Answers

Answer 1

Answer:

The advantages include much access to photos, digital functions like games and contacts with friends, videos, and you can search questions to anything you like. Disadvantages include things like too much screen time affecting sleep, health, and other physical problems. There is also exposure to explicit content and hatred from strangers.

There are hundreds of editing software for you to try, and many are free to use and are even compatible offline. They can make content related to or look like something in a movie or can be used to make things look nicer and cooler.


Related Questions

the difference between tool bar and status bar​

Answers

Answer:

A toolbar offers easier access to tasks typically conducted within the application whereas in the status bar it is displayed at the lower side of the web browser screens and other application windows.

Explanation:

Suppose that you have a computer with a memory unit of 24 bits per word. In this
computer, the assembly program’s instruction set consists of 198 different operations.
All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
1. How many bits are needed for the opcode?
2. How many bits are left for the address part of the instruction?
3. How many additional instructions could be added to this instruction set without
exceeding the assigned number of bits? Discuss and show your calculations.
4. What is the largest unsigned binary number that the address can hold?

Answers

Answer:

a )   The amount of bits required for the opcode

 8 bits

2^8=  256        

 256>198

 We get the next lower number, which is 2^7 = 128 bits, because it is greater than 198. As a result, the operation code necessitates 8 bits.

b)   The number of bits reserved for the instruction's address.

 16 bits

 24-8  =  16

c)  

 65536

2^16  =  65536

 Maximum number =  65535

  2^15 = 32768-1

 =  32767

Explanation:

A program checks to see if the input is valid using
numbers
operators
logic
output​

Answers

Use the knowledge in computational language in python program checks to see if the input is output​.

How to define input in Python?

In Python, we do this using the input() function, which is literally 'input' in English. The input() function receives as a parameter a string that will be shown as an aid to the user, usually informing him what kind of data the program is expecting to receive.

So in an easier way we have that the code is:

def isNumber(x):

   if type(x) == int:

        return True

   else:

        return False

input1 = 122

input2 = '122'

if isNumber(input1):

   print("Integer")

else:

   print("String")

if isNumber(input2):

   print("Integer")

else:

   print("String")

See more about python at brainly.com/question/18502436

The ages of ELEVEN(11) students on Environmental Awareness Camp are:
12 9 11 7 10 10 9 9 8 9 11
Find the mean and standard deviation
A. Mean = 9.545; Standard deviation = 1.440
B. Mean = 9.545; Standard deviation = 2.073
C. Mean = 10.5; Standard deviation = 1.440
D. Mean = 10.5; Standard deviation = 2.073

Answers

Answer:

Gonna be smart. This took me a long time.

Explanation:

Result Standard Deviation, σ: 1.3726971700492

Count, N: 11

Sum, Σx: 105

Mean, μ: 9.5454545454545

Variance, σ2:  1.8842975206612

Steps

σ2 =  Σ(xi - μ)2

N=  (12 - 9.5454545454545)2 + ... + (11 - 9.5454545454545)2

11

=  

20.727272727273

11

=  1.8842975206612

σ =  √1.8842975206612

=  1.3726971700492

In simple words. A.

Does anyone know how to get past this part in Lego Harry Potter it’s the one right after Dobby in year 2? I’m so stuck!!!

Answers

thats a nice game. i dont know how to play it. how are you doing?

Question 2:
(5 marks)
According to the following code; you are required to draw the flowchart in details with
clear sequences
message=input("enter yes if there is message in the inbox");
attached=input("\n enter yes if there is attachment");
inbox=eval (input ("enter number of email"));
while inbox > 0:
if message=="yes":
print ("extract the message");
if attached=="yes":
print("extract the message");
email=input("eneter v for valied or not");
if email=="V":
print ("extract attached ");
print("inject Job ");
print("inject Submission");
en email=="N":
print("Inject an error");
print ("Remove the inbox mail ");
inbox-inbox-1;
DIO:
print("stop")

Answers

Flowcharts are visual representations of a code or program segments

How to draw the flowchart?

To draw the flowchart, we make use of the following symbols and figures

Oval: To begin and end the flowchartParallelogram: To accept input for the message, attached, inbox & email variables Parallelogram: To display all outputsRectangle: To perform the arithmetic operation; inbox = inbox - 1Diamond: To make several decisions and to initiate a loop process

See attachment for the flowchart that represents the code

Read more about flowcharts at:

https://brainly.com/question/24735155

The quickest way to change a word is to double
click it.
Select the correct answer
O True
False

Answers

Answer:

I don't think that the fastest way to change a word is to double click it. Even though it highlights it super fast, then you just press backspace once, it doesn't compare to the one where you press the "ctrl" and "backspace" key at the same time, and it makes the whole entire word disappear in the blink of an eye. But, I am not sure if anybody really knows about this trick. So, it is 50/50.

Explanation:

:)

write a C++ program to print name, age, class, school​

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   string name;

   string age;

   string Nameclass;

   string school;

   cout<<"What is your name?\n";

   cin>>name;

   cout<<"What is your age?\n";

   cin>>age;

   cout<<"What is your class?\n";

   cin>>Nameclass;

   cout<<"What is your school?\n";

   cin>>school;

   cout<<"Name: " + name;

   cout<<"\nAge: " + age;

   cout<<"\nClass: " + Nameclass;

   cout<<"\nSchool: " + school;

   return 0;

}

Explanation:

how bridges are built over water

Answers

It’s all depending on what method

Why do Linux administrators prefer to give sudo access to application teams instead of letting them su to root?

Answers

Answer:

Explanation:

some distros like ubuntu do not even allow su to switch to root. furthermore the su to root is dangerous because the user becomes the all-powerful administrative account, so no warnings are issued if the application team user tries to do something system-breaking.

True or False: F Layout is better for users who read left to right, but layout is better for users who read right to left.

Answers

Answer:

false

Explanation:

it depends on the user

You ran your email by a few colleagues, and they think it is perfect for your audience – professional, technical, and informative. Your email is ready to send out, so you schedule it for 8AM the next day to reach customers’ inboxes as they start their day. How should you include the email addresses?

Answers

You should include in the email addresses by CC all recipients.

What does it mean to CC recipients?

The CC abbreviation is a term that stands for “carbon copy.”

The CC recipients is known to get or receive also the same copy of the email and any kinds of other “Reply All” responses that one can see in the thread. Note that all recipients of the email will also see who has been given the CC' message.

See options below

-CC all recipients.

-BCC all recipients

Learn more about email from

https://brainly.com/question/14236855

a. The insert, Delete, and Format options are present in the
group on the Home tab.

Answers

Answer:

False

Explanation:

They are on the keyboard.

Psuedo code and flow charts

Answers

Answer:

pseudo is an informal high level description of the operating principle of an algorithm while a flow chart is a diagrammatic representation that illustrates a solution model to a given problem.

Given the string “supercalifragilisticexpialidocious”.
1. What is the length of the string i.e. write the script to find the length? (2 points)
2. Find the sub-string of first 5 positions and the other sub-string with last 5 positions. (4 points)
3. Find how many times “i” occurs in this word in python

Answers

The string and the three instructions is an illustration of the python strings

The length of the string

The following instruction calculates the length of the string using the Python script:

len("supercalifragilisticexpialidocious")

The returned value of the above instruction is: 34

The substrings

The following instruction calculates the sub-string of first 5 positions and the other sub-string with last 5 positions

myStr[:5]+myStr[-5:]

The returned string of the above instruction is: "supercious"

The number of occurrence of i

The following instruction calculates the occurrences of i in the string

"supercalifragilisticexpialidocious".count("i")

The returned value of the above instruction is: 7

Read more about python strings at:

https://brainly.com/question/13795586

Someone tell me the answer who thanks who ever who

Answers

Answer:

2. Trumpets,Guitar,Drums,Harp,Piano

3. The music notes and variety of colors and the melodies lines

4. 1 thing that needed change is maybe, it needed more intruments.

Complete the sentence.
For self-driving cars, both the programmers of the software and governments who regulate them must adhere to
intellectual property laws
ethical principles
noncompete agreements
- to safeguard that the software that controls the car is capable of making life-or-death

Answers

Answer:

[ C ]  governments who regulate the car industry

[ D ]  the programmers who create the software that control the car

Proof:

Governments who regulate the car industry, the programmers who create the software that control the car are the complete sentence.

What is car industry?

Car industry is the place where the manufacturing of the cars and automobile parts are placed. Car industry  do manufacturing work for the selling purpose. The company may be directly or indirectly engage in the selling industry.

Thus, sentences are completed.

For more details about car industry, click here:

https://brainly.com/question/1139792

#SPJ2

Write a C# program to Trim the Given String.
Write a C# program to Convert Upper case to Lower Case.
In C# programming

Answers

Answer:

Step by step explanation:

Which layer abstracts away the need for any other layers to care about what hardware is in use?

Answers

Answer:

data link layer

Explanation:

you answer is data link layer

Should new technology be created if there is a chance it will be misused?

Answers

Answer:

yes

Explanation:

sometime great things can happen out of terrible things.

Answer:

No, because if there is a chance that it will be misused, then it should not be created. Also, we are not told exactly how it may be misused - it could have catastrophic impacts, and cause harm.  

Explanation:

Take any software or Application that you have recently purchased, this can be a video game or any other application helping you to complete you educational objectives or professional purposes. Go through about the copyright, license policies [you will find this information on the leaflet or on the packaging] and answer the following questions]
Can you make copies? What does the license agreement say about the number of copies you can make? Explain in detail [ 2Marks]
Does it specify penalties for making unauthorized copies if yes give the brief detail on that?
[1 Mark]
Do you consider the license agreement to be clearly stated? Reasonable? Explain with two reasons. [ 2 Marks]

Answers

A good product should have copyright protection which prevents others from using the product without permission.

Some products specify the penalties which are given to a person who makes unauthorized copies of their product and this is done to clearly educate to avoid ignorance claims.

A good product should have clear lettering which are legible and can be easily read, and should also have reasonable copyright protection.

What is Copyright?

This refers to the licensing which is done for a product and is also legally backed which prevents a person from illegally using or redistributing the work of a creator without their explicit consent.

Read more about copyright infringement here:
https://brainly.com/question/1078532

You're a consultant for a large enterprise that needs a comprehensive IP addressing and DNS management solution for its physical and virtual networks. The enterprise has a primary office in Pittsburgh and three branch offices in Los Angeles, New York, and Miami. It has IT support staff only in the branch offices.The enterprise's server specialists are located in Pittsburgh. The IT directory in Pittsburgh wants to offload some of the IPAM management functions to some of the IT staff without giving them broader domain or forest administrative right. Which type of IPAM architecture do you recommend? Which features of IPAM are you likely to recommend using to address the requirements?

Answers

The type of IPAM architecture that I will recommend is the Centralized IPAM. The centralized IPAM server when deploy can help to address the issue.

What is IPAM?

IPAM (IP Address Management) is known to be a kind of administration of DNS and DHCP. This is known to be a network services that helps and handles IP addresses to machines in a TCP/IP network.

The Centralized Repository can help administrators to maintain or keep a good, correct and current records of all their IP assignments and left over addresses.

Learn more about IPAM from

https://brainly.com/question/24930846

do you think film is a great media in exposing information?​

Answers

not really everything don’t need to be on the internet

Answer:I think film is a great media in exposing information

Explanation:Films are great for exposing information for many reasons. Films are long, which increases the chance the watcher will remember, also it makes the watcher more involved and more interactive

Select the correct answer.
What should every HTML document begin with?
A. the element
B.the declaration
C. the element
D.the element

Answers

Answer:

B

Explanation:

Every HTML document must begin with a declaration of what the document is going to be about.

Draw a rectangle, give its perimeter and Area
Ask the user for a length and width of a rectangle.
Draw the rectangle
find and show the perimeter
find and show the Area

Answers

I am assuming this is in python, so I will use comments to explain each step

l=int(input('What is the length of the rectangle')

w=int(input('What is the width of the rectangle')

#here use whatever graphics code required to draw the rectangle

#will probably be similar to rect=Rectangle(l,w)

print('Perimeter is' +(2*l+2*w))

print('Area is' +(l*w))

For optimum computer performance, what features and or characteristics should a
computer possess to efficiently copy any material from an external device?

Answers

A computer should be compactible and possess a good cache memory size, so as to efficiently copy any material from an external device.

What is a computer?

A computer refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.

For optimum computer performance, some of the features and or characteristics that a computer should possess, so as to efficiently copy any material from an external device (hard-disk drive) are:

CompatibilityCache memory size.The computer should have a USB 3.0 port.

Read more on computer here: brainly.com/question/959479

Discussion 5
Kris Allen runs a pet daycare center. She needs to keep track of contact information for her customers, their animals, the services provided (such as walking and grooming), and the staff who are assigned to care for them. She also must send out invoices for payment each month. What features of spreadsheets and/or database software might she use to facilitate her business?

Answers

The features of spreadsheets and/or database software that she can use to facilitate her business are;

Rows and columns in spreadsheet's can make her information to be neatly organized.The use of Formulas and functions. Data filtering Accounting.Analytics, etc.

Why does business use database software?

Businesses can known to use database software to make a good and well manage data output. They also use it to work with their data.

Note that in almost all kinds of businesses, there is the use database software just to keep a track of contacts, addresses, payrolls and other  kind of functions to is linked to business and customers.

Learn more about database software  from

https://brainly.com/question/1022352

state the name of the following computer components​

Answers

Answer:

Memory.

Hard Drive or Solid State Drive.

Video card.

Motherboard.

Processor.

Power Supply.

Monitor.

Keyboard and Mouse.

Explanation:

Memory
Hard Drive or Solid State Drive
Video card
Motherboard
Processor
Power Supply
Monitor
Keyboard and Mouse
Optical Drive DVD/RW
Ethernet or Wireless card


Central Processing Unit (Cpu)
Random Access Memory (Ram)
Motherboard
Solid State Drive (Ssd)
Three
Games User Interface
Floppy Drive
Conclusion
The Motherboard
Usb Ports
Hardware And Software
Disk Drive
Optical Disk Storage
Scsi
Laser Printer
Processing Devices
Keyboard And Mouse
Lcd
Internal
External
Stylus
Code
Non Volatile Memory
Utility Software

Create a file using any word processing program or text editor. Write an application that displays the files name, containing folder, size, and time of last modification. Save the file as FileStatisits.java

Answers

Explanation:

TO MAKE FOLDER

-right click

-select 'new'

-and click on folder

Write an application that reads the file created by the WriteCustomerList application and displays the records. Save the file as DisplaySavedCustomerList.java.

Answers

Answer:

hi

Explanation:

Other Questions
A reaction that is spontaneous at low temperature can become non spontaneous at high temperature if h is\ if a dining room is 3 meters long in real life and is 1 centimeter long in the drawing, what scale factor does the drawing use? The main output of Sterling plywood industry is doors, which is an important need and can't be avoided. A lot of trees are cut down for this industry. Give a solution to this problem In about 100 words, discuss the difference between direct democracy and representative democracy. Big Eds car dealership is running a special on 2008 trucks. Big Ed offers financing at a rate of 6. 71% on a loan with a term of 36 months, but he requires the customer to make a down payment of 15% of the cost of the vehicle. You are interested in a Car Crusher truck that costs $25,230. Not including the down payment, how much will you pay over the lifetime of the loan? a. $27,924. 84 c. $23,735. 88 b. $25,789. 32 d. $21,445. 50. Which process can be used to power a home? solar thermal energy neither solar thermal energy nor solar electric energy both solar thermal energy and solar electric energy solar electric energyWhich process can be used to power a home? solar thermal energy neither solar thermal energy nor solar electric energy both solar thermal energy and solar electric energy solar electric energy Find the area of the unshaded region.multiple choice group answers 565555530560 The weather is getting much warmer after a cold winter. What is a common physical response with certain mammals?A. Mammals will grow bigger in the heat.B. Mammals will shed much of their fur or hair to help them cool off and maintain their body temperature.C. Mammals will move closer to water and beaches to stay cool.D. Mammals will depend on other animals or humans to help keep them cool. Study the cladogram. Which two organisms have dry skin? gorilla and shark shark and lizard lizard and tiger tiger and lamprey. RealidadesNombreHoraCapitulo 5AFechaGulded Practice Activities 5A-5Lectura: Desastre en Valdivia, Chile (pp. 256-257)A. Read the two paragraphs below about three disasters in Valdivia, Chile, from thereading in your textbook. Then answer the questions that follow.A los seis y dos minutos de la maana, el 21 de mayo de 1960, una granparte del pais sinti el primer terremoto. El prximo dia, el 22 de mayoa las tres y diez de la tarde, otro terremoto ms intenso.. ocurri.Unos minutos despus del desastroso terremoto, lleg un tsunami quedestruy lo poco que quedaba en la ciudad y en las pequeascomunidades. Lo gran ola de agua se levant destruyendo a su pasocosas, animales, botes y, por supuesto, muchas vidas humanas.1. Cognates are words that are very similar to words you may already know in English.What do you think these words mean?a. tsunamid. simplementeb. intensidade. registradoC. epicentrof. desastroso2. A qu hora ocurri el primer terremoto? Y el segundo?3. Escribe tres cosas que destruy el tsunami. Can someone please help Suppose that you have a computer with a memory unit of 24 bits per word. In this computer, the assembly programs instruction set consists of 198 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.1. How many bits are needed for the opcode?2. How many bits are left for the address part of the instruction?3. How many additional instructions could be added to this instruction set without exceeding the assigned number of bits? Discuss and show your calculations.4. What is the largest unsigned binary number that the address can hold? 2. Tania went to Italy. She changed 325 into euros (). The exchange rate was 1 = 1.68 (a) Change 325 into euros (E). The graph of the function f(x) is shown.Enter a value of x where f(x) and the equation y = 0.5x + 3 intersect. Find the radius when the area is 452.16 in^2 A spinner is divided into four equal sections labeled A, B, C, D. After 50 trials, the spinner landed on A 14 times, on B 13 times, on C 7 times, and on D 16 times. If the spinner is spun again, what is the theoretical probability that it does not land on D? Any action or object conforming to the laws of Islam, in this context, referring to the storage, preparation, and eating offoods _____A. Food SecurityB. KosherC. Halal If (x 5) is a factor of the polynomial function f(x) = 3x2 23x + 40, which of the following is another factor? The quantities x and y are proportional. x y 12 36 18 54 25 75Find the constant of proportionality (r)left parenthesis, r, right parenthesis in the equation y= r x r= equals Eye contact is a form of whatcommunication?