2) which social media category allows users to publish rain continent has pose by restricts the size of the post to a certain number of characters?
A: reviews B: blogging C: Microblogging D: Forums E: Media Sharing sites

Answers

Answer 1

Answer:

E

Explanation:

Media Sharing sites


Related Questions

The space between the margin
and start
of paragraph is called

Answers

Answer:

The space between the margin and start of paragraph is called an indent OR Indentation.06

Explanation:

Why is STEM education important?

You u have any ideas I will appreciate it!!

Answers

Answer:

Throughout the below portion, some importance of the STEM education is described.

Explanation:

STEM curriculum or knowledge aims to overcome the cultural and class differences often seen in mathematics and science sectors, It's necessary as everything influences our universe.Innovation comes with new goods as well as programs that enable existing economic situations depending on a strong knowledge base throughout the STEM sectors.

Hello,
Can you please help me with the following questions:
3. You enjoy technical matters, have a background in computer science and enjoy coding and playing video games in your free time. Which video game industry job would best match your profile?
a. Game tester
b. Producer
c. Programmer
d. Video game artist

6. Which of the following is an essential skill for game testers?
a. Thorough understanding of Java and C++
b. Technical drawing
c. Technical writing
d. Project management

9. Which of the following skills is the most important when applying for a game artist job?
a. Degree in arts
b. Strong art portfolio
c. Previous game testing experience
d, knowledge of scripting and codeing

10. The Stencyl program is recommended for ______.
a. creating 2D games
b. creating 3D games
c. Starting to learn to program
d. creating gaming art

11. You are passionate about video games, have spent part of your life in different countries and are fluent in their languages. You are considering looking for a job in video games. Which of the following jobs could you be qualified for, considering your skills and experience?
a. Game programming with a focus on languages
b. Translation
c. Game localization
d. Cultural gaming

12. Because it is one of the main programming languages used in some of the most popular game engines in the industry, which programming language does the author of the textbook recommend learning first?
a. Java
b. C Sharp
c. C++
d. SQL

13. Which of the following statements is NOT true about internships?
a. internships offer great opportunity to create and build connections within the industry.
b. Internships lead to a job offer upon successful completion
c. Internships offer an opportunity to get first-hand experience of the industry
d. Internships can be paid or unpaid

15. What is the best approach to take if you have not heard back from a company after applying for a job?
a. Wait, sometimes it takes time to process application and impatience can give a bad impression
b. Visit the company site personally to inquire about the status of your application
c. Try to find out on which side the process may be stalling and take appropriate steps to get the process moving forward, when possible
d. Reapply

18. You are applying for a game programmer job at a reputable gaming company. Your application may stand the best chance of being noticed if you include which of the following in your application?
a. List of all degrees and courses you have taken to acquire and hone your programming skills
b. Portfolio including samples of codes you have created
c. Portfolio including playable video game demo.
d. Portfolio of your artwork.

19. Which of the following is the most important item to include in your CV?
a. All gaming projects you have worked on, paid or unpaid.
b. Extracurricular activities related to gaming.
c. Major accomplishments
d. Short samples of code or technical writing samples.

20. Which of the following job hunting practices is the least effective?
a. Posting CV on job boards.
b. Searching for jobs on job posting sites
c. Doing an internship
d. Applying for a specific job posting via company website

Answers

Answer:

C, C, B, C, C, B, B or D, D, A or C, A, D

Explanation:

I am not taking whatever course you are taking, but I would like to know what you're taking. I have only answered the questions to the best of my abilities, so they might be wrong. Next time please award more points for a question so long.

Suppose that the five measured SampleRTT values are 106 ms, 120 ms, 140 ms, 90 ms, and 115 ms.

a. Compute the EstimatedRTT after each of these SampleRTT values is obtained, using a value of α = 0.125 and assuming that the value of EstimatedRTT was 100 ms just before the first of these five samples were obtained.
b. Compute also the DevRTT after each sample is obtained, assuming a value of β=0.25 and assuming the value of DevRTT was 5 ms just before the first of these five samples was obtained. Last, compute the TCP TimeoutInterval after each of these samples is obtained.

Answers

Answer:

a) 100.75,   103.15,    107.756,    105.536,   106.72

b) 5.06,    8,       14.061,       14.43,    12.89

Explanation:

Measured sample RTT values : 106 ms, 120 ms, 140 ms,  90 ms,  115 ms

First estimated RTT value = 100 ms

∝ = 0.125

β = 0.25

First DevRTT value = 5 ms

A)   Compute the EstimatedRTT after each of these SampleRTT values is obtained,

Formula for estimated RTT = ( 1 - ∝ ) . estimated RTT + ∝.sample RTT

B). Compute  the DevRTT after each sample is obtained,

Formula for DevRTT = ( 1 - β ) . DevRTT + β. | sample RTT - Estimated RTT |

attached below is a detailed solution

The Answer will be  

Answer a) 100.75,   103.15,    107.756,    105.536,   106.72

Answer b) 5.06,    8,       14.061,       14.43,    12.89

After Measured the sample RTT values are:  106 ms, 120 ms, 140 ms,  90 ms,  115 ms Then First estimated RTT value are = 100 ms ∝ = 0.125 β = 0.25 secondly ,then we find DevRTT value = 5 ms

A) Then  Compute the Estimated RTT after each of these SampleRTT values is obtained, apply the formula  

The Formula for estimated RTT are = ( 1 - ∝ ) . estimated RTT + ∝.sample is RTT

B). Compute  the DevRTT after each sample is obtained,

The Formula for DevRTT are = ( 1 - β ).  Dev RTT + β. | sample RTT - Estimated RTT |

Learn more information:

https://brainly.com/question/14979936

write the output for the following arithmetic operation 14/3
a)4
b)4.666
c)5​

Answers

Answer:

answer 4 Gg why are you asking to write so long in sentence?

can change the tab colors of the worksheets in excel

Answers

Answer:

right-click the tab, point to Tab Color and pick a color that you want. Tip: Click away from the formatted tab to see the new tab color. If you want to remove the color, right-click the tab, point to Tab Color, and pick No Color

which button do you click to add up a series of numbers

Answers

It’s autosum



Explanation

How can I be future ready (in terms of careers and in general)?

This is for school


Please provide at least 3 reasons with evidence, and make sure they are not personalized towards you; just provide a general overview

Thanks, appreciate it.

Answers

Answer:

being ready to take care of yourself and getting high scores

Explanation:

you will have to have high scores to get a good job or even start a business you wont have somone to take care of you if your 26 like your a boss

Introduction To Micro-Technology
Computer Science Assignment/Project
Course Title: Micro-Soft Excel
AD
BG
LE
Sal
Ady
175
30
59
88
117
146
175
204
233
262
291
320
ID
001
002
003
004
005
006
007
008
009
010
Namc
Sanita Cully
Saah Kpakar
Rudolph Gayflor
Francis Yoryor
Adolphus Naigar
Moses Gay gay
Philip Kuoper
Simon Momno
David Brown
John Yankar
CJ
Hr.
Work
178
180
145
160
185
150
182
186
190
120
DM
IIr.
Rate
8
6
S
4
7
9
10
12
14
15
EP
Reg.
Pay
300
350
325
250
275
340
345
FS GV
Over Gross
Time Pay
115 450
100 500
75 475
50 485
40 425
30 430
35 435
20 375
25 490
80 585
HY JC
Inc. SS
Tax Tax
10.20 20.04
11.75 21.00
12.30 21.06
15.05 22.00
22.08
10.00 23.00
15.75 23.10
17.22 24.00
20.05 24.12
20.00 26.00
17.05
181
141
161
186
151
183
187
191
121
200
TI
380
400
1. Direction: List the Relative, Absolute and Mixed Cell References of the following figures
in the above table:
i. 180
ii. 25
ili 175
iv. 183
V 6
2. State the meanings of the three types of cell references.
3. Assume that you were asked to find Average, Total Number of Students, Maximum,
Minimum and Product. What are the terms used in finding the above within the database?
4. Looking at the cell reference of Status will respect to commission; build a cell reference
stating that if sales which is B7, Less than 800, the rate is 2% below is 1% and state if it
is true or false.
5. Slate the steps of Deleting and Inserting Row.​

Answers

Answer:

i need more

Explanation:

i need more

You are the CEO of a large tech company and have just received an angry email that looks like it came from one of your biggest customers. The email says your company is overbilling the customer and asks that you examine the attached invoice. You do but find it blank, so you reply politely to the sender asking for more details. You never hear back, but a week later your security team tells you that your credentials have been used to access and exfiltrate large amounts of company financial data. What kind of attack did you fall victim to?A. A fly phishing attackB. A shark attackC. As a phishing attackD. As a whale attack

Answers

Answer: as a whale attack

Explanation:

A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.

Based on the explanation above, the attack called into is a whale attack.

under what circumstances can borrowers postpone payment of their federal student loans

Answers

Answer:

If the individual is temporarily unemployed, in active military service, suffering economic hardship, presently disabled, undergoing cancer treatment, serving in the Peace Corps, enrolled in a graduate fellowship program, he can postpone loan repayment.

Explanation:

There are three conditions wherein the postponement of student loans are applicable. They include;

1. Grace Periods: This is the period when the student has just graduated from school and is given sometime by the employer to get a job. This most times comes is included in the initial stage of the loan offer.

2. Deferment: Occurs when the individual is unemployed or undergoing an economic hardship. At this time, he is not required to pay interest. To be qualified for deferment, the individual must not be behind in loan payments for the past 270 days.

3. Forbearance: The individual willingly suspends payment but is expected to pay interest.

d. A................ usually contains detailed comments about something in the text.
i. Footer
ii Footnote
Hii Header
iv. none of these​

Answers

Answer: Foot note

Explanation:

The option that contains detailed comments about something in the text is simply referred to as the foot note.

A footnote is simply refered to as the note that is at the bottom of a particular page which gives more information about a particular thing.

Therefore, based on the options given, the answer is B.

The following is a partial overall list of some of the sources for security information: • Security content (online or printed articles that deal specifically with unbiased security content)

• Consumer content (general consumer-based magazines or broadcasts not devoted to security but occasionally carry end-user security tips)
• Vendor content (material from security vendors who sell security services, hardware, or software)
• Security experts (IT staff recommendations or newsletters)
• Direct instruction (college classes or a workshop conducted by a local computer vendor)
• Friends and family
• Personal experience

Required:
Create a table with each of these sources and columns listed Advantages, Disadvantages, Example, and Rating.

Answers

Answer:

Kindly check explanation

Explanation:

SOURCE OF SECURITY INFORMATION :

• Security content (online or printed articles that deal specifically with unbiased security content)

ADVANTAGES :

Target based on highly specific to certain aspects

DISADVANTAGES :

They usually cover limited aspects

RATING : 4

SOURCE OF SECURITY INFORMATION :

• Consumer content (general consumer-based magazines or broadcasts not devoted to security but occasionally carry end-user security tips)

ADVANTAGES :

Offers greater level of accessibility

DISADVANTAGES :

They aren't usually curated and thus may be inaccurate

RATING : 6

SOURCE OF SECURITY INFORMATION :

• Vendor content (material from security vendors who sell security services, hardware, or software)

ADVANTAGES :

Accurate information and tips

DISADVANTAGES :

Usually involves a fee

RATING : 3

SOURCE OF SECURITY INFORMATION :

• Security experts (IT staff recommendations or newsletters)

ADVANTAGES :

Accurate and vast tips

DISADVANTAGES :

Not much

RATING : 5

SOURCE OF SECURITY INFORMATION :

• Direct instruction (college classes or a workshop conducted by a local computer vendor)

ADVANTAGES :

Highly specific

DISADVANTAGES :

They usually cover limited aspects

RATING : 2

SOURCE OF SECURITY INFORMATION :

• Friends and family

ADVANTAGES :

Cheap

DISADVANTAGES :

May be biased and inaccurate

RATING : 7

SOURCE OF SECURITY INFORMATION :

• Personal experience

ADVANTAGES :

Grows continuously with time

DISADVANTAGES :

Limited in nature

RATING : 1

In which of the following ways are copyrights different from trademarks?

It is illegal to use a copyrighted work without the author's permission, but not a trademark.

It is more difficult to register a copyright than to obtain a trademark.

It is illegal to use a trademark without the author's permission, but not a copyrighted work.

It is more difficult to obtain a trademark than to register a copyright.

Answers

It is more difficult to obtain a trademark than to register a copyright.

Answer:

Copyrighted materials can be used under fair use laws, while trademarked materials cannot.

Explanation:

What Are the Various Broadband Internet Connections? *​

Answers

Answer:

This is your answer

Answer:

Types of Broadband Connections

Digital Subscriber Line (DSL) Cable Modem. Fiber. Wireless. Satellite. Broadband over Powerlines (BPL)

Hope this helps you. Do mark me as brainliest.

What is information

Answers

Information is a set of facts about a topic or a group of details about something

Answer:

The definition of information is news or knowledge received or given. An example of information is what's given to someone who asks for background about something. Information is the summarization of data. Technically, data are raw facts and figures that are processed into information, such as summaries and totals.

This may range from content in any format – written or printed on paper, stored in electronic databases, collected on the Internet etc.

Explanation:

*Flip's the table and moonwalk's out*

Select the correct text in the passage.

Identify who can apply for a graduate certificate.

Pete has a technical certificate and is a robotics technician. Melinda completed her undergraduate certification course last week while studying for her undergraduate degree course. Brian is fresh out of high school and wants to be a robotics automation engineer. Timothy has a bachelor’s degree in mechanical engineering and works in a robotics firm.

Answers

Answer:

Timothy can apply for the graduate certificate

Explanation:

because if he has a good bachelor's degree

Learning Management Systems (LMS) allow students to interact with each other, but NOT their teachers.

Answers

Answer:

what do you mean friend not for teacher

Answer:

Explanation:

Communication outside the classroom can be facilitated through discussion forums, real-time messaging, video-conferencing, email and announcement posts.

Write a C++ program to read from the user an integer number of 4 digits and display it in reverse order. For example, if the input is 5723 the output should be 3275. (Hint use / and %). The program should display “Invalid input” if the input value is not a 4 digits number.

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

 int n, reversedNumber = 0, remainder;

 cout << "Enter a number: ";

 cin >> n;

 int length = to_string(n).length();

 if (length == 4){

   while(n != 0) {

     remainder = n%10;

     reversedNumber = reversedNumber*10 + remainder;

     n /= 10;

   }

   cout << "Reversed Number = " << reversedNumber << endl;

 }

 else{

   cout << "Invalid Input!" << endl;

 }

 return 0;

}

Explanation:

So, it's pretty easy. It finds the remainder to reverse the number and for the invalid input part, you convert the input into a string and then use .length() to find the length. Then you can reverse the number and show whatever output

Answer:

#include <iostream>

using namespace std;

int main() {

int n, reversedNumber = 0, remainder;

cout << "Enter a number: ";

cin >> n;

int length = to_string(n).length();

if (length == 4){

  while(n != 0) {

    remainder = n%10;

    reversedNumber = reversedNumber*10 + remainder;

    n /= 10;

  }

  cout << "Reversed Number = " << reversedNumber << endl;

}

else{

  cout << "Invalid Input!" << endl;

}

return 0;

}

Explanation:

So, it's pretty easy. It finds the remainder to reverse the number and for the invalid input part, you convert the input...

Explanation:

Which network protocol is used to handle the Reliable delivery pf information

Answers

Answer:

TCP

Explanation:

TCP is a reliable transport protocol, and performs processes to ensure reliable delivery of data between applications using acknowledged delivery.

1. name of industry credential available to students taking this class

2. two reasons for acquiring the industry credential

Answers

Answer:

Explanation:

I need points to ask questions

Oliver is working for a team that uses object-oriented concepts to design software. Which language would they use to develop this software?

Answers

Answer:

Probably C++

Explanation:

The language must be object oriented. This narrows it to something like Java or C++. Java is fine for application development, but has a compiler and interpreter whereas C++ only has a compiler.

Binary Search:


2 6 15 42 55 89 111 256

Answers

Answer:

2 =  10

6 = 110

15 = 1111

42 = 101010

55 = 110111

89 = 1011001

111 = 1101111

256 = 100000000

Does analogue conversation take place in source as transmitter?

Answers

Answer:Analog and digital signals are the types of signals carrying information. The major difference between both signals is that the analog signals that have continuous electrical signals, while digital signals have non-continuous electrical signals.

Explanation:

When a tape deck is plugged into recording equipment, the analog cassette tape is transformed into a digital equivalent.

What is the analogue conversation in source as transmitter?

An analog media is a tangible, changed thing that stores music. For instance, to record sound on a cassette tape, a tape recorder modifies the magnetic properties of magnetic tape.

Signals containing information often come in the form of analog and digital signals. The primary distinction between the two signals is that analog signals have continuously varying electrical signals, but digital signals do not.

And no source coder or channel coding are used at the transmitter side; just this occurs there.

Therefore, The channel's signal is picked up at the receiver's end and sent through a demodulator before being approximated to be the original information signal.

Learn more about analogue conversation here:

https://brainly.com/question/24750760

#SPJ2

Microsoft
When deleting comments, one can delete a ____________________________________ comment, or one can delete all comments at once. [Delete Comments]
Question 2 options:

double

single

bolded

old

Answers

Answer:

Single

Explanation:

Just took the test and got a A!

What is the output of this program? age=4 if age >5: print (“more”) else: print (“less”)

Answers

Answer:

less

Explanation:

The input is 4, a number that is not greater than 5. So as a result, it will print "less".

Jason wants to set up his Wi-Fi’s security. He cannot install a central server for authentication. However, he wants to use a pre-shared key to allow users to connect to the Wi-Fi. Which security standard will support Jason’s requirements?

A.
WPA
B.
WPA2-Enterprise
C.
WPA2-Personal
D.
WPA3

Answers

Answer:

Answer = a ig

wpa. ig ig ig ig

excuse me can i help 1) what is computer? Define about Accuracy and
Data storage.​

Answers

Answer:

an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program. ma pani nepali

Given that, x = 2, y = 1, and z = 0, what will the following cout statement display?

cout << "answer = " << (x || !y && z) << endl;

Answers

Answer:

This will return 1

Code:

#include <iostream>

using namespace std;

int x = 2;

int y = 1;

int z = 0;

int main() {

   cout << (x || !y && z) << endl;

   return 0;

}

Poor infrastructure hampers growth because it
Select one:
a. Reduces the mobility of labor
b. All are correct
c. Reduces the ability of export businesses
d. Causes higher costs and delays for businesses.​

Answers

Answer:

B. All are correct

Explanation:

Poor infrastructure causes higher supply costs and delays for businesses. It reduces labour mobility and hurts the ability of exporters to get products to global markets.

Other Questions
Please help meee ASAP what type of energy is playing the piano A.light B. Thermal C.electrical D.mechanical E.sound Which value of a from the set {16, 18, 20, 22} makes the equation 2(42 - a) = 48 true? A. 16 B. 18 C. 20 D. 22 Preterite or imperfect Spanish sentence conjugation HELP HELP HELP HELP HELP HELP tell the time in spanish in a complete sentence. 7:17 in the evening a woodworker wants to cut a board that is 8.225 ft long into 5 equal length pieces how long will each of the cupboards be? QUESTION 8DOK 4Watch later ShareImagine that an atom of Fluorine (F) can bond with oneof the following atoms. Which one do you think it ismost likely to bond with? Why?Lithium (Li)Beryllium (Be)Boron (B)Carbon (C)For more videos,check out:Click to answerneTwww.videochemistrytextbook.comYoulubeSAVE DRAFTSUBMIT13:22 / 16:52 5x + 3y = -15 + y= 2/3x + 9 Factor.4a249A. (2a+7)(2a7)B. 4(a7)(a+7)C. 4a(a49)D. (2a7)2 WILL GIVE ANOTHER ONE BRAINLYWhich of the following is an independent clause? *a. the beautiful yellow kittenb. in stillness of the chaosc. he stood upd. rice palay plantations bursting sheafs Which sentence BEST expresses the theme of the poem? A. America is changing. B. Americans work for themselves. C. America is diverse. D. Americans are proud of their country. 1) Do you believe in UFOs? Why or why not? What happens at the termination site?DNA thingz Thank you guys for saying the art was grea but do you guys have any advice on it or something let me know! Someone please help Im completely lost Of the following statements, which describes what pessimistic individuals tend to do?A. They blame situational factors on their own personal failures.B. They continually expect positive outcomes despite their own limitations,C. They blame their personal inadequacies on situational factors.D. They attribute limitations to personal flaws instead of situational factors. Select the correct answer.Tom finds out that his coworker is sharing confidential information with a competitor. What should Tom do to handle the situation?A. discuss it with his other colleagues so that more people are aware of itB. report it to the supervisorC. ignore it because it is beyond his scope of workD. work out an arrangement that will benefit him monetarily Help! Identify the characteristics of a mixed economy( pretty sure there are 3 answers) A circle has a mass of 3 grams and a square has amass of 2 grams.What is the mass of a triangle?angramsA.B. 3 gramsC. 3 gramsD. 11 grams