- Are you interested in modern technology? Why/why not?​

Answers

Answer 1

Answer:

yes

Explanation:

cause it is very intrested

LIKE sitting in the house and turning on your car and alexa all the stuff


Related Questions

1. Create a pseudocode program that asks students to enter a word. Call a function to compute the different ways in which the letters that make up the word can be arranged.
2. Convert the pseudocode in question one to JavaScript and test your program.

Answers

Answer:

1)Pseudocode:-

Prompt user to enter string

Pass it to combination function which can calculate the entire combination and can return it in an array

In combination method -

Check if the string is length 2 size ie of 0 or 1 length then return string itself

Else iterate through string user entered

Get the present character within the variable and check if the variable is already used then skip

Create a string from 0 to i the index + (concatenate) i+1 to length and recursive call combination function and pass this string and store end in subpermutation array

For each recursive call push character + sub permutation in total arrangement array.

2)Code -

function combinations(userStr) {

   /* when string length is less than 2 then simply return string */

   if (userStr.length < 2) return userStr;

   /* this array will store number of arrangement that word can be stored */

   var totalArrangements = [];

   /* iterate through string user enter  */

   for (var i = 0; i < userStr.length; i++) {

       /* get the current  character  */

       var character = userStr[i];

       /*check if character is already used than skip  */

       if (userStr.indexOf(character) != i)

           continue;

       /* create a string and concanete it form  0  to i index and i+1 to length of array   */

      var str = userStr.slice(0, i) + userStr.slice(i + 1, userStr.length);

       /* push it to totalArrangments  */

       for (var subPermutation of combinations(str))

           totalArrangements.push(character + subPermutation)

   }

   /* return the total arrangements */

   return totalArrangements;

}

/* ask user to prompt string  */

var userStr = prompt("Enter a string: ");

/* count to count the total number of combinations */

let count = 0;

/* call function the return tolal number of arrangement in array */

totalArrangements = combinations(userStr);

/* print the combination in console  */

for (permutation of totalArrangements) {

   console.log(permutation)

}

/* total combination will be  totalArrangements.length */

count = totalArrangements.length;

/*print it to console  */

console.log("Total combination " + count)

Output:-

Write a pseudocode method swap(aList, i, j) that interchanges the items currently in positions i and j of a list. Define the method in terms of the operations of the ADT list, so that it is independent of any particular implementation of the list. Assume that the list, in fact, has items at positions i and j. What impact does this assumption have on your solution

Answers

Answer:

Explanation:

The following pseudocode for this method using operations of the ADT list would be the following

swap(aList, indexI, indexJ) {

    initialize temp_variable = Retrieve(indexI, aList)

    Insert(Retrieve(indexJ, aList), indexI, aList)

    Insert(Retrieve(indexI, aList), temp_variable, aList)

}

This code basically saves the aList index of i , into a temporary Variable. Then it sets the aList index of i to the value of the element in index of j. Then it does the same for the index of j with the tem_variable. If we assume that the indexes of i and j exist, then it can crash our entire program if those indexes are missing from the list when we try to access them.

Write a program that generates an array filled up with random positive integer
number ranging from 15 to 20, and display it on the screen.
After the creation and displaying of the array , the program displays the following:
[P]osition [R]everse, [A]verage, [S]earch, [Q]uit
Please select an option:
Then, if the user selects:
-P (lowercase or uppercase): the program displays the array elements position and
value pairs for all member elements of the array.
-R (lowercase or uppercase): the program displays the reversed version of the
array
-A (lowercase or uppercase): the program calculates and displays the average of the
array elements
-S (lowercase or uppercase ): the program asks the user to insert an integer number
and look for it in the array, returning the message wheher the number is found and
its position ( including multiple occurences), or is not found.
-Q (lowercase or uppercase): the program quits.
NOTE: Until the last option (‘q’ or ‘Q’) is selected, the main program comes back at
the beginning, asking the user to insert a new integer number.

Answers

Answer:

#include <iostream>

#include <cstdlib>  

using namespace std;

const int MIN_VALUE = 15;

const int MAX_VALUE = 20;

void fillArray(int arr[], int n) {

// fill up the array with random values

for (int i = 0; i < n; i++) {

 arr[i] = rand() % (MAX_VALUE - MIN_VALUE + 1) + MIN_VALUE;

}

}

void displayArray(int arr[], int n) {

for (int i = 0; i < n; i++) {

 cout << i << ": " << arr[i] << endl;

}

}

void main()  

{  

int myArray[10];

int nrElements = sizeof(myArray) / sizeof(myArray[0]);

fillArray(myArray, nrElements);

displayArray(myArray, nrElements);

char choice;

do {

 cout << "[P]osition [R]everse, [A]verage, [S]earch, [Q]uit ";

 cin >> choice;

 choice = toupper(choice);

 switch (choice) {

 case 'P':

  displayArray(myArray, nrElements);

  break;

 }

} while (choice != 'Q');

}

Explanation:

Here's a start. Now can you do the rest? ;-)

explain how data structures and algorithms are useful to the use of computer in data management

Answers

Answer:

programmers who are competent  in data  structures and algorithms  can easily perform the tasks related  to data processing ,automated reasoning ,or calculations . data structure and algorithms  is significant  for developers  as it shows their problems solving abilities amongst the prospective employers .

Binary search is a very fast searching algorithm, however it requires a set of numbers to be sorted.

a. True
b. False

Answers

I’m sure the answer is true

what is IBM 1401 used for? Write your opinion.​

Answers

Explanation:

The 1401 was a “stored program computer,” allowing programmers to write (and share) applications loaded into the machine from punched cards or magnetic tape, all without the need to physically reconfigure the machine for each task.

A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the following types of malware is MOST likely installed on the compromised host?
A. Keylogger
В. Spyware
C. Trojan
D. Backdoor
E. Rootkit

Answers

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

An engineer is writing above the HTML page that currently displays a title message in large text at the top of the page . The engineer wants to add a subtitle directly underneath that is smaller than the title but still longer than most of the text on page

Answers

<!DOCTYPE html>

<html>

<body>

<h1>Heading or Title</h1>

<h2>Sub heading or sub title</h2>

</body>

</html>

This will be the html code for the given problem.

In C, for variables of type int we use %i as the format specifier in printf and scanf statements. What do we use as the format specifier for variables of type float, if we want to output the floating point value, showing 3 decimal places?

Answers

Answer:

variable with a leading sign, three fractioned digits after the decimal point

hi, please help me, please help me.​

Answers

my day has been good
hope this helps

Give one example of where augmented reality is used​

Answers

Augmented reality is used during Construction and Maintenance

Service manuals with interactive 3D animations and other instructions can be displayed in the physical environment via augmented reality technology.
Augmented reality can help provide remote assistance to customers as they repair or complete maintenance procedures on products.

Answer

Medical Training

From operating MRI equipment to performing complex surgeries, AR tech holds the potential to boost the depth and effectiveness of medical training in many areas. Students at the Cleveland Clinic at Case Western Reserve University, for example, will now learn anatomy utilizing an AR headset allowing them to delve into the human body in an interactive 3D format.

it is also use in retail ,. Repair & Maintenance,Design & Modeling,Business Logistics etc

Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of old files, then writes and saves the document. Describe how the OS interacts with the disk to allow the new file to be written.

Answers

Answer:

Explanation:

In a situation like this, the OS erases the files from its core, and saves the document in its files compartment

The hard drive on Frankie's computer is completely full. In this case, the OS deletes the files from its core and saves the document in its files' compartment because it has to produce and save a new document.

What is a document?

Everybody has a distinctive signature, and signatures are crucial in proving that a person actually signed a document and accepted its terms.

An operating system (OS) is the program that controls all other application programs in a computer after being installed into the system first by a boot program.

Through a specified application program interface, the application programs seek services from the operating system (API)

Therefore, the OS will erase the file from the scratch and save it in a different folder.

To learn more about the document, refer to the below link:

https://brainly.com/question/14980495

#SPJ2

Develop a c program to display the following input output interphase enter a number 5
The table of 5 is
5*1=5
5*2=10

Answers

Answer:

int main()

{

int number;

printf("Enter a number: ");

scanf_s("%d", &number, sizeof(number));

for (int i = 1; i <= 2; i++) {

 printf("%d*%d=%d\n", number, i, number * i);

}

}

Explanation:

I used the safe scanf_s() that takes a third parameter to indicate the size of the buffer. In this case it is the size of an integer.

5. When you send your email to a bad address it may come back as a:
spam email
server email
bounced email
hypertext email
SAVE & E

Answers

Answer:

The answer is a bounced email

In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a) user status. b) loyalty status. c) usage rate. d) demographics

Answers

Answer: demographics

Explanation:

Market segmentation refers to the process of dividing the consumers into sub-groups of consumers which are refered to as the segments based on the characteristics shared.

The examples of a customer's behavior or relationship with a product include user status, usage rate and loyalty status.

It should be noted that some examples of market segmentation are behavioral, demographic, geographic, and psychographic. From the options given, demographics is not an example of a customer's behavior with a product.

What is hacking? Why is hacking a concern for law enforcement?

Answers

Answer:

hacking is the act of exploitation, and is typically used to steal other people's account. It is a major concern because people can easily lose their account to hackers if they're too gullible, and the hacker can use their victims' accounts to purchase the things that they want with their victims' money.

Hacking is having unauthorized access to data in a computer or a system. It's a huge concern because everything nowadays depends on the internet, and every device connected to the Internet is at risk

How do l write a program which countdown from 10 to 3​

Answers

Answer:

use loop

for(int i =10;i>2; i--)

{

System.out.println(i+"\n")

}

The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion

Answers

Answer:

B. data at rest, data in transit

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.

Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.

Part 1 - Write the ingredients list to a file (10 points) Modify the program you developed for Lab 5 to make it output the data in the same format to a text file cake_ingredients_list.txt Note: Writing to a file is easier to code, so let's do that first. Hints: After the file has been opened, call the .write() function to write one line at a time to the file, in almost the exact fashion as calling print

Answers

Answer:

Explanation:

I do not have access to the ingredients list so instead I created the list and added the ingredients needed to make a cake. Then I used a for loop to loop throught the ingredients in the list and the .write() method to write the data to a text file with the same name as in the question. The code was tested and the output to the file can be seen in the attached image below.

ingredients = ['sugar', 'butter', 'eggs', 'vanilla', 'flour', 'baking powder', 'milk']

file = open('cake_ingredients_list.txt', 'w')

for ingredient in ingredients:

   file.write(ingredient + '\n')

How to prepare and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50

Answers

Answer:

Create boxes with the following content

Initialize sum to 0, product to 1 and number to 1Check if number is a prime. If yes, update sum += number and product *= numberIncrease number by 1If number is <= 50, go back to "check" block.

The check block has a diamond shape.

At the "yes" branch of the check block, you can create separate blocks for updating the sum and the product.

Connect the blocks using arrows.

Indicate the start and the end of the flow using the appropriate symbols.

The block to check if a number is a prime you could further decompose into the steps needed to do such a check.

please help!....................

Answers

Answer:

Based on what the graph does on the number line, I would say 1100110

Every time the graph spikes up, that is a one, otherwise it is a zero.

Explanation:

discribe two ways to zoom in and out from an image

Answers

Option 1: Spread your fingers on your laptop's trackpad.

Option 2: Press Command (or control) and the + sign.

Hope this helps!

Have a wonderful day!

Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động

Answers

Answer:

gzvzvzvzbxbxbxb

Explanation:

hshzhszgxgxggdxgvdvsvzvzv

What will be the pseudo code for this

Answers

Answer:

Now, it has been a while since I have written any sort of pseudocode. So please take this answer with a grain of salt. Essentially pseudocode is a methodology used by programmers to represent the implementation of an algorithm.

create a variable(userInput) that stores the input value.

create a variable(celsius) that takes userInput and applies the Fahrenheit to Celsius formula to it

Fahrenheit to Celsius algorithm is (userInput - 32) * (5/9)

Actual python code:

def main():

   userInput = int(input("Fahrenheit to Celsius: "))

   celsius = (userInput - 32) * (5/9)

   print(str(celsius))

main()

Explanation:

I hope this helped :) If it didn't tell me what went wrong so I can make sure not to make that mistake again on any question.    

cho dãy số a[] có n phần tử và dãy số b[]cõ m phần tử là các các số nguyên dương nhỏ hơn 1000 . Gọi tập hợp A là tập các số khác nhau trong a[], tập hợp B là các số khác nhau trong b[]

Answers

Answer:

please translate

Thank you✌️

Where does change management play a major role in transforming a client
business into a data-driven, intelligent enterprise?

Answers

To manage a modern IT environment characterized by hybrid complexity and exponential data growth — and to make that same IT a driver of growth and innovation for the business — you need to build intelligence into every layer of your infrastructure.

Change management plays a major role in transforming a client  business into a data-driven, intelligent enterprise in: data culture and literacy.

Data culture and literacy refer to all the processes involved in analyzing and understanding data within the framework of an organization.

The employees within such organizations are trained to read and understand data. It becomes a part of the organization's culture.

So data culture and literacy should be used when trying to transform a client  business into a data-driven, intelligent enterprise.

Learn more about data culture here:

https://brainly.com/question/21810261

You connect another monitor to your machine and the image is coming up distorted or blurry. Adjusting the resolution of the external monitor could resolve the issue.

a. False
b. True

Answers

Changing the resolution should work, it’s most likely true. :)

You connect another monitor to your machine and the image is coming up distorted or blurry. Adjusting the resolution of the external monitor could resolve the issue is the true statement.

What is meant by resolution?

In order to cover the cost of the pixels on the horizontal and vertical axes, resolution is the total number of pixels individual points of colour on a display monitor.

The size of the monitor and its resolution affect how sharp an image appears on a display.

Thus, the statement is true.

For more details about resolution, click here:

https://brainly.com/question/14307212

#SPJ2

e) Point out the errors( if any) and correct them:-
class simple
{
inta,b,c;
double sumNumber
{
int d = a + b + c;
double e = d/5.6;
return e;
}
void show Number()
{
a = 10, b = 20, c=5;
System.out.println(d);
double f = sumNumber(a,b,c);
System.out.print(e);
}
}​

Answers

Explanation:

double e-d/5.6;is wrong it should return to c

Mobile computing is growing in importance each and every day, and the IT manager must take that into account. Do some web research and develop a one-page description of the five most important things about HCI of mobile computing that the IT manager should know.

Answers

Answer:

phone grows everyday 82 percent

Explanation:

Which of the following expressions would you use to test if a char variable named choice is equal to "y" or "Y"? a. choice.tolower = "y" || "Y" b. choice.tolower = "y" c. tolower(choice) = "y" d. tolower(choice) = "y" || "Y"

Answers

Answer:

choice.tolower == "y"

Explanation:

The tolower method is a string method in c# that converts all characters in a string to lowercase characters(if they are not already lowercase letters) except special symbols which remain the same example "#" symbol.

The tolower method does not take any arguments, therefore to use it, we simply chain it to our string variable(dot notation) and use a comparison operator "==" that evaluates to true or false based on whether the values returned on both sides are equal.

Other Questions
Temperature is measured in what unit?JJ/goCJ/goC Alex cut a cord into 7 pieces in 36 seconds. How long will it take him to cut the cord into 12 pieces? (iii) n(U) = 25, n(A) = 16 and n (B) = 2 n(AUB)=? solve the equation - 2(3x+5/x+2) -5(x+2/3x-5) = 3 , where x unequal -2 and x unequal 5/3it's urgentplease quyswith solution The speed (S) an object falls varies directly with time. If the speed is 49.0 m/s after 5 seconds, then what is the speed after 3 seconds?S= 16.3 m/sS=29.4 m/sS= 3.3 m/sS= 81.6 m/s I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right back and does not transfer. What is the likely cause of this issue? a. hard drive is full b. photos were taken in a different country c. USB port is broken d. the file structure of the 2 hard drives are not compatible If a friend says that she wants a confidence with you, what doesshe mean? Base your answer on the meaning of confidence as itappears in The Tragedy of Romeo and Juliet Act II. Please help I dont understand Can someone please explain how to do number 23 I have no idea how to do it. 1+1+5+8+6+45+6+4+34+423 What is today's date Y OIT An ice cream store determines the cost of its sundaes by using the formula C = 0.50s + 0.35n + 0.25t, where C is the total cost in dollars, s is the number of scoops of ice cream, n is the number of scoops of nuts, and t is the number of liquid toppings. A Nutty Sundae costs $3.55. It has 3 scoops of nuts and 2 different liquid toppings. How many scoops of ice cream are in this sundae? Which of the following is true about resistivity of any given metal? depends on its temperature. varies nearly linearly with temperature. has units of ohm-meter. A. II and III only B. I and II only C. I and III only D. I, II and III E. III only A worker in the automobile industry works an average of 43.7 hours per week. Assume the distribution is normal with a standard deviation of 1.6 hours. (i) What is the probability that a randomly selected automobile worker works less than 40 hours per week?(ii) If 15 automobile workers are randomly selected, what is the probability that the sample mean of working time is more than 45 hours per week? Kapco Advisers is a federal covered investment advisers with its principal office in New York City and several offices in New Jersey.Joe Segal, who lives in Manhattan, is an IAR with the firm and has the responsibility for serving those clients of Kapco who winter in Florida. In order to do so, Joe takes a hotel suite in Miami Beach for one week in December, in Boca Raton for one week in January, and in West Palm Beach for one week in February. While Mr. Segal is using these facilities to meet with existing clients, he does let them know that if they have any friends who might be interested in the firm's advisory services, they are welcome to make an appointment with him. Which of the following statements is correct regarding Mr. Segal's registration status under the Uniform Securities Act?-Because Joe is meeting with existing clients who are not permanent Florida residents, he does not have to register as an IAR in the state of Florida.-Because Joe is employed by a covered adviser, no registration is necessary in the state of Florida.-Because Joe is employed by a covered adviser, he is only required to register with the SEC.-Because Joe may be meeting with individuals who are not existing clients and may be Florida residents, he must be registered in the state of Florida as an IAR. what are the impacts of land relief on agriculture? Combine like terms. (Simplify your answer completely.)2/5x+6+8/5x ActivThe influence of big business on the Republican Party and the party's domination of governmentresulted in a close relationship between big business and the Republican Party. True or false? Can you please me me Answer the following questions based on the tables below. Buyer Willingness to Pay for One Unit A $35 B 33 C 27 D 22 E 21 F 13 G 13 H 12 I 6 Seller Willingness to Sell One Unit A $4 B 9C 12 D 14 E 15F 21 G 23 H 30 I 51 a. The quantity demanded at a price of $10 is: _______________. b. The quantity demanded at a price of $25 is: ___________