rules.

In conclusion, creative common allows one have control of one's work.

Read related link on:

https://brainly.com/question/

edhesive 1.7 code practice question 1
Fix the error so that the code works correctly
input (“Enter a number: “)
print (num * 8)
How do I fix the error?

Answers

Answer:

num = int(input("Enter a number: "))

print(num * 8)

Explanation:

I highlighted the parts that are added

Since you are getting an input from the user, you need to set the result to a variable. In this case, it is num.

Since it is a number, you need to specify the its type. In this case, it may be int.

Also, the quotation marks must be written as seen.

The corrected program which ensures that the program runs correctly is written thus :

num = int(input("Enter a number: ")

#user supplied input should be assigned to the varibale num

print(num * 8)

#multiplies num by 8 and displays the output.

The num variable in the second line isn't attached to any value, therefore, it will throw an error.

The user input value should be attached to the variable, 'num'

The second line of code multiplies num by 8 and displays the product.

Therefore, if the the user input is 3 ; the final result displayed will be : (3 × 8) = 24.

Learn more :https://brainly.com/question/15566254

What is considered to be the core of the Unix operating system ?

Answers

Answer:

My lips

Explanation:

Just kidding what is that?

which of the following is another term for a variable, such as cost or schedule, that limits the freedom of design, development, or manufacture of a product?

Answers

Answer:

constraint

Explanation:

How has technology influenced space exploration?

Answers

Answer:

One of the biggest benefits of machine learning when it comes to space exploration is that programs can sift through the available data more easily than humans, which increases the chance of finding planets just by looking at datasets. It's even thought that AI could be instrumental in locating extra-terrestrial life.

Explanation:

Which color reflects more light red blue black or white

Answers

White black absorbs the light

Explain why decomposition will be used in creating the algorithm for the game including two dice.

Answers

I saw this question while reviewing the notes in class

What is meant by computer generation?​

Answers

Answer:

The development of computer took place into 5 phases which is known as generation of computer.

Explanation:

From first generation computer till now, development of computer took place in 5 distinct which is also know as generation of computer.

Answer


Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

Choose the two statements that best describe the relationship between HTTP and the World Wide Web

Answers

Answer:

(I) and (III)  statements that best describe the relationship between HTTP and the World Wide Web.

Explanation:

Given that,

The following statements that is describe the relationship between HTTP and the World Wide Web

(I). HTTP and WWW are used in website.

(II).  World Wide Web are not interlinked by hypertext.

(III). WWW is the system of connected hypertext documents that can be viewed on web browsers.

We know that,

HTTP :

The full form of HTTP is Hypertext Transfer Protocol . A protocol  which permits the getting of plans it is called HTTP.

For example : HTML documents.

It is an application of a protocol where any data exchange on the Web.

It is a protocol of online communication and data transfer one system to another system.

WWW :

The full form of WWW is world wide web. It is used as a web which is information systems where documents and other web methods are checked by uniform resource locators, which may be interlinked by hypertext.

It is a collection of webpages.

Hence, (I) and (III)  statements that best describe the relationship between HTTP and the World Wide Web.

if you exit a program without saving the document on which you are working, or the computer accidentally losses electrical power, the document will be lost

Answers

Depends on which program you are using. Some programs automatically save your work, even if you exit out of it or turn off your computer

In an inspection, usually the first thing an inspector will want to see is:

Answers

Answer:

Your records and paperwork

Your paperwork, your skills, and your background/ record.

Plzz helps me with hw

Answers

Answer:

1. not statistical

2. statistical

3. statistical

4. not statistical

5. statistical

6. not statistical

7. statistical

Explanation:

The statistical can compare more then 1 thing to make it reasonable.

5. Which one of the following best defines a network server?
O A A type of network system that provides resources to network clients
B A type of system where all devices on the network are clients
C A type of network with one server and multiple clients
O D A type of device that connects all all other network devices together

Answers

Answer:

i thank it is B for the answer

Create a Boolean function odd_number_digits(n) that returns True when a positive integer has an odd number of digits. (You may assume that I will not use a number greater than 1,000,000.) Then, use it to make a
function sum_odd_digits(n) that sums all the numbers from 0 to n that have an odd number of digits.

Answers

Answer:

Following are the code to this question:

import java.util.*;//import package for user input

public class Main//defining class main

{

   public static boolean odd_number_digits(int n)//defining boolean method odd_number_digits

   {

       if(n>0 && n%2!=0)//defining if block that check value is positive and odd number

       {

       return true;//return value true

       }

       else//defining else block

       {

           return false;//return false value

       }

   }

   public static void  sum_odd_digits(int n)//defining a method sum_odd_digits

   {

       int sum=0,i;//defining integer variable

       for(i=0;i<=n;i++)//defining for loop

       {

           if(i%2!=0)//defining if block for odd number

           {

               sum=sum+i;//add odd number

           }

       }

      System.out.print(sum);//use print method to print sum value

   }

public static void main(String[] args) //defining main method

   {

       Scanner ox=new Scanner(System.in);//creating Scanner object

       int n= ox.nextInt();//defining integer variable for input value

       System.out.print(odd_number_digits(n)+ "\n");//use print method to call method

       System.out.println("Sum of odd numbers: ");//print message

       sum_odd_digits(n);//calling method

   }

}

Output:

please find the attachment.

Explanation:

In the above code, two methods "odd_number_digits and sum_odd_digits" are defined in which the first method return type is boolean because it will true or false value, and the second method returns the sum of odd numbers.

In the "odd_number_digits" method,  an integer variable passes as an argument and inside the method, if block is used that check value is a positive and odd number then it will return a true value.

In the "sum_odd_digits" method, it accepts an integer parameter "n", and define integer variable "sum" inside the method, which uses the for loop, inside the loop if block is used that counts odd numbers and adds its in sum and print its value.

Why are problem-solving strategies important? Choose all that apply. ensures important factors are taken into consideration ensures everyone involved in the solution understands the steps that are being taken makes it possible to find all solutions makes it possible to repeat the process to refine the solution DONE​

Answers

Answer:

A,B,D

Explanation:

Answer:

A: ensures important factors are taken into consideration

B: ensures everyone involved in the solution understands the steps that are being taken

D: makes it possible to repeat the process to refine the solution

Other Questions
Describe the four major spheres that support life on Earth.Explain how rays AB and AC form both a line and an angle. Fill in the blank with the Spanish word that best completes the sentence.David es de Espaa. l es _____.espaoespaolaespaaespaol Easy question, what is the perimeter of this? NEED HELP!! Which is a valid proportion? Question 8 Multiple Choice Worth 1 points)(01 03 LC)How is volume calculated given mass and density?Sum of mass and densityO Mass divided by densityMass multiplied by densityO Difference of mass and densityA what is the answer and the daily cost of hiring a plumber to work x hours on a repair project can be modeled using linear function. the plumber charges a fixed cost of $80 plus and additional costs of $45 per hour. the plumber works a maximum of 8 hours per day.for one day of work, what is the maximum daily cost that the plumber will charge? What is the term for a ratio of equivalent measurements that can be used to change a value from one until into another Write the sentence as an equation 333 is equal to the product of c and 254 What is the greatest common factor 12x^5 and 8x^3 What do you think is the most important element of a story: setting, characterization, dialogue, or plot (events and action)? Why? If A= -3, B= -7, C= 5, and D= 2, what does AB - CD= Question options: A.11 B.31 C. -11 D. -15 ok for my first question i'll keep it simple how many bones are in a dogs body? Parker is planning to build a playhouse for his sister.The scaled model below gives the reduced measures for width and height. The width of the playhouse is 22 centimeters and the height is 10 centimeters. Not drawn to scale The yard space is large enough to have a playhouse that has a width of 3.5 meters. If Parker wants to keep the playhouse in proportion to the model, what cross multiplication of the proportion should he use to find the height? (3.5) (10) = 3.5 x (3.5) (22) = 3.5 x (10) (3.5) = 22 x (1) (22) = 3.5 x What is equivalent to5[4 + 3(x 6)]? Help! ASAP!!!Use the map shown below to find the distance between cities A and B to the nearest tenth. Which of the following does not describe The Articles of Confederation?A The Articles created a weak federal government.B The Articles created states that were dependent on each other.C The Articles permitted states to conduct their own affairs,D The Articles took four years to be adopted. You need a piece of paper to measure 64 Dash 25 cylinders if you take two together that each measure 38.4 silver meters how much do you need to cut off 6th grade math plsss help Which of the following is not considered a primary source?Aa diary entryBa biographyCa letterDa photograph MATCH THE CONSTANT WITH ITS EXPRESSION! HELP PLEASE I SUCK AT MATH