152
what is the role of Computer as
transforming agent in the
Information society.​

Answers

Answer 1
I have a question what grade are you in

Related Questions

An argument does not always have to be made in words. A piece of music
can make an argument; however, the argument is usually a(n)
one.
A. unfocused
B. emotional
C. credible
D. logical

Answers

Answer:

B. emotional

Explanation:

An emotional argument. An argument does not always have to be made in words.

The piece of music that can make an argument is usually an emotional argument. Thus option B is correct.

What is an emotional argument?

An emotional argument is an e that is made in words and expresses its deals in terms of feelings and thoughts. The emotional argument is characterized by the manipulation of the recipient's emotions and has an absence of factual evidence.

Find out more information about the argument.

brainly.com/question/3775579

ime: 30rning
Q1. Write appropriate declaration for each group of variables
. Integer variable: p, q​

Answers

Answer:

Write appropriate declarations for each group of variables and arrays. ... Integer Variables: P, Q 3. ... 1) float x,y,z; The keyword float is used to create a variable declaration for the type float 2)int p,q; The keyword int is ...

In this exercise, you are asking the user to set a alpha numeric password for any website. Put some conditions.
Password must be 8 characters long.
There must be at-least one uppercase letter.
There must be at least one number.
Then show the user, you have set the correct password or not.
Sample output (Ex 6 and 7): Top 2 are for Ex-6 and bottom 2 are for Ex-7
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: Nidhi123
You have set the correct password.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: Nidhi12!
You have set the correct password.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: nidhi123
Your password doesn't meet the criteria.
Uppercase is missing.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: nidhi 234
Your password doesn't meet the criteria.
Uppercase is missing.
It's not 8 characters long correct size.

Answers

Answer:

The program in Python is as follows:

print("Create your password which must have these.\nMust be 8 characters long.\nAt least one uppercase letter.\nAt least one number.")

pwd = input("Enter your password: ")

chkLength = 0; chkUpper = 0; chkLower = 0; chkDigit = 0

if len(pwd) == 8:

   chkLength = 1

if (any(x.isupper() for x in pwd)):

   chkUpper = 1

if any(y.islower() for y in pwd):

   chkLower = 1

if any(z.isdigit() for z in pwd):

   chkDigit = 1

if chkLength == 1 and chkUpper == 1 and chkLower == 1 and chkDigit == 1:

   print("You have set the correct password.")

else:

   print("Your password doesn't meet the criteria.")

   if chkLength == 0:

       print("It's not 8 characters long correct size.")

   if chkDigit == 0:

       print("Digit is missing.")

   if chkLower == 0:

       print("Lowercase is missing.")

   if chkUpper == 0:

       print("Uppercase is missing.")

Explanation:

This prints the instruction

print("Create your password which must have these.\nMust be 8 characters long.\nAt least one uppercase letter.\nAt least one number.")

This prompts the user for password

pwd = input("Enter your password: ")

This initializes check variables to 0 (0 - false)

chkLength = 0; chkUpper = 0; chkLower = 0; chkDigit = 0

If password length is 8

if len(pwd) == 8:

Set check variable of length to 1 (1 - true)

   chkLength = 1

If password has uppercase

if (any(x.isupper() for x in pwd)):

Set check variable of uppercase to 1

   chkUpper = 1

If password has lowercase

if any(y.islower() for y in pwd):

Set check variable of lowercase to 1

   chkLower = 1

If password has digit

if any(z.isdigit() for z in pwd):

Set check variable of digits to 1

   chkDigit = 1

If all check variables is 1, then the password is correct

if chkLength == 1 and chkUpper == 1 and chkLower == 1 and chkDigit == 1:

   print("You have set the correct password.")

If otherwise,

else:

The password is incorrect

   print("Your password doesn't meet the criteria.")

The following prints the corresponding criteria that is not met, depending on the value of its check variable

   if chkLength == 0:

       print("It's not 8 characters long correct size.")

   if chkDigit == 0:

       print("Digit is missing.")

   if chkLower == 0:

       print("Lowercase is missing.")

   if chkUpper == 0:

       print("Uppercase is missing.")

10 POINTS!!!!
Which is a virtual meeting place for developers?
O an online help site
O a user manual
O a developer conference
O a developer forum

Answers

Answer:

A Developer Conference

Explanation:

Due to it being a meeting place, a conference has a high probability whereas a forum is not really a "live" meet but whereas a conference is live and virtual in many cases. Cannot guarantee tho.

Assume that Student, Employee and Retired are all extended classes of Person, and all four classes have different implementations of the method getMoney. Consider the following code where_______ indicates the required parameters for the constructors:
Person p = new Person(...);
int m1 = p.getMoney(); // assignment 1
p = new Student(...);
int m2 = p.getMoney(); // assignment 2
if (m2 < 100000)
p = new Employee(...);
else if (m1 > 50000)
p = new Retired(...);
int m3 = p.getMoney(); // assignment 3

Refer to above code The reference to getMoney() in assignment 1 is to the class:________
a. Person
b. Student
c. Employee
d. Retired
e. This cannot be determined by examining the code

Answers

Answer:

a. Person

Explanation:

The reference getMoney() is a method that is part of the Person class. This can be proven with the code since subclasses can access methods from the parent class but a parent class cannot access methods from the child classes. Since Student, Employee, and Retired are all child classes that extend to the Person parent class then they can access getMoney(), but unless getMoney() is in the Person class, then a Person object shouldn't be able to access it. Since the first object created is a Person object and it is accessing the getMoney() method, then we can assume that the getMoney() method is within the Person class.

lasses give programmers the ability to define their own types.

a. True
b. False

Answers

Answer:

TRUE.

Explanation:

Communication protocols, sets of rules agreed to by all parties, are designed in order to:

Answers

Group of answer choices.

A. Ensure that cell phones and laptops cannot communicate.

B. Give each country its own internet language.

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

D. Assure that computers and other devices don't pollute the environment.

Answer:

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

Additionally, a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport layer, into small chunks called packets rather than as a whole.

Hence, communication protocols, sets of rules agreed to by all parties, are designed in order to ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

This ultimately implies, there exist standard frameworks and protocols that are designed and developed to serve pre-existing technologies and devices, as well as those that would be invented in the future.

For example, SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services on an internet-enabled device.

Suppose that you are asked to modify the Stack class to add a new operation max() that returns the current maximum of the stack comparable objects. Assume that pop and push operations are currently implemented using array a as follows, where item is a String and n is the size of the stack. Note: if x andy are objects of the same type, use x.compareTo(y) to compare the objects x and y public void push String item ) { [n++] = iten; } public String pop { return al--n]; } Implement the max operation in two ways, by writing a new method using array a (in 8.1), or updating push and pop methods to track max as the stack is changed (in 8.2). Q8.1 Implement method maxi 5 Points Write a method max() using Out) space and Oin) running time. public String max() {...} Enter your answer here Q8.2 Update push() and popo 5 Points Write a method max() using On) space and 011) run time. You may update the push and pop methods as needed public void push {...} public String pop() {...} public String max() {...}

Answers

Answer:

Following are the code to the given points:

Explanation:

For point 8.1:

public String max()//defining a method max

{

   String maxVal=null;//defining a string variable that holds a value

   for(int x=0;x<n;x++)

   {

       if(maxVal==null || a[i].compareTo(maxVal)>0)//defining if blok to comare the value

       {

           maxVal=a[i];//holding value in maxVal variable

       }

   }

   return maxVal;//return maxVal variable value

}

For point 8.2:

public void push(String item)//defining a method push that accepts item value in a parameter

{

       a[n]=item;//defining an array to hold item value

       if(n==0 || item.compareTo(maxVals[n-1])>0)//use if to comare item value

       {

               maxVals[n]=item;//holding item value in maxVals variable

       }

       else

       {

               maxVals[n]=maxVals[n-1];//decreasing the maxVals value

       }

       n++;//incrementing n value

}

public String pop()//defining a method pop

{

       return a[--n];//use return value

}

public String max()//defining a method max

{

       return maxVals[n-1];//return max value

}

In the first point, the max method is declared that compares the string and returns its max value.In the second point, the push, pop, and max method are declared that works with their respective names like insert, remove and find max and after that, they return its value.

What does the following code print?
public class { public static void main(String[] args) { int x=5 ,y = 10; if (x>5 && y>=2) System.out.println("Class 1"); else if (x<14 || y>5) System.out.println(" Class 2"); else System.out.println(" Class 3"); }// end of main } // end of class.

Answers

Answer:

It throws an error.

the public class needs a name.

like this:

public class G{ public static void main(String[] args) {

   int x=5 , y = 10;

   if (x>5 && y>=2) System.out.println("Class 1");

   else if (x<14 || y>5) System.out.println(" Class 2");

   else System.out.println(" Class 3"); }// end of main

   }

if you give the class a name and format it, you get:

Class 2

Explanation:

HELP ME !!!!!!!


Consider the following website URL: http://www.briannasblog.com. What
does the "http://" represent?
A. FTP
B. Resource name
C. Protocol identifier
D. Domain name

Answers

Answer:

C. Protocol Identifier

The "http://" in a website URL represents the protocol identifier, specifically the Hypertext Transfer Protocol (HTTP). The correct option is C.

A protocol identifier is a string of characters that identifies the type of communication protocol being used to send data between network devices.

The protocol identifier, specifically the Hypertext Transfer Protocol, is represented by the "http://" in a website URL (HTTP).

HTTP is the World Wide Web's underlying protocol that defines how messages are formatted and transmitted between web servers and web browsers.

The domain name in the URL, in this case "briannasblog.com," identifies the specific website being accessed.

The "http://" in the URL is required to indicate that the browser should communicate with the web server and retrieve the website's resources using the HTTP protocol.

For more details regarding Protocol identifier, visit:

https://brainly.com/question/11763983

#SPJ7

Code in Python

Write a while loop that prints user_num divided by 2 until user_num is less than 1. The value of user_num changes inside of the loop.

Sample output with input: 20
10.0
5.0
2.5
1.25
0.625


Note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds and report "Program end never reached." The system doesn't print the test case that caused the reported message.

My code, it only passes one test with correct outputs
what am I forgetting?

Answers

You're setting the value of user_num to 20. Doing this won't allow the other test cases to run. Simply delete that line and your code should work. This is the code I wrote:

user_num = int(input())

while user_num>=1:

   user_num/=2

   print(user_num)

I wrote my code in python 3.8. I hope this helps.

Which is the correct option?

Answers

Answer:

C

Explanation:

Key logging is when a hacker can track every key u have clicked.

I sent a message to you thus morning did you check your ____?
a. blog
b. inbox
c. laptop ​

Answers

Answer:

inbox

Explanation:

messages go to your inbox mark me brainliest

Does anyone have any tips on what to buy and sell to make quick profits?

Answers

Answer:

lemonaid stand

Explanation:

Answer:

Or you can work in a store like a movie theater or smth

Explanation:

what is the mean of debugging​

Answers

Answer:

the process of identifying and removing errors from computer hardware or software

Explanation:

Essentially just fixing programming errors, mainly in coding or software

A city planner is using simulation software to study crowd flow out of a large arena after an event has ended. The arena is located in an urban city. Which of the following best describes a limitation of using a simulation for this purpose?
a) The model used by the simulation software cannot be modified once the simulation has been used.
b) The model used by the simulation software often omits details so that it is easier to implement.
c) Running a simulation requires more time to generate data from trials than observing the crowd exiting the arena at various events.
d) Running a simulation requires a large number of observations to be collected before it can be used to explore a problem.

Answers

Answer:

d)

Explanation:

The main limitation of simulations is that running a simulation requires a large number of observations to be collected before it can be used to explore a problem. In a real life situation there are thousands of variables to take into consideration which can drastically affect the way that the situation unfolds at any given time. Therefore, in order to replicate/simulate such a scenario all of these variables need to be taken into consideration. This data can take a large amount of time to observe and collect in order to implement into the simulation so that it provides an accurate depiction of the problem.

to copy and paste the image in MS Word the dash option is used​

Answers

ur answer hope this will helps u

(Editing)
So I’m editing some videos for an assignment but the teacher is telling me to trim or splice, what’s the difference between those two?

Answers

Answer:

Cut means to another shot. Or cutting off part of a shot. Trim means to shorten the shot (and there are trim tools.)

Trimming usually refers to taking off either part of the beginning or end of a video clip. Sometimes this is referred to as trimming the top or tail (beginning or end)

Explanation:

~Hope this helps

Assert statements are a tool programmers employ to help them debug their code more efficiently.

a. True
b. False

Answers

Answer: True

Explanation:

The statement that assert statements are a tool programmers employ in order to help them debug their code more efficiently is true.

They help in debugging as they evaluate whether a statement is either true or false. When it's false, the assert statement will indicate an error which shows that there is a bug that need to be fixed.

Instruction: Decide what the total marketing budget will be, and make a list of at least four things you will spend money on and how much you think they will cost.

Answers

Answer:

Explanation:

ok?

By the 1970s, the acceleration of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics of the Middle Ages, fears that were confirmed beginning in the 1970s by the worldwide spread of:________
a. the Zika virus.
b. the HIV infection
c. severe acute respiratory syndrome (SARS)
d. the Asian flu virus
e. Ebola

Answers

Answer:

b. the HIV infection.

Explanation:

Around the 1970s, an increase in the use of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics such as tuberculosis, leprosy, smallpox, trachoma, anthrax, scabies, etc., that were evident during the Middle Ages, fears that were later confirmed by the worldwide spread of the HIV infection, beginning in the 1970s in the United States of America.

STD is an acronym for sexually transmitted disease and it can be defined as diseases that are easily transmissible or contractable from another person through sexual intercourse. Thus, STD spread from an infected person to an uninfected person while engaging in unprotected sexual intercourse. Some examples of STDs are gonorrhea, chlamydia, syphilis, HIV, etc.

HIV is an acronym for human immunodeficiency virus and it refers to a type of disease that destabilizes or destroy the immune system of a person, thus, making it impossible for antigens to effectively fight pathogens.

Generally, contracting STDs has a detrimental effect to a patient because it causes an opening (break) or sore in the body of the carrier (patient) and as such making them vulnerable to diseases that are spread through bodily fluids e.g human immunodeficiency virus (HIV), Hepatitis, staphylococcus, AIDS, etc.

which one of the following can be used in a Document name,when saving?
1.Numbers
2.Semi-colon
3.Forward dash
4.Question mark​

Answers

Answer:

3. forward dash would you like an explanation?

Only number can be used in a Document name.

File names are shown in alphabetical order in the folder structure. It is critical to also include the zero for numbers 0-9. This helps to maintain the numerical order when file names contain numbers.

Most software packages are case sensitive, so use lowercase wherever possible. Instead of using commas and underscores, use a hyphen.

So, Option "1" is the correct answer to the following question.

Learn more:

https://brainly.com/question/17429689?referrer=searchResults

I bring my _____ computer to work
a. in box
b. ebook​

Answers

B. Ebook is the correct answer

2. List the differences between personal
computer operating systems and mainframe
operating systems.

Answers

Explanation:

Mainframes typically run on large boxes with many processors and tons of storage, as well as high-bandwidth busses. PCs are desktop or mobile devices with a single multi-core processor and typically less than 32GB of memory and a few TBs of disk space. Second, a mainframe OS usually supports many simultaneous users.

what is the different between information and data

Answers

Answer:

Information is the act of imparting knowledge and data is the recorded observation that are usually presented in a structured format

I bring my _____ computer to work
a. in box
b. ebook
c. attachment
d.blog.
e. delete
f. document
g. download
h. ebook
I. email address
j. file
k. inbox
l. keyboard
m. laptop
n. link
o. online
p. password
q. sign in​

Answers

Answer:

I think it's laptop or sign in

hope this helps

have a good day :)

Explanation:

Pick which one you think is the best choice

Which type of query enables a user to move, append, or update matching records in a table?
action query
select query
static query
parameter query

Answers

Answer:

the query that allows these things is called an action query

Answer:

The answer is A-action query just finshed the review on edg 2021

Explanation:

what are events in computer programming?

Answers

Answer:

mnkn

Explanation:

is this even a thing?

Therese would now like to preview her slide show to make sure everything is working. She should___.
• switch to Normal slide view
•click on the first slide in the slide pane
• switch to Slide Show view
• click on Slide Show layout in the side pane

Answers

Answer:

c

Explanation:

The program below converts US Dollars to Euros, British Pounds, and Japanese Yen # Complete the functions USD2EUR, USD2GBP, USD2JPY so they all return the correct value def USD2EUR(amount): """ Convert amount from US Dollars to Euros. Use 1 USD = 0.831467 EUR args: amount: US dollar amount (float) returns: value: the equivalent of amount in Euros (float) """ #TODO: Your code goes here value = amount * 0.831467 return value

Answers

Answer:

The program in Python is as follows:

def USD2EUR(amount):

   EUR = 0.831467 * amount

   return EUR

def USD2GBP(amount):

   GBP = 0.71 * amount

   return GBP

def USD2JPY(amount):

   JPY = 109.26 * amount

   return JPY

USD = float(input("USD: "))

print("Euro: ",USD2EUR(USD))

print("GBP: ",USD2GBP(USD))

print("JPY: ",USD2JPY(USD))

Explanation:

This defines the USD2EUR function

def USD2EUR(amount):

This converts USD to Euros

   EUR = 0.831467 * amount

This returns the equivalent amount in EUR

   return EUR

This defines the USD2GBP function

def USD2GBP(amount):

This converts USD to GBP

   GBP = 0.71 * amount

This returns the equivalent amount in GBP

   return GBP

This defines the USD2JPY function

def USD2JPY(amount):

This converts USD to JPY

   JPY = 109.26 * amount

This returns the equivalent amount in JPY

   return JPY

The main begins here

This gets input for USD

USD = float(input("USD: "))

The following passes USD to each of the defined functions

print("Euro: ",USD2EUR(USD))

print("GBP: ",USD2GBP(USD))

print("JPY: ",USD2JPY(USD))

Note the program used current exchange rates for GBP and JPY, as the rates were not provided in the question

Other Questions
This table shows the population of a city every ten years since 1970. Years Since 1970 Population (In thousands) 489 27. Find the best-fitting quadratic model for the data. Round to 3 decimal places. 0 10 801 20 1.202 30 28. 1,998 Using this model, what will be the estimated population in 2020? 40 2,959 Construct an equation for the expression: 3 less than 2 times a number is 7. Show the solution to the equation and prove your solution to be true through your work. wendy spider has a cast on her broken leg. She takes 7 steps with her broken leg. In total how many steps does she take with her other 7 legs. Simplify the expression.4y-y(3 - 7y) + 5+ 2(8- y)A.)7y2-y +21B.)-7y2 - y + 21C.)-8y + 21D.)-7y+21 PLEASE HELP!! URGENT In the late 1800s, how did other groups oppose the actions of labor unions? Check all that apply.1.Business owners shortened employee workdays.2.Strike breakers were hired.3.Union organizers often sided with business owners.4.Unskilled immigrant workers offered cheap labor.5.Union organizers were fired. find the area of the shaded figure The molecular mass of nicotine is 162.1 grams. Nicotine contains 74.0% carbon, 8.7% hydrogen, and 17.3% nitrogen. Determine it's molecular formula.A). C10H14N2B). C6H8N4C). C5H7ND). C3H6NI give Brainliest! Please no links Waterway Industries estimates its sales at 240000 units in the first quarter and that sales will increase by 26000 units each quarter over the year. They have, and desire, a 25% ending inventory of finished goods. Each unit sells for $35. 40% of the sales are for cash. 70% of the credit customers pay within the quarter. The remainder is received in the quarter following sale. Cash collections for the third quarter are budgeted at:a. $5,735,800.b. $11,574,800.c. $8,380,400.d. $10,056,200. Do you think countries like the United States should get involved in helping people to get water in exchange for better oil prices? Why or why not? (Think of the risks involved on both sides with soldiers going into a foreign country to dig up land to get more water) HELP ME WITH MY 6TH GRADE SOCIAL STUDIES HOMEWORK PLSSS!!!!! (NEEDS TO BE 2 SENTENCES OR MORE) SPAM ANSWERS WILL BE REPORTED!!!! Describe the effect of the construction of Roman roads on the Roman Empire. What reading will a digital multimeter indicate, when set to the 4A scale, if the actual current flow is 200mA?0.002 A0.020 A0.200 A2.000 A Can money buy happiness? Write it in a argumentative essay type way including intro-body-conclusion-counterclaim- rebuttal and evidence helppppppppppppp Plsss which of the following is true of the Japanese invasion of china ad attack of the city of Nanjing in 1937 What are the values of m and o In the diagram below? If methane gas was kept in a 3.00 L container at STP, what would the pressurebe at 3.2 L? Over the years, a number of students have written or asked Elie Wiesel questions about his experiences.Suppose you were asked to write him a letter. What questions would you ask him about the book so far orabout the violence and hatred he describes? You do not have to do research, just write down what youknow and think. Your response should be at least one paragraph in length.PLEASE HELP **URGENT** if angle x=55% and angle y=35, calculate the following 1.cos(x+y) Differentiate between renewable and nonrenewable resources. Which is best for the environment? What resource is most economical? If you could choose an energy source for your town what would it be and why? hello please help ill give brainliest