Answer:
A mobile device is a small, lightweight, power-conserving, computing device that is capable of wireless connectivity.
Explanation:
I guess say this considering a phone,watch,etc. all are small and mobile devices.
40 points for this question
Digital citizenship focuses on _____. Select 3 options.
enforcing your rights on others
helping and leading others
targeting potential cybercriminals
creating positive online experiences
promoting the common good
Answer:
I think the answers are
the second one the third one the fourth onehope it helps!
Digital citizenship focuses on the following:
B. helping and leading others
C. targeting potential cyber criminals.
D. creating positive online experiences
What is digital citizenship?Digital citizenship is the ability of a person to learn and engage in digital relationships and learn how to use the system and parts of the digital system, like to use a keyboard, mouse, etc.
It also refers to the development of the skills related to digital communication, relationships, and how to practice dignity and respectful behavior on digital platforms.
The main focus of digital citizenship is helping other people to learn and grasp and be aware of cyber crimes and bullying and creating a positive environment.
Thus, the correct options are B. helping and leading others
C. targeting potential cyber criminals.
D. creating positive online experiences
To learn more about digital citizenship, refer to the link:
https://brainly.com/question/11542933
#SPJ5
Question 17 of 40
What should you do before an interview?
A. Come up with one or two questiono for the Interviewer.
B. Eat a large meal.
C. Study as if for a final.
D. Stay up late the night before trying to guess what the interviewer
will ask.
C.
Because when you are getting interviewed you need to first study up on what you'd say!
Answer:
I think A
Explanation:
because need a question before your interview
Which of the following is an example of a moving method?
Which of the following is an example of an urgent move?
rapid extrication technique
when would instant messaging be the least effective means of communication
Instant messaging would be least effective means of communication when you have a series of complex questions to ask your colleague.
What is the aim of instant messaging?Instant messaging is often used as a means of sending textual messages, It is known to be a short one and also quick in nature. It can occur between business colleagues and friends.
Its disadvantages is that its is an Ineffective tool for mass communication and also has issues when used for system for archiving.
See options below
A. When you want your colleague to let you know if the hyperlink you sent her is working
B. When you want to tell someone "Happy Birthday!"
C. When you have a series of complex questions to ask your colleague
D. When you want to call an impromptu meeting between some of the people in your office
Learn more about instant messaging from
https://brainly.com/question/26271202
Answer:
When you have a series of complex questions to ask your colleague.
Explanation:
Asking these questions on instant messaging is the least professional way you can ask a colleague about series topics that involve your job, it would be more professional to ask this at work rather than on via message.
Encoding in the information processing theory is the process of _____
Encoding in the information processing theory is the process of inputting of information into the memory system.
What is encoding?Encoding is an act or a system method that is used in the inputting of information into the computer memory system.
It entails the storage in the retention of encoded information. After encoding is the Retrieval method that is the act of getting the information out of memory.
Learn more about encoding from
https://brainly.com/question/3926211
In information processing theory, encoding is the process of inserting data into a memory system.
What exactly is encoding?Encoding is an act or a systematic method for entering data into a computer memory system.
It involves the storage and retention of encoded data. The Retrieval procedure follows encoding and is the act of retrieving information from memory. The process of converting thoughts into communication is known as encoding in information processing theory.
Learn more about encoding from this website.
brainly.com/question/3926211
#SPJ4
Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.
Answer:
Cash-out fraudsters
Explanation:
Which one of these actions isn't a valid way to update the status of a lead? A. Click "Mark Status as Complete" in Path. B. Click the desired step on the Path, then click "Mark Current Status." C. View the lead record, click "Edit," and change the Status field. D. Change the Kanban settings Group By to "status." Drag the record to a different column. E. In any list view, click "Shuffle" to change up every record's status.
The action that is not a valid way to update the status of a lead is that In any list, click "Shuffle" to change up every record's status.
How do I update lead status?To update any lead from a list view such as one that is found in Salesforce One has to select the leads that the person want to edit and then by double-clicking the specified field value and then make the change that you want.
Note that the update differs for others and the action that is not a valid way to update the status of a lead is that In any list, click "Shuffle" to change up every record's status. This is wrong.
Learn more about update from
https://brainly.com/question/10106963
python
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is:
As long as x is greater than 0
Output x % 2 (remainder is either 0 or 1)
x = x // 2
Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string.
Ex: If the input is:
6
the output is:
110
The program must define and call the following two functions. Define a function named int_to_reverse_binary() that takes an integer as a parameter and returns a string of 1's and 0's representing the integer in binary (in reverse). Define a function named string_reverse() that takes an input string as a parameter and returns a string representing the input string in reverse.
def int_to_reverse_binary(integer_value)
def string_reverse(input_string)
main.py
# Define your function here.
if __name__ == '__main__':
# Type your code here. Your code must call the function.
The program illustrates the use of loops .
Loops are used for operations that must be repeated until a certain condition is met.
How to write the program?The program written in Python, where comments are used to explain each action is as follows:
#This defines the int_to_reverse_binary function
def int_to_reverse_binary(integer_value):
#This initializes the string output
strNum = ""
#The following loop calculates the string output
while (integer_value > 0):
strNum += str(integer_value % 2)
integer_value //= 2
#This passes the string output to the string_reverse function
string_reverse(strNum)
#This defines the string_reverse function
def string_reverse(input_string):
#This reverses the string
strRev = input_string[::-1]
#This prints the reversed string
print("Binary number:",strRev)
# The main begins here
if __name__ == '__main__':
#This gets the decimal value
dec_val = int(input("Decimal value: "))
#This calls the int_to_reverse_binary function
int_to_reverse_binary(dec_val)
Read more about Python programs at:
https://brainly.com/question/24833629
____ is a very fast network media. It contains multiple (sometimes several hundred) clear glass or plastic fibers, each about the thickness of a human hair. Each fiber has the capacity to carry data for several television stations or thousands of voice conversations, but each fiber can only send data in one direction. Data sent over a fiber-optic cable is represented by light pulses and is sent at speeds of up to trillions of bits per second
Fiber optic cable (FOC) is a very fast network media and it comprises multiple clear glass or plastic fibers.
What is a fiber optic cable?A fiber optic cable can be defined as a type of wired connector which are either made of glass or plastic and they are typically used for connecting one network device to another, so as to form a computer network and enable the continuous transmission of data between them.
In Computer technology, fiber optic cables (FOCs) are commonly produced through the use of several concentric layers of transparent material such as glass or plastic, with each having a slightly different index of refraction for light waves and about the thickness of a human hair.
Read more on fiberoptic cables here: https://brainly.com/question/116766
What does it mean when someone silences notifications?.
Answer:
Silencing notifications does not alert someone when the notification comes in. It is silent. These settings were invented to help avoid distractions. The notifications still come in just quietly without an alert and can be checked at any time. Lots of people silence notifcations at night, while sleeping, while studying, etc.
Explanation:
how do I upending friend request? 100 POINTS!!!!
Answer:
If you want to send a friend request, click on their picture. Then scroll down slightly. There should be 3 buttons. The first one says Thank you. The next one is human with a +. Click the 2nd button. That is how to send a friend request.
Explanation:
Have a great day!
#EquestriansLion
Which section of a PCM is responsible for sending the proper reference voltage to many of the sensors?
The section of a PCM that is responsible for sending the proper reference voltage to many of the sensors is the input sensor section.
What are PCM inputs?The Powertrain Control Module (PCM) is known to be an input section of the PCM.
It is made up of the engine's ignition system, fuel injection system and also emission controls. The PCM is known to receives inputs a lot from different kinds of sensors and switches.
Learn more about sensors from
https://brainly.com/question/26320121
In a single processor system running Windows, when the kernel accesses a global resource, it A) uses spinlocks. B) masks all interrupts. C) uses a dispatcher object. D) atomic integers.
In a single processor system running Windows, If the kernel accesses a global resource, it masks all interrupts.
What does it implies to mask an interrupt?An internal switch setting is known to often controls if an interrupt can be worked on or not.
The act of a Maskable interrupt is known to be when a hardware is said to interrupt and as such, it can disabled or left like that by the instructions of CPU.
Learn more about Windows from
https://brainly.com/question/25243683
W
tickets for tsg airlines are coded as follows:
• united kingdom flights are coded a, european flights b, asian
flights c, and american flights d.
overnight flights between 10pm and 6am use the same codes,
but with lower case letters (a, b, c, d)
• male passengers are coded x and female passengers are coded
y
• children under 16 are coded lowercase (x, y)
• meals are coded vegetarian v, beef b, and chicken k
• first class passengers are a, business class are b, and economy
is c
what is the code for a flight from chicago to new york at 5am for a
vegetarian 8 year old girl traveling in economy class?
The flight code of the tsg airlines is an illustration of computer coding
The code of the flight is AayvC
How to determine the code of the flight?From the question, we have the following parameters:
UK = A, Europe = B, Asian = C, and the Americas = D.Flight between 10 pm and 6 am = (a,b,c, and d)Male passengers = X; Female passengers = Y.Children under 16 = (x.y)Vegetarian Meal = v; Beef = b, Children = KFirst Class = A, Business Class = P; Economy = CTo code the flight of the girl, we have the following parameters:
Destination =UK; UK code is ATime = 5AM; UK flight before 6AM is coded aFemale children under 16 is coded yMeal = vegetarian; The code for this is vEconomy class is coded CHence, the code of the flight is AayvC
Read more about coding at:
https://brainly.com/question/24735155
App designers should avoid using auto-detection of user location because consumers resent the invasion of privacy. a. true b. false
Answer:
Explanation:
true because they may have a customer that is death and can't hear you and you don't know sign language so you need highlighted words for them to read.but if they are blind you need to do the sign language on their hand.
Answer:True
Explanation:
Consider the following recursive method. public static string recur(int val) { string dig = "" + (val % 3); if (val / 3 > 0) return dig + recur(val / 3); return dig; } what is printed as a result of executing the following statement? system.out.println(recur(32));
The recursive method recur executes itself from within
When the statement System.out.println(recur(32)); is executed, the string value "2101" is printed
How to determine the output of the statement?The flow of the program is as follows:
The method keeps updating the string variable dig with the remainder of the val variable divided by 3When the remainder is less than or equal to 0, the method is exitedSo, when 32 is divided by 3.
The remainders are 2, 1, 0 and 1
So, the output of the statement is "2101"
Read about java methods at:
https://brainly.com/question/19271625
Problem: Write the Python code of a program called ComputeSquare that asks the user to enter the length of the side of the square and displays the area and perimeter of the square. Check that the side length is greater than zero, and if it is not, display an informative error message to the user.
The given problem is solved in Python.
def ComputeSquare():
side = float(input('Enter the side of the square: '))
if side > 0:
perimeter = 4 * side
area = side * side
print('Perimeter of the square is:',
perimeter, 'unit.')
print('Area of the square is:', area, 'square unit.')
else:print('Invalid input.')
ComputeSquare()
Explanation :-In this program, we create a function ComputeSquare() to calculate the perimeter and area of a square.The function asks the user to enter the side of the square. The side is then stored in a variable.Now, we check whether the side is greater than 0 or not using if-else statement.If the condition is true, the perimeter and area is calculated which is displayed using print() statement.If the condition is false, the else blocks executes printing the error message.Refer to the attachment for output.
Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. what is this type of attack known as:_____.
Answer:
DDOS OR DOS
Explanation:
im sure its either DOS or DDOS(distributed denial of service)
The first time you save a file, there is no difference between the Blank Space __________ and Save As commands.
I think the answer is save.
Hope that helps!
Lattice-based access controls use a two-dimensional matrix to assign authorizations. What are the two dimensions and what are they called
Answer:
riesige Pyramide
Explanation:
riesige Pyramide
A Lattice-based access controls is used to value derivatives by employing a binomial tree to calculate the various ways the price of an underlying asset, such as a stock, might take over the derivative's life.
What are Lattice-based access controls?In computer security, lattice-based access control exists as a complex access control model established on the relations between any assortment of objects and subjects.
A Lattice-based access controls is used to value derivatives by employing a binomial tree to calculate the various ways the price of an underlying asset, such as a stock, might take over the derivative's life. The binomial tree plots out the potential values graphically that alternative prices can have over additional time periods.
Three primary kinds of access control systems exist Discretionary Access Control (DAC), Role Based Access Control (RBAC), and Mandatory Access Control (MAC).
There are two kinds of access control: physical and logical. Physical access control limitations access to campuses, buildings, rooms, and physical IT assets. Logical access control limitations connections to computer networks, system files, and data.
To learn more about Lattice-based access controls refer to:
https://brainly.com/question/14982444
#SPJ2
In a ____ world, the routing updates carry subnet mask information and allow different masks to be used on different subnets.
100 points.
Don't answer unless you know.
Answer:
On windows 10,
Open the Start menu.
Type “restore files” and hit Enter on your keyboard.
Look for the folder where you deleted files were stored.
Select the “Restore” button in the middle to undelete Windows 10 files to their original location.
Mac:
Option 1: Use Undo Command on Mac
Option 2: Recover Files from Trash on Mac
Option 3: Recover Deleted Files Using Terminal
Option 4: Recover Files from Backups
Option 5: Try Mac Data Recovery Software
Option 6: Use App-Specific Recovery Features
Option 7: Apply to data recovery services
Explanation:
lynn wants to share parts of an essay she wrote in her slide presentation
Answer:
no
Explanation:
No she should not because it might be for a test
Answer: Use bullet points to summarize the main parts of your essay
Explanation: I took the test myself
What is the distance from the end of the pin to the center of the hole?
Answer:
Roughly 7/8 on the pinhole, roughly 2-1/4" from the pinhole to end of the adapter.
Explanation:
_____ is human thinking and problem-solving by a machine, including learning, reasoning, and self-correction.
Moore’s law
Moore’s law
cloud computing
cloud computing
biocomputing
biocomputing
artificial intelligence.
(Answer is artificial intelligence.)
Answer:
It artificial intelligence / AI
Explanation:
I just took the test
EDG 2022
(iii) ............ characters can be stored in memo field. (a) 50 (b) 64000 (c) 255 (d) 200
Answer:
(b) 64000
Explanation:
Assuming that the "Memo" being mentioned is a Microsoft Access memo field, it can hold up to 64,000 characters, even in the more recent version of the application where the "Memo" is now know as the "Long Text" field.
According to microsoft.com, "In earlier versions of Access, we used the Memo data type to store large amounts of text... the Long Text field works the same as the Memo field of old... [it] can only display the first 64,000 characters."
Please put "Brainliest" on my answer if it helped you out the most!
(Further Reading) If you're still confused, I suggest you search up the following:
- Microsoft Access Long Text character limit
Match up each definition and term. Please help asap
Answer:
Query - Definition - Search by specific information Example - Find T-shirt in a specific size
Flat File Database - Definition - Simple database where each row is a record Example - Excel file of names and addresses
Fields - Definition - Different types of data for each record (columns) Example - Type of clothing, colour, size, price
Sort - Definition - Show records in different order based on its fields Example - Arrange all records alphabetically by colour
Record - Definition - Main item in a list (row) Example - Jeans
Text Field - Definition - Any number, letter, and all symbols Example - Levi's 518
Date Field - Definition - Date in a specific format Example - 2020-06-30
TIME Field - Definition - Any format of a timestamp Example - 10:42 PM
Graphic Field - Definition - Any kind of image Example - Logo
Calculated Field - Definition - Contains a formula to work something out Example - Length of time item has been in inventory
Number Field - Definition - Contains numbers that may be used in future calculations Example - $237.42
Brainlist Pls!
Why didn’t social media become popular when the first cell phone hit the market in the late 1990s and early 2000s?
a.
using phones for communication was a cultural shift.
b.
the first cell phones were not connected to the internet.
c.
people often ignorde call from individuals they do not know.
d.
it was very unusual for individuals to have access to cell phones.
Answer:
b. the first cell phones were not connected to the internet.
Explanation:
Social media has only risen in popularity in the last decade. Additionally, the first cell phones were not touch screens as they are nowadays. On some, you only called people you couldn't even text. Some did not even have caller ID's let alone other apps
The first cell phones were not connected to the internet. The correct option is B.
What is social media?Online platforms and tools that enable individuals and groups to create, share, and exchange user-generated content, as well as participate in online communication and social networking, are referred to as social media.
People use social media for communication, entertainment, news consumption, and social interactions, and it has become an increasingly important part of their daily lives.
The first cell phones did not have internet access. Early cell phones were primarily used for voice calls and text messaging and had limited functionality.
With the introduction of smartphones and the expansion of cellular data networks, widespread use of social media on mobile devices became possible.
Thus, the correct option is B.
For more details regarding social media, visit:
https://brainly.com/question/30326484
#SPJ2
i really need the answer now!!
3. Which is the path through which an electric current flow? *
1 point
A. close circuit
B. electric circuit
C. parallel circuit
D. series circuit
4. Which of the following is a device that acts as an automatic switch that opens the circuit if too much current flows through it? *
1 point
A. battery
B. circuit breaker
C. switch
D. volts
5. Which statement is true about parallel circuit? *
1 point
A. All parts are connected in a single path.
B. Current flows through more than one path.
C. Same amount of current passes through each load.
D. One electrical device goes out, the rest will not work anymore.
6. Which of the following can cause electrical fire? *
1 point
A. Play with the switches.
B. Insufficient supply of current.
C. Excessive current may overheat the wires.
D. Turn off the appliances when nobody is using it.
7. How many volts of electric energy do the outlets in the Philippines commonly have? *
1 point
A. 50 to 100 volts
B. 100 to 150 volts
C. 110 to 150 volts
D. 200 to 220 volts
8. When a short circuit takes place, the fuse wires melt and break __________? *
1 point
A. battery
B. breaker
C. circuit
D. wires
9. Which of the following shows the proper way in using electricity? *
1 point
A. Use damaged appliances.
B. Use overloaded extension wires.
C. Turn off the lights when not in use.
D. Plug appliances when nobody left in the house.
10. Gemma ironed their clothes. She stopped it when she smells burnt wires. Why did she stop ironing the clothes? *
1 point
A. Check if the extension wire is in good condition.
B. Search any busted bulb or outlet.
C. Find the burnt wires.
D. All of these
Answer:
3. B.
4. B.
5. B.
6. C.
7. D.
8. C.
9. C.
10. D.
Explanation:
I hope I helped you.
2. What are some other reasons why you might need to know the operating system version on your computer or mobile device
To see if an app/software is compatible, to be aware of the flaws and be informed of system updates that are available are the some reasons to know the operating system version on computer or mobile device.
What is operating system?An operating system is a software program that manages and operates computing device computers, laptops, smart watches, mobile phones.
It is the operating system that makes it unnecessary to know a coding language in order to interact with computers.
Thus, to check compatible, aware of flaws and it keep the updated about the software.
For further details about operating system, click here:
https://brainly.com/question/1763761
#SPJ4