Sending messages electronically to one or more recipients is called

A. Cloud computing
B. Emailing
C. Social networking
D. Web conferencing

Answers

Answer 1

Answer:

c.

Explanation:

all are social networking

ps. please  mark me the branlyist.

Answer 2

Answer:

social networking

Explanation:

I don't know about the explanation but ya


Related Questions

1.
gear ratio:
gear ratio
2.
input:
input
3.
inverse:
inverse
4.
mechanism:
mechanism
5.
output:
output
6.
simple gear train:
simple gear train
7.
torque:
torque
Column B
a.a combination of two or more gears used to transmit motion between two rotating shafts or between a shaft and a slide
b.information fed into a system
c.the information produced by a computer or a system
d.the ratio of the speed of the driving member of a gear train to that of the driven member
e.opposite in position, direction, order, or effect
f.twisting force
g.the part of a machine which contains two or more pieces arranged so that the motion of one compels the motion of the others PLZ HELP WILL GIVE BRAINLIST

1.gear ratio:gear ratio2.input:input3.inverse:inverse4.mechanism:mechanism5.output:output6.simple gear

Answers

Answer:

1- D

2-B

3- E

4- G

5-C

6-A

7-F

Explanation:

I am not completely sure if this is right but I think most answers are right

Invariants The function foo takes an array of ints and perform some computation. void foo(int[] a) { int i-o, co, k-1; int n. a.length; while (i

Answers

Invariants can be described as a condition that is established and maintained after each iteration. Invariants can help improve the efficiency of algorithms and make it easier to write correct code.

The function foo takes an array of ints and performs some computations. Given an array `a` with `n` elements, the function `foo(int[] a)` declares three variables, `i`, `co`, and `k` with initial values of `0`, `0`, and `1` respectively. The function then enters a while loop, the loop condition checks whether the value of `i` is less than `n`. This indicates that the loop will be executed for `n` times and as such, is the invariant for this function.

The computation performed in this loop is to check if the current element in the array, `a[i]`, is equal to `0`. If `a[i]` is equal to `0`, then `co` is incremented by `1` and `k` is multiplied by `2`. At the end of each iteration, the value of `i` is incremented by `1`. Therefore, the invariant for this function is that `i` is less than `n`. The function will terminate when `i` becomes equal to `n`. Here is the code:```

To know more about maintained visit:

https://brainly.com/question/28341570

#SPJ11

Lệnh nào dùng để mở hộp thoại Format cells?

Answers

Answer: Huh i don't understand

Explanation:

exercise 2. create a new console project named: departmenttest. create a class named department and a fashion class that is derived from the department class.

Answers

The user create a console project named "departments" and added classes named "Department" and "Fashion" which is derived from "Department".

Here are the steps to create a new console project named departments and set up the required classes:

Open up your preferred integrated development environment (IDE). If you don't have one, you can download Visual Studio from the official Microsoft website.

Click on "Create a new project".

Select "Console App (.NET Framework)" and name the project "departments".

Click on "Create".

Now that we have the project set up, let's create the two classes you requested.

To create the Department class, right-click on the project name in the Solution Explorer and select "Add -> Class".

Name the class "Department" and click "Add".

Inside the Department class, add any properties or methods you need to represent a department. For example:

public class Department

{

   public int DepartmentId { get; set; }

   public string DepartmentName { get; set; }

   // Add more properties and methods here

}

To create the Fashion class that is derived from the Department class:

public class Fashion : Department

{

   public string FashionType { get; set; }

   // Add more properties and methods here

}

We now have a console project named departments with two classes, Department and Fashion, with the Fashion class being derived from the Department class.

To learn more about programming visit:

https://brainly.com/question/14368396

#SPJ4

Hello guys
I need help. Does software developer require selenium and django? Can I work as software developer using python only?

Answers

You can accomplish everything as a Python developer, from web or game development to quantitative research and building new programming languages.

Django as a Python framework

Django is a Python-based web framework that adheres to the model-template-views architectural paradigm. It is maintained by the Django Software Foundation, an independent non-profit organization based in the United States.

Django has a more flexible and well-structured admin panel than Laravel. Django also permits developers to reuse code from previous projects. It even includes a library of reusable programs, tools, and features.

Learn more about Python here:

https://brainly.com/question/26497128

#SPJ1


Computer Systems Servicing

what are the steps in 5s program​

Answers

you can just search that up on googl and it will show up

\hope I helped :)

how do you indicate 1 item in cow 's foot notation​

Answers

In Cow's Foot notation (also known as Entity-Relationship notation), an entity is represented as a rectangle and an occurrence of that entity is represented as an instance of the rectangle. To indicate 1 item in Cow's Foot notation, you would draw a single instance of the entity rectangle

someone pls help me w this

someone pls help me w this

Answers

Answer:

pay full attention, prepare intro, attend events

Explanation:

i don't really know but it feels like common sense so im pretty sure

don't take my work for it lol

Check all that apply. Procedural abstraction is useful for



programmers because.





A. It allows a programmer to focus on specific algorithms while coding or debugging.





B. All programs should have abstraction.





C. It allows a programmer to write an algorithm once, but use that algorithm anywhere in the code they would like.





D. It reduces the complexity of a program, which makes it easier to update or change in future iterations of the program.

Answers

Procedural abstraction is useful for programmers because it allows them to focus on specific algorithms, write reusable code, and reduce the complexity of programs, making them easier to update or change in the future.

Procedural abstraction, also known as function abstraction, is a programming technique that allows programmers to create functions or procedures to encapsulate a series of tasks or operations. This technique offers several benefits to programmers. Firstly, it enables them to focus on specific algorithms while coding or debugging. By abstracting away the implementation details of a complex algorithm into a separate function, programmers can work on it independently, ensuring better code organization and easier debugging.

Secondly, procedural abstraction promotes code reusability. Once an algorithm is implemented as a function, it can be called from different parts of the code, eliminating the need to rewrite the same code multiple times. This not only saves time and effort but also improves code maintainability. Any changes or updates to the algorithm can be made in a single place, benefiting all the code that relies on it.

Lastly, procedural abstraction helps reduce the complexity of a program. By breaking down a program into smaller, self-contained functions, each responsible for a specific task, the overall complexity is decreased. This modular approach makes the code more manageable and easier to understand, update, or change in future iterations. It also facilitates collaboration among programmers as they can work on different functions independently, promoting code modularity and scalability.

In conclusion, procedural abstraction is a valuable technique for programmers as it allows them to focus on specific algorithms, write reusable code, and reduce the complexity of programs. These advantages contribute to better code organization, improved code maintainability, and easier updates or changes in the future.

learn more about Procedural abstraction here:
https://brainly.com/question/30626835

#SPJ11

thou shalt not use a computer to harm other people

Answers

The phrase "Thou shalt not use a computer to harm other people" is a part of the Ten Commandments of Computer Ethics. The direct answer to this statement is that computer users should not use their devices to intentionally harm other people through hacking, spreading malware, or other malicious activities. This commandment highlights the importance of using technology in an ethical and responsible manner.

The Ten Commandments of Computer Ethics are a set of principles created in the early 1990s to guide computer users in ethical decision-making. The commandments include concepts such as not interfering with other people's computer work, not using technology to steal or harm, and respecting others' privacy.

This particular commandment emphasizes the responsibility that comes with owning and using a computer. It reminds users that their actions online can have real-world consequences for others, and that using technology in harmful ways is not acceptable.

In today's digital age, the importance of computer ethics is more relevant than ever. With so many people relying on technology for work, communication, and entertainment, it is crucial that users understand their responsibility to use these tools ethically and responsibly. The Ten Commandments of Computer Ethics serve as a useful guide for navigating these complex ethical issues.

To know more about computer ethics click here,

https://brainly.com/question/31439623

#SPJ11

When was the year America got its independence

Answers

Answer:

July 4, 1776Explanation:

Answer: April 19, 1775 – September 3, 1783

Explanation:

You need to access your company's internal website from a remote location via a wireless internet connection. which type of connection do you need to make this secure?

Answers

Answer:

A virtual private network (VPN)

You are reviewing the logs in your IDS and see that there were entries showing SYN packets received from a remote host targeting each port on your web server from 1 to 1024. Which of the following MOST likely occurred?A.Remote host cannot find the right service portB.SYN FloodC.Port scanD.UDP Probe

Answers

The most likely scenario based on the given information is a port scan (option C).

A port scan is an attack where an attacker sends SYN packets to a range of ports on a target machine to determine which ports are open and accessible. By targeting ports 1 to 1024, which are commonly used for known services and applications, the attacker can identify potential vulnerabilities or services that may be susceptible to exploitation.

Option A, the remote host cannot find the right service port, is less likely because if the remote host cannot find the right service port, it is more likely to send packets to a few random ports, rather than sequentially scanning through a range of ports.

Option B, SYN flood, involves sending a high volume of SYN packets to a target machine to overwhelm its resources and cause a denial of service. While the remote host is sending SYN packets, a port scan does not involve sending a high volume of packets and does not necessarily result in denial of service.

Option D, UDP probe, involves sending UDP packets to a target machine to determine which ports are open and accessible, rather than SYN packets.

To get a similar answer on SYN packets:

https://brainly.com/question/31142542

#SPJ11

At the end of the systems design phase, the first presentation given by the systems analyst is to department managers and users from departments affected by the system and, because of its audience, the presentation is technically oriented. T/F

Answers

False. The first presentation given by the systems analyst at the end of the systems design phase is typically a review of the proposed system to the steering committee or executive sponsor.

This presentation is not usually technically oriented, but rather focuses on the business case for the proposed system, the benefits it will bring to the organization, and the estimated cost and timeline for development. The presentation given to department managers and users from affected departments typically occurs later in the development process, during the testing or implementation phase. This presentation will be more technically oriented, focusing on the specifics of the system and how it will affect their daily operations. The purpose of this presentation is to ensure that the users understand how the system works and how it will impact their work, and to gather feedback and input from the users to ensure that the system meets their needs.

Learn more about executive here:

https://brainly.com/question/27999252

#SPJ11

Please please help ASAP it’s timed

Please please help ASAP its timed

Answers

Answer:By pressing the Control key and the “C” key

Explanation:

Hopefully it could help you

Does anyone know what to do when your PC is having internet connection issues and shuts down when you didn't even press the power button? This is happening to me and I don't know what to do! My PC is new too.

Answers

Answer: I think you need to reset your pc

Explanation: or get it fixed at a shop

here is worksheet please help me with it
the topic is friction

here is worksheet please help me with itthe topic is friction

Answers

Answer:

Useful

Problem

Problem

Problem

Useful

Useful

listen to exam instructions what does the term cloud mean when referring to cloud computing? answer it refers to the virtual hardware that cloud computing is built on. it is the name of an operating system that anyone can use to design, build, and provide cloud services. it is a metaphor for a data storage service with an ever-growing capacity, like storm clouds. it is a metaphor for the internet based on the basic cloud drawing used to represent a telephone network.

Answers

The term "cloud" when referring to cloud computing is a metaphor for a data storage service with an ever-growing capacity, like storm clouds.

The term "cloud" that referring to cloud computing is also a metaphor for a data storage service that offers limitless storage capacity and computing power, just like the way storm clouds have an unlimited capacity for rain. It allows users to store, manage, and access data and applications over the internet instead of using their computer's hard drive.

Cloud computing allows for easy access to data and applications from anywhere with an internet connection and the ability to scale up or down as needed. This makes it an attractive option for businesses and individuals who need flexibility in their data storage needs.

Learn more about cloud here:

brainly.com/question/18709099

#SPJ11

How can you tell if a website is credible?
a. Anything on the web is automatically credible
b. You must review aspects of the site such as the author’s credibility
c. If it has a top-level domain of .com, it is credible
d. All of the above

Answers

Answer:

b

Explanation:

you must review everything, creditability , certificates, domains, etc

You can tell a website is credible by reviewing its aspects overall, the answer is b.

Explain what is required to access a digital environment that stores
personal information like cloud storage

Answers

You require access to the account online that has that data saved. You also need Wifi access to access the cloud.

(05.06 mc)
if the u.s. dollar is strong, what is the impact on trade between china and the u.s.?(5
points)
o imports from china to the u.s. increase.
exports from the u.s. to china increase.
imports from china to the u.s. decrease.
o there is no change to the balance of trade.

Answers

The correct statement is imports from China to the U.S. decrease when the U.S. dollar is strong.

How does a strong U.S. dollar impact trade between China and the U.S.?

When the U.S. dollar is strong, it means that the value of the U.S. dollar increases relative to other currencies, including the Chinese yuan.

This has several implications for trade between China and the U.S.

Firstly, a strong U.S. dollar makes imports from China to the U.S. relatively more expensive.

As the value of the U.S. dollar increases, it takes more yuan to purchase a certain amount of U.S. dollars. This makes Chinese goods more expensive for American consumers, leading to a decrease in imports from China.

On the other hand, a strong U.S. dollar makes U.S. exports to China relatively cheaper. As the value of the U.S. dollar increases, it takes fewer yuan to purchase a certain amount of U.S. dollars.

This makes American goods more attractive and affordable for Chinese consumers, leading to an increase in exports from the U.S. to China.

Overall, a strong U.S. dollar tends to result in a trade imbalance between China and the U.S., with imports from China decreasing and exports from the U.S. increasing.

This is because the relative currency exchange rates favor U.S. exports and make imports from China less competitive in the U.S. market.

Learn more about dollar

brainly.com/question/15169469

#SPJ11

in which format does oracle10g display a date value?

Answers

In Oracle 10g displays a date value in the default format of DD-MON-YY, which shows the day of the month, the three-letter abbreviation of the month, and the last two digits of the year.

In Oracle10g, date values are displayed in a default format that includes the day, month, and year in a specific order. The format of the date value is determined by the NLS_DATE_FORMAT parameter in the database, which specifies the default date format for the database.

The default format for displaying date values in Oracle10g is DD-MON-YY, where:

DD represents the day of the month.MON represents the three-letter abbreviation of the monthYY represents the last two digits of the year.

For example, a date value of May 13, 2023, would be displayed as 13-MAY-23 in Oracle10g by default. However, the format of the date value can be customized using various formatting functions and parameters available in Oracle10g, such as TO_CHAR function.

To learn more about oracle 10g: https://brainly.com/question/31328708

#SPJ11

Which of the following robots was considered by the industry as the first useful robot?

a. PLANETBOT
b. ASIMO
c. Colossus
d. AESOP

Answers

Answer:

I think its ASIMO. Though I am not fixed.

Explanation:

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that  input N numbers from the user in a Single Dimensional Array .

Writting the code:

class GFG {

   // Function to reverse a number n

   static int reverse(int n)

   {

       int d = 0, s = 0;

       while (n > 0) {

           d = n % 10;

           s = s * 10 + d;

           n = n / 10;

       }

       return s;

   }

   // Function to check if a number n is

   // palindrome

   static boolean isPalin(int n)

   {

       // If n is equal to the reverse of n

       // it is a palindrome

       return n == reverse(n);

   }

   // Function to calculate sum of all array

   // elements which are palindrome

   static int sumOfArray(int[] arr, int n)

   {

       int s = 0;

       for (int i = 0; i < n; i++) {

           if ((arr[i] > 10) && isPalin(arr[i])) {

               // summation of all palindrome numbers

               // present in array

               s += arr[i];

           }

       }

       return s;

   }

   // Driver Code

   public static void main(String[] args)

   {

       int n = 6;

       int[] arr = { 12, 313, 11, 44, 9, 1 };

       System.out.println(sumOfArray(arr, n));

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display

Determine which careers you can enter after completing a training program and which careers require a college degree.

Answers

Answer: statistician automotive engineer customer service specialist data modeler broadcast technician video systems technician

Explanation:

How do you think smartphones will have changed in 5 years?

Give 3 features that you think smartphones will have in 5 years that it does not have right now.

Answers

Answer:

Hope this helps :)

Smartphones will have changed in 5 years becuase they will become more advance and useful than now.

1. The phone will have a hologram feature for us to use to look at pictures/images, etc.

2. The phone will be able to fold into fourths, so it will be small for storage.

3. The phone will have advance camera(s) that can take extremely clear and bright photos from close and very far distances.

Explain the advantages and disadvantages of forwarding an email.

Answers

Constant Two-Way Communication. The first benefit of email forwarding services is they can often send a reply message to your customers within minutes of receiving a reply. ...
Save Time. Another advantage is that these services help save your employees time. ...
Avoid Missing Important Emails.


Email forwarding won't work if you have a mail product set up on the domain name. Mail for your domain name can only be sent to one place. ...
Forwarding does not allow you to customize spam settings. ...
Forwarding will only deliver attachments up to 10MB. ...
Wildcard forwarding is not supported.

What type of malware collects information about the user's browsing habits in order to display advertisements targeted to that user?

Answers

Answer:

there are many

Explanation:

the most common one that does this is spyware

not only that nowadays anything is infected with virus or some kind of malware in websites and there are millions of trackers and all of these nonsense things which really make the web using today a hard place

but you can use BRAVE

Which of the following will uniquely select the div tag located on line 7? 1. c 3. = 1 Down the Rabbit-Hole

Alice was beginning to get very tired ...


Alice

Down, down, down. Would the fall never come to an end

I wonder if I shall fall right ..

Select one: a. #aa O b..aa OOO d. aa.div e div

Answers

The term that will uniquely select the div tag located on line 7 is :

(e) div

The div tag on line 7 can be uniquely selected using the tag name "div".

Option a) uses an ID selector (#aa) which is not present in the HTML code provided.

Option b) uses a class selector (.aa) which is also not present.

Option d) uses a descendant selector (aa div) which assumes that there is an "aa" element that is a parent or ancestor of the "div" element, which is not present in the code.

Therefore, the the term that will uniquely select the div tag located on line 7 is div. Hence, the correct option is e) div.

To learn more about ID selector visit : https://brainly.com/question/24204870

#SPJ11

For what reason can security risks never be fully eliminated?

Answers

Data integrity cannot be guaranteed securely while it is being transported. New dangers are continually developing, changing the threat environment. It is not crucial to put new security measures in place.

Data integrity is a crucial component of the design, implementation, and use of any system that stores, processes, or retrieves data. It is the preservation and assurance of data accuracy and consistency over the course of its full life-cycle.

The phrase has a wide range of applications and can signify quite different things depending on the situation, even within the same broad computing context. It is occasionally used as a stand-in for component quality, but requires data validation. The opposite of data corruption is data integrity. Any data integrity technique's main goal is the same: to make sure data is recorded exactly as intended (such as a database correctly rejecting mutually exclusive possibilities).

To know more about data integrity click here:

https://brainly.com/question/13146087

#SPJ4

Other Questions
The point (7,0) lies on a circle with the center at the origin. What is the area of the circle to the nearesthundredth? Use 3.14 forn.The area of the circle is aboutsquare units. grove corporation has sales revenue of $1,502,000 resulting in net operating income of $160,000. average invested assets total $776,000. calculate the roi if sales increase by 10% and the profit margin and investment level remain constant. +1Given the overall cell reaction: Zn(s) + Agt! Zn*2 + Ag(s)Which of the following will occur as the cell operates?(1) The amount of Ag(s) will decrease (3) The amount of Agt will increase2) The amount of Zn(s) will increase (4) The amount of Zn^2 will increase 11. What are the missing reasons in the two column proof?Given: M bisects ZPMN and OM bisects ZPONProve: APMO MANMOStatementsReasons1. MO bisects ZPMN2. ZPMO 3ZNMO3. MOMO4. OM bisects ZPON5. ZPOM ZNOM6. A PMO SANMO1. ?2. ?3. 124. I?5. ?6. ? Which of the following statements is supported by this excerpt of John Locke's Two Treatises of Government? "If man in the state of nature is free, if he is absolute lord of his own person and possessions, why will he give up his freedom? Why will he put himself under the control of any person or institution? The obvious answer is that rights in the state of nature are constantly exposed to the attack of others. Since every man is equal and since most men do not concern themselves with equity and justice, the enjoyment of rights in the state of nature is unsafe and insecure. Hence each man joins in society with others to preserve his life, liberty, and property."--John Locke, Two Treatises of Government, 1690A. People do not have natural rights. B. Laissez-faire is detrimental to society. C. People give governments the power to rule in exchange for ensuring their rights are protected. D. An absolute monarchy is the best form of government. C is the correct answer In the major course requirement in a math department, a student needs to choose one each from algebra, analysis, statistics, and geometry. There are 4 algebra courses, 3 analysis courses, 5 statistics courses, and 2 geometry courses available for major requirement. How many different ways can a student choose major requirement courses from these 4 areas The following question was given on a Calculus quiz: "Set up the partial fraction decomposition with indeterminate coefficients for the rational function 3x+17/(x-3) (x-49). (Set up only; do not solve for the coefficients, and do not integrate." A student gave the following answer to this question: 3x+17/(x-3) (x-49)= A/x + Bx+C/x-49. Explain why this is an incorrect partial fraction decomposition for this rational function. how does the phenomenon of diffusion of responsibility relate to the social responsibility norm for helping victims? How much grape juice would you need to mix with 15 over 4 quarts of sparkling water?. My parents recently moved to the Poconos, they got 30 or more inches of snow from this last snow storm. It took my Dad 2 hours to clear 10 feet of their driveway. If their driveway is 120 feet long, how long will it take him to clear their driveway? If you had the chance to move to any city or region in the United States, where would you choose to move? What pullfactors would encourage you? What is the index (root) of the radical expression that is equivalent to (9^3/5)^5/18? PLEASE HELP ASAP!! WILL GIVE 50 POINTS TO FIRST PERSON WHO ANSWERS!!! You have read passages from the novels The Georges and the Jewels and Black Beauty: The Autobiography of a Horse. Both were written in the first person point of view. Triangle ABC is isosceles.Triangle A B C is shown. The lengths of sides A C and A B are congruent. Angle C A B is (x + 5) degrees. Angle A B C is (3 x) degrees.What is the measure of angle C?25306075 a ball is dropped from rest. after $t$ seconds, the ball has fallen a distance $d$. relative to this location, how much farther does it fall after another 5$t$ seconds? Find the difference of 651 John buys a used car for $5,400 and spends $600 on new parts, made in the u.s., to fix the car. the end result of these two transactions is? Michelle and Dave make extra money shoveling snow from their neighbors driveways. Michelle earns $45 for 3 hours. The amount Dave earns is represented by the graph shown. Which statement correctly compares the hourly earnings? HELP ME PLS Given that x = -1 is a zero of the polynomial f(x) = 16^3 - 13x + 3, what is the sum of the other zeros of f(x)? a. 1 b. 2 c. 3 d. 4 e. 5 Please help fast!!!!