1. For what purposes do you use the internet? State at least 3. 2. What is the benefits of using the internet? State atleast 3 with explanations. 3. What website do you mainly use? How often do you visit these website? 4. What browser do you use for searching information in the web? 5. Have you tried communicating through the internet? If yes, how did the internet improve your communication with others? ANSWER IN 5 SENTENCES 6. It is true that the coming of the internet has brought us even more opportunities compared than before but what is your opinion about its influence on the people of this modern world, especially younger generations? ANSWER IN 5 SENTENCES non se nse, unacceptable or inapropriate answers will be r e por ted :) mind you

Answers

Answer 1

Answer:

1) communication

  entertainment

  sharing information and news

2) helps to easily get access to any sort of information

   we can easily come to know the recent happenings in the world

   helps to communicate with people living in other countries

   helps in earning money through online jobs

3) wiki(wikipedia) whenever needed

4) google chrome

5) yes.

   sorry i don know what to say

6) i think internet has both good and bad effects on younger generations.its helping them with their work but also kind of misleading them too.

Explanation:


Related Questions

What is the approximate size of a transistor?
a room
a vacuum tube
a fingernail
billions of times smaller than a fingernail

Answers

Answer:

D

Explanation:

billions of times smaller than a fingernail

Answer:

D

Explanation:Billons times smaller

The final step of the decision-making model is to make your decision and take action.​

Answers

Answer:

No, it is not the final step in decision-making model. It is rather the penultimate stage of the model of decision making.

Explanation:

The final step of the decision-making model is reviewing your decision and its consequences. The decision-making model has total of 7 steps. One should follow these all the steps to make it error free and more efficient then it rather would have been when the decision was made without following it.

The very first step of this model is to identify the decision. And it is one of the most important steps to be followed to avoid any error.  

Print spooler is most common example of _______________.
Buffer
Printer speed
print quality

Answers

Answer: Print spooler is most common example of Print Quality

<marquee>mark me as the brainliest

Print spooler is most common example of: Buffer.

In Computer technologies, an output device can be defined as a hardware device that is designed to typically receive processed data from the central processing unit (CPU) and converts these data into an information that can be used by the end users of a computer system. Some examples of an output device are speaker, monitor, projector, printer, etc.

A printer can be defined as an electronic output device (peripheral) that is designed and developed for printing of paper documents containing texts and images.

Generally, a printer comprises the following components and software resources; paper support, print cover, connectors, output tray, edge guides, sheet feeder, control buttons, ink cartridge clamps, print head, print drivers, print spooler, etc.

A print spooler can be defined as a software application or program installed on a printer to organize, manage and control the paper printing jobs that are being sent to a printer by a computer. Thus, the execution and operation of various print jobs by a printer in printing documents is highly dependent on its print spooler.

A buffer can be defined as a temporary storage area set aside on a computer for data storage. Also, a buffer resides in the random access memory of a computer system.

This ultimately implies that, a print spooler is most common example of a buffer because it stores data, instructions and processes related to print jobs from multiple sources in a queue to sequentially execute them later on.

For more information: https://brainly.com/question/17144282

Which expression correctly determines that String s1 comes before String s2 in lexicographical order

Answers

Options :

A.) s1 < s2

B.) s1 <= s2

C.) s1.compareTo(s2) == −1

D.) s2.compareTo(s1) < 0

E.) s1.compareTo(s2) < 0

Answer: E.) s1.compareTo(s2) < 0

Explanation: Lexicographical ordering simply means the arrangement of strings based on the how the alphabets or letters of the strings appear. It could also be explained as the dictionary ordering principle of words based on the arrangement of the alphabets. In making lexicographical comparison between strings, the compareTo () method may be employed using the format below.

If first string = s1 ; second string = s2

To compare s1 with s2, the format is ;

s1.compareTo(s2) ;

If s1 comes first, that is, before s2, the method returns a negative value, that is a value less than 0 '< 0', which is the case in the question above.

If s2 comes first, that is, before s1, the method returns a positive value, that is a value greater than 0 '> 0'.

If both are s1 and s2 are the same, the output will be 0.

Java provides a number of interfaces and classes to systematically implement collections.

a. True
b. False

Answers

Answer:

A) True

Explanation:

Java provides collections architecture or framework used to store and manipulate a group of objects or collections.

The collection framework has interfaces which include; Set, Queue, Deque, List, as well as classes which include; Hashset, ArrayList, LinkedList, LinkedHashset, PriorityQueue, Vector and TreeSet.

There are also many methods declared in the collection interface which include; add(), addAll(), remove(), removeAll(),retainAll(), clear(), size(), iterator(), toArray() etc

The factorial of a nonnegative integer n is written n ! (pronounced "n factorial") and is defined as follows: n ! = n · (n - 1) · (n - 2) · … · 1 (for values of n greater than or equal to 1) and n ! = 1 (for n = 0). For example, 5! = 5 · 4 · 3 · 2 · 1, which is 120.
a) Write a program that reads a nonnegative integer and computes and prints its factorial.
b) Write a program that estimates the value of the mathematical constant e by using the formula:
e = 1 + 1/1! +1/2! + 1/3! +.......
c) Write a program that computes the value of by using the formula
e^x = 1 + x/1! + x^2/2! + x^3/3! +.......

Answers

Answer:

Here are the programs. I am writing C++ and Python programs:

a)

C++

#include<iostream>   

using namespace std;    

int factorial(int number)  {  

   if (number == 0)  

       return 1;  

   return number * factorial(number - 1);  }    

int main()  {  

   int integer;

   cout<<"Enter a non negative integer: ";

   cin>>integer;

   cout<< "Factorial of "<< integer<<" is "<< factorial(integer)<< endl;  }

Python:

def factorial(number):  

   if number == 0:  

       return 1

   return number * factorial(number-1)  

integer = int(input("Enter a non negative integer: "))  

print("Factorial of", integer, "is", factorial(integer))

b)

C++

#include <iostream>  

using namespace std;

double factorial(int number) {  

if (number == 0)  

 return 1;  

return number * factorial(number - 1); }  

 

double estimate_e(int num){

    double e = 1;

    for(int i = 1; i < num; i++)

     e = e + 1/factorial(i);

     cout<<"e: "<< e; }  

 

int main(){

int term;

cout<<"Enter a term to evaluate: ";

cin>>term;

estimate_e(term);}

Python:

def factorial(number):  

   if number == 0:  

       return 1

   return number * factorial(number-1)  

def estimate_e(term):

   if not term:

       return 0

   else:

       return (1 / factorial(term-1)) + estimate_e(term-1)

number = int(input("Enter how many terms to evaluate "))

print("e: ", estimate_e(number))

c)

C++

#include <iostream>

using namespace std;

int main(){

   float terms, sumSeries, series;

   int i, number;

   cout << " Input the value of x: ";

   cin >> number;

   cout << " Input number of terms: ";

   cin >> terms;

   sumSeries = 1;

   series = 1;

   for (i = 1; i < terms; i++)      {

       series = series * number / (float)i;

       sumSeries = sumSeries + series;     }

   cout << " The sum  is : " << sumSeries << endl;  }  

Python    

def ePowerx(number,terms):

   sumSeries = 1

   series =1

   for x in range(1,terms):

       series = series * number / x;

       sumSeries = sumSeries + series;

   return sumSeries    

num = int(input("Enter a number: "))

term=int(input("Enter a number: "))

print("e^x: ",ePowerx(num,term))

Explanation:

a)

The program has a method factorial that takes numbers as parameter and computes the factorial of that number by using recursion. For example if the number = 3

The base case is  if (number == 0)

and

recursive is return number * factorial(number - 1);    

Since number = 3 is not equal to zero so the method calls itself recursively in order to return the factorial of 3

return 3* factorial(3- 1);

3 * factorial(2)

3* [2* factorial(2- 1) ]

3 * 2* [ factorial(1)]

3 * 2 * [1* factorial(1- 1) ]

3 * 2 * 1* [factorial(0)]

Now at factorial(0) the base condition is reached as number==0 So factorial(0) returns 1

Now the output is:

3 * 2 * 1* 1

return 6

So the output of this program is

Factorial of 3 is 6

b)

The method estimate_e takes a number i.e. num as parameter which represents the term and estimates the value of the mathematical constant e

The for loop iterates through each term. For example num = 3

then  

e = e + 1/factorial(i);  

The above statement calls works as:

e = 1 + 1/1! +1/2!

since the number of terms is 3

e is initialized to 1

i  is initialized to 1

So the statement becomes:

e = 1 + 1/factorial(1)

factorial function is called which returns 1 since factorial of 1 is 1 So,

e = 1 + 1/1

e = 2

Now at next iteration at i = 2 and e = 2

e = 2 + 1/factorial(2)

e = 2 + 1/2

e = 2.5

Now at next iteration at i = 3 and e =3

e = 3 + 1/factorial(3)

e = 3 + 1/6

e = 3.16666

So the output is:

e: 3.16666

c)

The program computes the sum of series using formula:

e^x = 1 + x/1! + x^2/2! + x^3/3! +...

The for loop iterates till the number of terms. Lets say in the above formula x is 2 and number of terms is 3. So the series become:

e^x = 1 + x/1! + x^2/2!

So number = 2

terms = 3

series =1

sumSeries = 1

i = 1

The statement series = series * number / (float)i; works as following:

series = 1 * 2 /1

series = 2

sumSeries = sumSeries + series;

sumSeries = 1 + 2

sumSeries = 3

At next iteration: i=2, series =2 , sumSeries =3

series = 2 * 2/2

series = 2

sumSeries = 3 + 2

sumSeries = 5

Now the loop breaks as i=3

So output returns the value of sumSeries i.e. 5

Output:

e^x: 5

Using Python code.
Fill in the gaps in the nametag function so that it uses the format method to return first_name and the first initial of last_name followed by a period. For example, nametag("Jane", "Smith") should return "Jane S."
def nametag(first_name, last_name):
return("___.".format(___))
print(nametag("Jane", "Smith"))
# Should display "Jane S."
print(nametag("Francesco", "Rinaldi"))
# Should display "Francesco R."
print(nametag("Jean-Luc", "Grand-Pierre"))
# Should display "Jean-Luc G."

Answers

Answer:

def nametag(first_name, last_name):

return("{} {[0]}.".format(first_name, last_name))

print(nametag("Jane", "Smith"))

# Should display "Jane S."

print(nametag("Francesco", "Rinaldi"))

# Should display "Francesco R."

print(nametag("Jean-Luc", "Grand-Pierre"))

# Should display "Jean-Luc G."

Explanation:

First you must think about that the question ask about the first letter for last_name, remember [0] is the first letter not [1], the other part is about format function and its order

The format method to return first_name and the first initial of last_name followed by a period in python is represented as follows:

def nametag(first_name, last_name):

  return '{} {}.'.format(first_name, last_name[0])

print(nametag("Jane", "Smith"))

print(nametag("Francesco", "Rinaldi"))

print(nametag("Jean-Luc", "Grand-Pierre"))

A function named nametag is declared with the arguments first_name and last_name.

Then it returns the first name and the initial of the last_name using the .format method.

Then we call the function using the print statement with the arguments.

learn more on python code; https://brainly.com/question/17184408?referrer=searchResults

Which complaints was stated by some Strategic Defense Initiative Organization (SDIO) board members about the software of the Strategic Defense Initiative (SDI)?

Answers

Answer:

they complained that it threatened the Mutually assured destruction (MAD) approach.

Explanation:

For example, the Strategic Defense Initiative (SDI) allowed for a swift response if the United Nations came under attack, by deploying ballistic strategic nuclear weapons.

However, the Mutually assured destruction (MAD) approach demanded that there should be restraint in using nuclear weapons, especially when there is a threat of another Nation.

1. For what purposes do you use the internet? State at least 3. 2. What is the benefits of using the internet? State atleast 3 with explanations. 3. What website do you mainly use? How often do you visit these website? 4. What browser do you use for searching information in the web? 5. Have you tried communicating through the internet? If yes, how did the internet improve your communication with others? ANSWER IN 5 SENTENCES 6. It is true that the coming of the internet has brought us even more opportunities compared than before but what is your opinion about its influence on the people of this modern world, especially younger generations? ANSWER IN 5 SENTENCES non se nse, unacceptable or inapropriate answers will be r e por ted :) mind you

Answers

Explanations

__________________________________________________________

1: Education, entertainment, notifications, etc.

2: The internet is a fast, easy and effeciant way to communicate. other reasons may be for banking purposes, online grocery shopping, etc.

3 & 4: Self answerable questions.

5: Common communication nowadays is texting, phone calls, etc. It's easier to press a button or two to send out information than what it used to be. For example, it often took days, weeks, and even months for messages to be sent from one location to a far-flung position.

6: ( MY OPINION ) I feel like the internet is (in a lot of ways) bad for the  younger generation and the ( soon to come ). There are alot of online predators, blogs/websites that have inappropriate content. It's quite easy for a teen to just go to a po**ographic site nowadays, type in his/her email and just simply watch it like that. Some of them don't require sign up to view videos, images, gifs. And about the online predator situation, a lot of teenagers (girls AND boys) often feel pressured into sending images of themselves now.

__________________________________________________________

It is a good practice to use 3d to plot a single dimensional data in storytelling.
A. True
B. False

Answers

Answer:

The answer is "Option B".

Explanation:

The 3-dimensional diagrams also known as a 3D graph, it implies to 3D design, which Occasionally receives the 2D data, which effects 3D and It is a terrible form.

The whole additional dimension comes to an end but never more than inserting a chart or its readability could be dramatically affected.It uses the 3D to create a single dimension, but the information is not a great training.

"If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or hard drive." - Microsoft White Paper, July 1999. Is this statement categorically true or just true in most cases

Answers

Answer:

It is  just true in most cases

Explanation:

This statement is just true in most cases because in some cases having a physical access to the computer or hard drive this does not guarantee access to the information contained in the hard drive or computer because the data/information in the hard drive or computer might as well be encrypted and would require a password in order to de-crypt the information.

Having a physical access is one step closer in some cases but not the only step required .

You have arranged some directories and files as follows:
/home/yourLoginName/
docs/
a.txt
b.txt
assts/
cs150/
a0.cpp
cs250/
adata
a1.h
a1.cpp
a2.h
a2.cpp
You have just issued the command:
cd ~/assts/cs150
Which of the following are valid ways to copy all of the header files from the cs250 directory into the cs150 directory?
a) cp ../cs250/* ../cs150
b) cp ../cs250 cs150
c) cp ../cs250/*.? .
d) cp ../cs250/*.* cs150
e) cp ../cs250/*.h cs150
f) cp ../cs250/*.h .

Answers

Answer:

The answer is "Option a and Option f"

Explanation:

In the given question option a and option f is correct because both commands use the "cp" command, which is used to copy files and in this command, in option a, it uses the file "from cs250 to cs150", and an option "f" uses the "cs250 with '.h' that is a file extension", and the wrong choice can be defined as follows:

In choice b, it is wrong because it is not a correct command. In choice c, in this command we use "?" symbol, that is wrong.   In choice d and e both were invalid.  

what is information processing cycle​

Answers

Answer:

The sequence of events in processing information, which includes:

1) input

2) processing

3) storage and

4) output.

These processes work together and repeat over and over. Input—entering data into the computer. Processing—performing operations on the data.

Explanation:

1. Input: The computer receives data from a user or software. A keyboard, microphone, or other input device can be used as a user's input source.

2. Processing: The computer processes data after it has been received by performing logical comparisons or mathematical calculations as instructed by the user or a program.

3. Output: After processing, data is delivered as output. The speaker, printer, monitor, or other output devices display the output results.

4. Storage: The processed data can be saved by the computer to a storage device for later use.

If you were the IT manager for a large manufacturing company,what issues might you have with the use of opensource software? What advantage might there be for use of such software?

Answers

Answer: Having the ability to change the source code to fit your needs

Explanation:

The figure below shows a black and white image with a resolution of 720×504. Identify how much memory (in bits) will be occupied by this image in the hard drive of your computer, if it is stored. (2 marks)

Answers

Answer:

362880

Explanation:

In black and white images each pixel is 1 bit. You need to first find the total number of pixels, to do this you multiply the width and length of the picture (720x504) and you will get 362880. From there you would multiply the amount of pixels by how many bits each pixel is. In this case, since its black and white you multiply it by 1, which is 362880.

Military members may be subject to dis-honorable discharge for unauthorized disclosure.
A. True
B. False

Answers

Answer:

A. True

Explanation:

A dis-honorable discharge is the process of dis-charging a member of his/ her duties in an humiliating manner after committing a grave offence, especially in military.

A member of military involved in any form of disclosure of unauthorized information can be prosecuted. The accused member will be court martial, and if found guilty of the offence may be sanctioned by being subjected to a dis-honorable discharge.

definition of letter in communication skills

Answers

Answer:

Explanation:A letter is a written message conveyed from one person to another person through a medium. Letters can be formal and informal. Besides a means of communication and a store of information, letter writing has played a role in the reproduction of writing as an art throughout history.

Answer:

A letter is a written message conveyed from one person to another person through a medium. Letters can be formal and informal. Besides a means of communication and a store of information, letter writing has played a role in the reproduction of writing as an art throughout history.

Excellent written and verbal communication skills. Confident, articulate, and professional speaking abilities (and experience) Empathic listener and persuasive speaker. Writing creative or factual. Speaking in public, to groups, or via electronic media. Excellent presentation and negotiation skills.


How SDN is different from a normal network setup?

Answers

Answer:

I hope this is right (one difference)

SDN is software based whereas normal network setup is mostly hardware based

Pls ask me if you want another differrence! :)

PLS MARK AS BRAINLIEST

Referential integrity constraints are concerned with checking INSERT and UPDATE operations that affect the parent child relationships.
a) true
b) false

Answers

Answer:

a) true

Explanation:

In Computer programming, integrity constraints can be defined as a set of standard rules that ensures quality information and database are maintained.

Basically, there are four (4) types of integrity constraints and these are;

1. Key constraints.

2. Domain constraints.

3. Entity integrity constraints.

4. Referential integrity constraints.

Referential integrity is a property of data which states that each foreign key value must match a primary key value in another relation or the foreign key value must be null.

For instance, when a foreign key in Table A points to the primary key of Table B, according to the referential integrity constraints, all the value of the foreign key in Table A must be null or match the primary key in Table B.

Hence, the referential Integrity constraints ensures that the relationship between the data in a table is consistent and valid.

Hence, referential integrity constraints are concerned with checking INSERT and UPDATE operations that affect the parent child relationships.

This ultimately implies that, referential Integrity are rules used in database management systems (DBMS) to ensure relationships between tables when records are changed is VALID (INSERT and UPDATE).

In a nutshell, it always ensures a primary key must have a matching foreign key or it becomes null.

In this exercise we have to analyze the integrity that some constraints have, so the alternative that best matches is;

True

In Computer plan out, uprightness constraints maybe delineate as a set of standard rules that guarantee kind information and collection of data happen uphold. Basically, skilled are four (4) types of completeness restraint and these exist;

Key constraints. Domain constraints. Entity integrity constraints. Referential integrity constraints.

Referential honor exist a property of information in visible form that states that each irrelevant key value must equal a basic key profit in another family connection or the from another country key profit must be ineffectual.

For instance, when a experience transfer data from one computer system to another Table A points to the basic key of Table B, in accordance with the referential purity restraint, all the worth of the from another country transfer data from one computer system to another Table A must exist valueless or counterpart the basic transfer data from one computer system to another Table B.

Hence, the referential Integrity restraint make secure that the relationship middle from two points the information in visible form in a table exist compatible and right. Hence, referential integrity restraint exist concerned with restrain INSERT and UPDATE movement that influence the parent very young person connection.

This eventually indicate that, referential Integrity are rules secondhand fashionable collection of data management structure (DBMS) to make secure friendship middle from two points tables when records are transformed exist VALID (INSERT and UPDATE). In a nutshell, it forever ensures a basic key must bear a equal foreign key or it enhance ineffectual.

See more about integrity at brainly.com/question/14406733

Why would you set up a workbook to be shared if you are the only one using the workbook?

a. You can send emails of your edits to yourself.
b. You can track changes.
c. You can make a draft copy of the workbook.
d. You can password protect the workbook.

Answers

Answer:

b. You can track changes.

Explanation:

Setting up a workbook to be shared if you are the only one using the workbook is to enable you track the changes that may occur.

When sharing a workbook, you can allow users gain access to it, make changes and then you easily track those changes.

It makes a team to work simultaneously on the same workbook.

A work book is a file that consists of more than work sheet that helps you to organize A workbook can be created from a blank workbook or a template.

MS excel has a collection of many work books and many worksheets that can help in keeping the track of changes. They are arranged in a network of rectangle cells. In the tabular form of rows and columns.

Hence the option B is correct.

Learn more about the set up of a workbook to be shared if you.

brainly.in/question/20376644.

When working at a retail store that also fixes computers, what five pieces of information should you request when a customer first brings a computer to your counter?

Answers

Answer:

From where did you purchase the computer?

How old is it?

What is the issue that you are facing?

Did you get it repaired before or is it the first time?

By what time do you want it to be repaired?

Did you get any of its parts replaced before?

Error messages are a key part of an overall interface design strategy of guidance for the user. Discuss strategies to ensure integrated, coordinated error messages that are consistent across an application.

Answers

Answer:

Answered below

Explanation:

In order to not discourage the user, error messages must be implemented in a user-friendly way with the use of strategies which ensure coordination, consistency and simplicity.

Error messages should be short, direct and communicate clearly, the right amount of information to a user. These messages should be sorted into categories which represent different kinds of errors. These specific categories should have a brief alphanumeric code that can be easily shared with a customer support personnel for solution and also to help users search for solutions themselves, on the internet.

Out of the following three statements, which one is analytical?
Group of answer choices

Sleep deprivation is the term for getting too little sleep.

Scientific studies have shown that even in the short term, sleep deprivation is bad for productivity and people who get too little sleep have a more difficult time learning and retaining information, make poor decisions, and are more likely to have accidents.

If you want to do well in school then you should get enough sleep.

all of these.

Answers

Hi! I hope this helps!
The second option is correct it is more analytical since it uses sources and a more thought out presentation of facts.

Write a program to complete the task given below: Ask the user to enter any 2 numbers in between 1-10 and add both of them to another variable call z. Use z for adding 30 into it and print the final result by using variable results.

Answers

Answer:

a = int(input("Enter first value between 1 - 10"))

b = int(input("Enter second value between 1 - 10"))

z = a + b

z += 30

print("The value of z = ", z)

Explanation:

The code is written above in python language to perform the given task.

Now, let us explain each statement of code.

Step 1: The first two lines take input from the user prompting the user to enter the values between 1 to 10.

Then the values are type casted to int using int().

The values are stored in variables a and b.

Step 2: Then, the values of a and b are added to get another variable z.

Step 3: The statement 'z += 30' is equivalent to z = z+30

It adds 30 to the variable z and stores it in the same variable z.

Step 4: Finally the value of variable 'z' is printed using print() command.

Which of the following corresponds to the computer interface technology that uses icon, etc?
A. CUI
B. CAI
C. GDI
D. GUI

Answers

Answer:

D) GUI

Explanation:

GUI an acronym for Graphical user interface, is a type of user interface where a user interacts with a computer or an electronic device through the use of graphics. These graphics include icons, images, navigation bars etc.

GUIs use a combination of technologies and devices to create a layout that users can interact with and perform tasks on. This makes it easier for users who do have basic computer skills to utilize.

The most common combination of these elements is the windows, icons, menus and pointer paradigm (WIMP) . GUIs are used in mobile devices, gaming devices, smartphones, MP3 players etc.

The balanced F measure (a.k.a. F1) is defined as the harmonic mean of precision and recall. What is the advantage of using the harmonic mean rather than "averaging" (using the arithmetic mean)?

Answers

Answer:

Because the value derived from harmonic mean reflects the credible result of search engine

Explanation:

Given that the value of arithmetic mean tends to be closer to the highest value between Precision and Recall, while the value of the harmonic mean, is the lowest value between Precision and Recall, in a situation where all documents relevant to a query are returned, where R = 1 and P is closer to 0, the arithmetic mean will be greater than 0.5 and will not reflects the credible result of search engine

However, if the harmonic mean is utilized, the value will be closer to the low Precision value, hence it closely reflects the credible result of search engine

In the following scenario, which is the least
important criteria in evaluating the technological
device?
A college student needs a laptop that can be used
while commuting on the train and sitting in lecture.
Connectivity
Size
Speed
Storage

Answers

Answer:

Size

Explanation:

Connectivity, they need internet to work.

Speed, they need it to work fast.

Storage, they need space to work.

Size, isn't all that important, unlike the rest.

In the following scenario, the least important criterion in evaluating the technological device is its size. Thus the correct option is B.

What is Laptop?

A laptop is referred to as a portable computer that is easy to carry and performs a similar function to a computer with advanced technology. This is well suitable to use in jobs like traveling as it does not require sitting space like a PC.

In this case, when a college student needs s a laptop that can be used while commuting on the train and sitting in a lecture the least criterion in evaluating the device in size as it is already portable and easy to carry so not required importance.

While evaluating any technological device its speed and storage play a significant role in decision making as it smoothes the operations of the device and performs tasks quickly.

As it is used in train and lectures connectivity also plays a significant role in establishing communication with each other. Therefore, option B is appropriate.

Learn more about Laptop, here:

https://brainly.com/question/13092565


#SPJ6

Tanya is working on a science project with three other people. They are having a difficult time coordinating their schedules, but it's important they all meet to discuss their roles and responsibilities. What communication technology would be most efficient? Cloud computing Emailing Social networking Web conferencing

Answers

Answer:

Web Conferencing

Explanation:

you'd be speaking to them face to face

"Confrontation"

They rlly won't have an excuse and will just have to face it and take more responsibility

Subtract (100000)2 from (111)2 using 1s and 2s complement method of subtraction​

Answers

Answer:

-11001

Explanation:

The following steps are performed in order to perform subtraction of the given binary numbers:

Step 1:

Find 2’s complement of the subtrahend. The subtrahend here is 100000

100000

First take 1's complement of 100000

1's complement is taken by inverting 100000

1's complement of 100000 = 011111

Now takes 2's complement by adding 1 to the result of 1's complement:

011111 + 1 = 100000

2's complement of 100000 = 100000

Step 2:

Add the 2's complement of the subtrahend to the minuend.

The number of bits in the minuend is less than that of subtrahend. Make the number of bits in the minuend equal to that of subtrahend by placing 0s in before minuend. So the minuend 111 becomes:

000111

Now add the 2's complement of 100000 to 000111

   0 0 0 1  1  1

+   1 0 0 0 0 0

    1 0 0 1  1  1

The result of the addition is :

 1 0 0 1  1  1

Step 3:

Since there is no carry over the next step is to take 2's complement of the sum and place negative sign with the result as the result is negative.

sum =   1 0 0 1  1  1

2's complement of sum:

First take 1's complement of 1 0 0 1  1  1

1's complement is taken by inverting 1 0 0 1  1  1

1's complement of 1 0 0 1  1  1 = 0 1 1 0 0 0

Now takes 2's complement by adding 1 to the result of 1's complement:

0 1 1 0 0 0 + 1 = 0 1 1 0 0 1

Now place the minus sign with the result of 2's complement:

- 0 1 1 0 0 1

Hence the subtraction of two binary numbers (100000)₂ and (111)₂  is

(-011001)₂

This can also be written as:

(-11001)₂

#We've started a recursive function below called #measure_string that should take in one string parameter, #myStr, and returns its length. However, you may not use #Python's built-in len function. # #Finish our code. We are missing the base case and the #recursive call. # #HINT: Often when we have recursion involving strings, we #want to break down the string to be in its simplest form. #Think about how you could splice a string little by little. #Then think about what your base case might be - what is #the most basic, minimal string you can have in python? # #Hint 2: How can you establish the base case has been #reached without the len() function? #You may not use the built-in 'len()' function.

Answers

Answer:

Here is the Python program:

def measure_string(myStr):  #function that takes a string as parameter

   if myStr == '':  #if the string is empty (base case)

       return 0  #return 0

   else:  #if string is not empty

       return 1 + measure_string(myStr[0:-1])  #calls function recursively to find the length of the string (recursive case)

#in order to check the working of the above function the following statement is used        

print(measure_string("13 characters")) //calls function and passes the string to it and print the output on the screen        

Explanation:

The function works as following:

Suppose the string is 13 characters

myStr = "13 characters"

if myStr == '': this is the base case and this does not evaluate to true because myStr is not empty. This is basically the alternate of

if len(myStr) == 0: but we are not supposed to use len function here so we use if myStr == '' instead.

So the program control moves to the else part

return 1 + measure_string(myStr[0:-1])  this statement is a recursive call to the function measure_string.

myStr[0:-1] in the statement is a slice list that starts from the first character of the myStr string (at 0 index) to the last character of the string (-1 index)

This statement can also be written as:

return 1 + measure_string(myStr[1:])

or

return 1 + measure_string(myStr[:-1])  This statement start from 1st character and ends at last character

This statement keeps calling measure_string until the myStr is empty. The method gets each character using a slice and maintains a count by adding 1 each time this statement is returned.The function breaks string into its first character [0:] and all the rest characters [:-1]. and recursively counts the number of character occurrences and add 1. So there are 13 characters in the example string. So the output is:

13

Other Questions
Someone receives and email that appears to be from their bank requesting them to verify account information, this type of attack is: It can be inferred from the passage that the author would be most likely to agree with which of the following statements about schools?(A) They should present political information according to carefully planned, schematic arrangements.(B) They themselves constitute part of a general sociopolitical system that adolescents are learning to understand.(C) If they were to introduce political subject matter in the primary grades, students would understand current political realities at an earlier age.(D) They are ineffectual to the degree that they disregard adolescents political naivet.(E) Because they are subsidiary to government their contribution to the political understanding of adolescent must be limited. 1. PART A: Which statement best identifies the central idea ofthe text?O A The twentieth century witnessed numerous tragedies,outweighing the few instances of peace and eclipsingany hope for future change.OB During World War II, the U.S. was the driving forcebehind freeing victims of the Holocaust and promotingpeace.O C The Holocaust could have been prevented if the worldhad the means to identify the warning signs of ethniccleansing.OD The Holocaust exemplifies the consequences of howapathy towards human suffering can cause tragedy. The ratio of adults to students on a class field trip is 2 to 5. If there are 12 more students than adults, which proportion and solution represent this situation? Three dozen cookies require 4 cups of flour. How many dozens of cookies can be made with 16 cups of flour? According to the US Census Bureau, in the Election of 2004 about 65% of all voting-age people were registered to vote.However, of those who were registered, 41.7% did not vote, down from the mark of 45.3% that did not vote in the Election of2000.This information might show thatAvoter apathy is increasingB)voter apathy is decreasing.people no longer care about the issuesD)mid-term elections create less turnout _____________ is a short-term debt security sold by a business firm or financial institution to another business or institution where the seller agrees to buy back the security at a specified price and date. ((4-x)/5)+((x+2)/3)=6 Please Help Soon How many whole numbers from 0 to 55? how did so many americans learn about the events in boston so quickly? Why is the pH scale important in science? Give several examples of scientific applications. Alcohol is a __________ A. stimulant. B. depressant. C. neither. Water flows at 8.4 m3/s in a trapezoidal channel with a bottom width of 2 m and side slopes of 2:1 (H:V). Over a distance of 100 m, the bottom width expands to 2.5 m, with the side slopes remaining constant at 2:1. If the depth of flow at both of these sections is 1 m and the channel slope is 0.001, calculate the head loss between the sections. What is the power in kilowatts that is dissipated Two cars collide head on while each is traveling at 60km/h .Suppose all their kinetic energy is transformed into the thermal energy of the wrecks. What is the temperature increase of each car?You can assume that each car's specific heat is that of iron. Which type of cluster does NOT belong? a. Density-based b. Shared-Property c. Prototype-based d. Hierarchical-based How does work affect energy between objects so it can cause a change in the form of energy? Work transfers energy. Work changes energy. Work increases energy. Work decreases energy. 3. Which of the following has a value that isless than zero?a. (-6)2b. (32c. 0.52d. -72 Alicia has a fairly weak case to present to her supervisor. In order to be more persuasive, she should Which best explains why banks consider interest on loans to be important? Interest enables them to control the economy. Interest helps them to satisfy customers. Interest enables them to stockpile money. Interest helps them cover business costs. Guys I have been helping you in many subjects... Now can u help me now? Plz? It's very urgent... Plz.... I will mark BRAINLIEST who gives the full ans.... Tysm!