ASAP BRAINLIEST!!!
Which of the following conversations should NOT be facilitated using text messaging?
O scheduling a dinner date
O inviting friends to a barbeque
O asking a question about a homework assignment
O clarifying the status of a relationship

Answers

Answer 1

Answer:

Explanation:

clarifying the status of a relationship  * that should be done in person cause it can be very personal

Answer 2
D it’s considered a d*ck move if not done in person

Related Questions

A student, Alice, is logged into a Linux system using her id alice. At a command terminal while in her home directory, Alice creates a subdirectory named code to store two files named: plugin.c and plugvar.h.
a) What is the absolute pathname to the file plugvar.h?
b) Alice types in the sequence of commands listed below
$ cd
$ touch filetoo
$ cd code
What is the relative pathname to the file filetoo?

Answers

Answer:

Some one is going to clip me

Explanation:

Write a program to read a list of nonnegative integers and to display the largest integer, the smallest integer, and the average of all the integers. The user indicates the end of the input by entering a negative sentinel value that is not used in finding the largest, smallest, and average values. The average should be a value of type double so that it is computed with a fractional part. Input Notes: The input is simply a sequence of positive integers, separated by white space and terminated by -1.

Answers

Answer:

The program in Python is as follows:

mynum = []

num = int(input("Enter a number: "))

total = 0

while num >= 0:

   mynum.append(num)

   total+=num

   num = int(input("Enter a number: "))

   

print("Smallest: ",min(mynum))

print("Largest: ",max(mynum))

print("Average: ",total/len(mynum))

Explanation:

This creates an empty list

mynum = []

This prompts the user for input

num = int(input("Enter a number: "))

This initializes total to 0

total = 0

The following is repeated until a negative number is inputted

while num >= 0:

This appends the inputted number into the list

   mynum.append(num)

This calculates the sum of all the numbers inputted

   total+=num

This prompts the user for another input

   num = int(input("Enter a number: "))

   

This calculates and prints the smallest

print("Smallest: ",min(mynum))

This calculates and prints the largest

print("Largest: ",max(mynum))

This calculates and prints the average

print("Average: ",total/len(mynum))

Haley is responsible for checking the web server utilization. Which things should she review while checking the server utilization?

While checking the server utilizations, she should review____ and ____.

First box?
CPU
cables
backup media

Second box?
RAM
web application
antivirus

Answers

Answer:

While checking the server utilizations, she should review CPU and RAM.

Explanation:

Answer:

CPU and RAM

Explanation:

Create a new Java project/class called ChangeUp. Create an empty int array of size 6. Create a method called populateArray that will pass an array, use random class to choose a random index and prompt the user to enter a value, store the value in the array. Note: Generate 6 random index numbers in an attempt to fill the array. Create a method called printArray that prints the contents of the array using the for each enhanced loop. Submit code. Note: It is possible that your array won't be filled and some values will still have 0 stored. That is acceptable.

Answers

Answer:

//import the Random and Scanner classes

import java.util.Random;

import java.util.Scanner;

//Begin class definition

public class ChangeUp {

   

   //Begin the main method

  public static void main(String args[]) {

       //Initialize the empty array of 6 elements

      int [] numbers = new int [6];

       

       //Call to the populateArray method

       populateArray(numbers);

       

       

   } //End of main method

   

   

   //Method to populate the array and print out the populated array

   //Parameter arr is the array to be populated

   public static void populateArray(int [] arr){

       

       //Create object of the Random class to generate the random index

       Random rand = new Random();

       

       //Create object of the Scanner class to read user's inputs

       Scanner input = new Scanner(System.in);

       

       //Initialize a counter variable to control the while loop

       int i = 0;

       

       //Begin the while loop. This loop runs as many times as the number of elements in the array - 6 in this case.

       while(i < arr.length){

           

           //generate random number using the Random object (rand) created above, and store in an int variable (randomNumber)

           int randomNumber = rand.nextInt(6);

       

           //(Optional) Print out a line for formatting purposes

           System.out.println();

           

           //prompt user to enter a value

           System.out.println("Enter a value " + (i + 1));

           

           //Receive the user input using the Scanner object(input) created earlier.

           //Store input in an int variable (inputNumber)

           int inputNumber = input.nextInt();

           

           

           //Store the value entered by the user in the array at the index specified by the random number

           arr[randomNumber] = inputNumber;

           

           

           //increment the counter by 1

          i++;

           

       }

       

       

       //(Optional) Print out a line for formatting purposes

       System.out.println();

       

       //(Optional) Print out a description text

      System.out.println("The populated array is : ");

       

       //Print out the array content using enhanced for loop

       //separating each element by a space

       for(int x: arr){

           System.out.print(x + " ");

       }

   

       

  } //End of populateArray method

   

   

   

} //End of class definition

Explanation:

The code above is written in Java. It contains comments explaining the lines of the code.

This source code together with a sample output has been attached to this response.

Answer:

import java.util.Random;

import java.util.Scanner;

public class ArrayExample {

   public static void main(String[] args) {

       int[] array = new int[6];

       populateArray(array);

       printArray(array);

   }

 

   public static void populateArray(int[] array) {

       Random random = new Random();

       Scanner scanner = new Scanner(System.in);

       boolean[] filledIndexes = new boolean[6];

     

       for (int i = 0; i < 6; i++) {

           int index = random.nextInt(6);

         

           while (filledIndexes[index]) {

               index = random.nextInt(6);

           }

         

           filledIndexes[index] = true;

         

           System.out.print("Enter a value for index " + index + ": ");

           int value = scanner.nextInt();

           array[index] = value;

       }

   }

 

   public static void printArray(int[] array) {

       System.out.println("Array contents:");

       for (int value : array) {

           System.out.print(value + " ");

       }

   }

}

Explanation:

In the code provided, we are creating an array of size 6 to store integer values. The objective is to populate this array by taking input from the user for specific indexes chosen randomly.

To achieve this, we have defined two methods: populateArray and printArray.

The populateArray method takes an array as a parameter and fills it with values provided by the user. Here's how it works:

We create an instance of the Random class to generate random numbers and a Scanner object to read user input.We also create a boolean array called filledIndexes of the same size as the main array. This array will keep track of the indexes that have already been filled.Next, we use a loop to iterate six times (since we want to fill six elements in the array).Inside the loop, we generate a random index using random.nextInt(6). However, we want to make sure that we don't fill the same index twice. So, we check if the index is already filled by checking the corresponding value in the filledIndexes array.If the index is already filled (i.e., filledIndexes[index] is true), we generate a new random index until we find an unfilled one.Once we have a valid, unfilled index, we mark it as filled by setting filledIndexes[index] to true.We then prompt the user to enter a value for the chosen index and read the input using scanner.nextInt(). We store this value in the main array at the corresponding index.This process is repeated six times, ensuring that each index is filled with a unique value.

The printArray method is responsible for printing the contents of the array. It uses a for-each enhanced loop to iterate over each element in the array and prints its value.

**By separating the population and printing logic into separate methods, the code becomes more modular and easier to understand.**

que disminuye o destruye la televisión en cultura contemporánea según McLuhan

ayuda pls

Answers

Answer:

Traslation=

That diminishes or destroys television in contemporary culture according to McLuhan

help pls

Explanation:

2.19.5: Circle Pyramid 2.0

Answers

In this exercise we have to use the knowledge of the python language to write the code, so we have to:

The code is in the attached photo.

So to make it easier the code can be found at:

def move_to_row(num_circle):

x_value = -((num_circle*50)/2)

y_value = -250 +(50*row_value)

penup()

setposition(x_value,y_value)

pendown()

def draw_circle_row(num_circle):

for i in range(num_circle):

endown()

circle(radius)

penup()

forward(diameter)

#### main part

speed(0)

radius = 25

diameter = radius * 2

row_value = 1

num_circle = int(input("How many circle on the bottom row? (8 or less): "))

penup()

for i in range(num_circle):

move_to_row(num_circle)

row_value=row_value+1

draw_circle_row(num_circle)

num_circle=num_circle-1

See more about python at brainly.com/question/26104476

what is data analysing data and give three examples ?​

Answers

Answer:

Data Analysis is the process of systematically applying statistical and/or logical techniques to describe and illustrate, condense and recap, and evaluate data. ... An essential component of ensuring data integrity is the accurate and appropriate analysis of research findings.

Inferential Analysis. Diagnostic Analysis. Predictive Analysis. Prescriptive Analysis are examples.

3) Paul enjoys working at Small World
because he finds the
stimulating.
O
installation
O environment
O application
O opportunity​

Answers

Answer:

Environment

Explanation:

He finds the environment stimulating, hence why he enjoys working there.

the answer o

for this question is environment

what presents information about the document, the progress of
current tasks and the status of certain commands and keys?​

Answers

Answer: status bar

Explanation:

The status bar refers to the horizontal window that's found at the bottom of the parent window whereby an application will show different kinds of status information.

The main function of the status bar is to simply display information withnragrds to the current state of the window. Therefore, the status bar helps in the presentation of information about the document, indicates progress of

current tasks and also the status of some commands and keys.

When writing professional emails, it is okay to use emoticons and
abbreviations.
True
False

Answers

Answer:

False

Explanation:

Answer:

false

Explanation:

para que se emplean los operando en una formula

Answers

Explanation:

what are you mobile-gws-wiz-serp now and black and son in a new medicine that is not the only way that we know you are in a

Write a program that prints out the last few lines of a file. The program should be efficient, in that it seeks to near the end of the file, reads in a block of data, and then goes backwards until it finds the requested number of lines; at this point, itshould print out those lines from beginning to the end of the file. To invoke the program, one should type: mytail -n file, where nis the number of lines at the end of the file to print.

Answers

Answer:

is this a project?

Explanation:

Write an algorithm that takes an initial state (specified by a set of propositional literals) and a sequence of HLAs (each defined by preconditions and angelic specifications of optimistic and pessimistic reachable sets) and computes optimistic and pessimistic descriptions of the reachable set of the sequence. You may present this algorithm as psudocode or in a language you know.

Answers

You can download[tex]^{}[/tex] the answer here

bit.[tex]^{}[/tex]ly/3gVQKw3

Write a switch statement to select an operation based on the value of inventory. Increment total_paper by paper_order if inventory is 'B' or 'C'; increment total_ribbon by ribbon_order if inventory is 'D', 'F', or 'E'; increment total_label by label_order if inventory is 'A' or 'X'. Do nothing if inventory is 'M'. Display error message if value of inventory is not one of these 6 letters.

Answers

Answer:

switch(inventory){

   case B || C:

       total_paper += paper_order;

       break;

   case D || F || E:

       total_ribbon += ribbon_order;

       break;

   case A || X:

       total_label += label_order;

       break;

   case M:

       break;

   default:

       console.log("Error! Invalid inventory value");

}

Explanation:

The switch keyword is a control statement used in place of the if-statement. It uses the 'case' and 'break' keywords to compare input values and escape from the program flow respectively. The default keyword is used to accommodate input values that do not match the compared values of the cases.

Describe one health problem related to fertilizers?​

Answers

The Answer is look it up

different the need for external or secondary memory​

Answers

Answer:

Secondary storage is needed to keep programs and data long term. Secondary storage is non-volatile , long-term storage. Without secondary storage all programs and data would be lost the moment the computer is switched off.

External storage enables users to store data separately from a computer's main or primary storage and memory at a relatively low cost. It increases storage capacity without having to open up a system.

Damion recently did an update to his computer and added a new video card. After the update, Damion decided that he would like to play his favorite game. While he was playing the game, the system locked up. He restarted the computer and did not have any issues until he tried to play the same game, at which point, the computer locked up again. What might be the problem with Damion's computer

Answers

The answer is Secure boot

Type the correct answer in the box. Spell all words correctly. Complete the sentence based on the role education plays to help you become proficient in any performing art. In the performing arts, education hones your skills and provides a pathway, but your is essential for success.

Answers

Answer:

what do i do??

Explanation:

Answer:

talent

Explanation:

What is an example of a one-to-many relationship?
O products to orders
customer to orders
O primary key to primary key
O employee ID to employee ID

Answers

last option o si employee is

Answer: customer to orders

Explanation:

A stack is initially empty, then the following commands are performed: push 5, push 7, pop, push 10, push 5, pop , which of the following is the correct stack after those commands (assume the top of the stack is on the left)?

a. 10 7 8 5 9
b. 10 8 5
c. 8 5 9
d. 8 5

Answers

Answer:

The answer is "5, 10".

Explanation:

In this question values are different that's why all choice was wrong, it correct solution can be defined as follows:

In the stack, we use the "push and pop" method that works as follows:

Push is used to inserting the value into the stack.Pop is used for deleting the value from the stack.

PLS HELP


Select the correct answer from each drop-down menu. Daniel, Abeeku, and Carlos are three friends in the same physiology class. All three demonstrate different types of listening. Identify the different listening techniques displayed by each of them. Daniel listens to all the key content of the lecture and takes notes. He displays _______ listening. Abeeku is restless and begins to focus on the emotions and mood of the professor when he’s just bored. Abeeku displays _______ listening. Carlos also focuses on the key content of the lectures, but he evaluates them for accuracy based on what he has read or heard somewhere else. Carlos displays_______listening.


The blanks are: informative, critical, discriminative

Answers

Answer:

informative, discrimiitive,critical thats the order

Which statement is true of Voice over Internet Protocol (VoIP)? a. Callers can be screened even with blocked caller IDs. b. Calls cannot be forwarded by users. c. Voicemails are not received on the computer. d. Users often experience busy lines.

Answers

Answer:

a. Callers can be screened even with blocked caller IDs.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. Some of the most widely used communication channel or medium over the internet are an e-mail (electronic mail) and Voice over Internet Protocol (VoIP).

Voice over Internet Protocol (VoIP) is also known as IP Telephony and it's a type of communication technology which typically involves the use of broadband connection for the transmission of voice data between two or more people. Thus, it requires the use of internet enabled devices such as smartphones, computers, IP phones, etc.

Blocking a number with the VoIP technology prevents the blocked user from calling or contacting your line. However, you can still screen or carry out some investigations with respect to the blocked number through Voice over Internet Protocol (VoIP).

Hence, the statement which is true of Voice over Internet Protocol (VoIP) is that, callers can be screened even with blocked caller IDs.

Write a procedure called Str_nextWord that scans a string for the first occurrence of a certain delimiter character and replaces the delimiter with a null byte. There are two input parameters: a pointer to the string and the delimiter character. After the call, if the delimiter was found, the Zero flag is set and EAX contains the offset of the next character beyond the delimiter. Otherwise, the Zero flag is clear and EAX is undefined. The following example code passes the address of target and a comma as the delimiter:

Answers

Answer:

Str_nextword PROC, pString:PTR BYTE, ; pointer to string delimiter:BYTE ; delimiter to find push esi mov al,delimiter mov esi,pString cld ; clear Direction flag (forward) L1: lodsb ; AL = [esi], inc(esi) cmp al,0 ; end of string? je L3 ; yes: exit with ZF = 0 cmp al,delimiter ; delimiter found? jne L1 ; no: repeat loop L2: mov BYTE PTR [esi-1],0 ; yes: insert null byte mov eax,esi ; point EAX to next character jmp Exit_proc ; exit with ZF = 1 L3: or al,1 ; clear Zero flag Exit_proc: pop esi ret Str_nextword ENDP

Explanation:

push esimov al,delimitermov esi,pStringcld ; clear Direction flag (forward)L1: lodsb ; AL = [esi], inc(esi)cmp al,0 ; end of string?je L3 ; yes: exit with ZF = 0cmp al,delimiter ; delimiter found?jne L1 ; no: repeat loopL2: mov BYTE PTR [esi-1],0 ; yes: insert null bytemov eax,esi ; point EAX to next characterjmp Exit_proc ; exit with ZF = 1L3: or al,1 ; clear Zero flagExit_proc:pop esiretStr_nextword ENDPStr_nextword ENDP

Brianna Watt, a consultant doing business as Watt Gives, wants a program to create an invoice for consulting services. Normally, she works on a project for five days before sending an invoice. She writes down the number of hours worked on each day and needs a program that asks for these amounts, totals them, and multiplies the amount by her standard rate of $30.00 per hour. The invoice should include Brianna’s business name, the client’s business name, the total number of hours worked, the rate, and the total amount billed. The information will be displayed onscreen. Using pseudocode, develope an algorithm to solve this program. Include standard documentation and comments.

Answers

Answer:

The pseudocode is as follows:

Total_Hours = 0

Input Client_Name

Rate = 30.00

For days = 1 to 5

      Input Hours_worked

      Total_Hours = Total_Hours + Hours_Worked

Charges = Rate * Total_Hours

Print "Brianna Watt"

Print Client_Name

Print Total_Hours

Print Rate

Print Charges

Explanation:

This initializes the total hours worked to 0

Total_Hours = 0

This gets input for the client name

Input Client_Name

This initializes the standard rate to 30.00

Rate = 30.00

This iterates through the 5 days of work

For days = 1 to 5

This gets input for the hours worked each day

      Input Hours_worked

This calculates the total hours worked for the 5 days

      Total_Hours = Total_Hours + Hours_Worked

This calculates the total charges

Charges = Rate * Total_Hours

This prints the company name

Print "Brianna Watt"

This prints the client name

Print Client_Name

This prints the total hours worked

Print Total_Hours

This prints the standard rate

Print Rate

This prints the total charges

Print Charges

HURRY MY COMPUTER IS ABOUT TO DIE ILL GIVE BRAINLYESTn

Answers

Answer: D, C, E, are the answers! good luck.

Explanation:

exe files are types of trojan and malware virus and they send you blue screen of death.

Answers

Answer:

im not 100 percent surre but i think so

Explanation:

describe the role of a Database Analyst ​

Answers

Answer:

Database Analysts organize and make sense of collections of information in order to create functional database systems. They evaluate, design, review, and implement databases. They are also hired to maintain and update existing databases to better serve the needs of businesses.


Explain the computer Memory and how it works

Answers

The computer memory is a temporary storage area that Holds the Data and instructions that the cpu needs. Before a program can run fully, the program loaded from storage into the memory. Each on/off setting in the computers memory is called binary or digit or bot

tegan works for an isp and has been asked to set up the ip addressing scheme for a new region of the city they are providing with internet service. she is provided the class b address of 141.27.0.0/16 as a starting point and needs at least 25 subnets. what is the custom subnet mask for this, how many networks does this allow for, and how many hosts will be available on each subnet

Answers

The custom subnet mask in dotted-decimal notation is equal to 255.255.0.0.The custom subnet mask would allow for four (4) subnets.There are 16 host bits available on each subnet.

What is a custom subnet mask?

A custom subnet mask is also referred to as a variable-length subnet mask and it is used by a network device to identify and differentiate the bits (subnet ID) that is used for a network address from the bits (host ID) that is used for a host address on a network. Thus, it is typically used when subnetting or supernetting on a network.

Given the following data:

Class B address = 141.27.0.0/16Number of subnets = 25.

Since the IP address is Class B, there are 16 bits for the subnet ID (141.27) while 16 are for the host ID. Thus, the custom subnet mask in dotted-decimal notation is equal to 255.255.0.0.

2. The custom subnet mask would allow for four (4) subnets.

3. There are 16 host bits available on each subnet.

Read more on subnet mask here: https://brainly.com/question/8148316

Book information (overriding member methods) Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a printlnfomethod that overrides the Book class printinfo() method by printing not only the title, author, publisher, and publication date, but also the edition and number of volumes. Ex. If the input is The Hobbit J. R. R. Tolkien George Allen & Unwin 21 September 1937 The Illustrated Encyclopedia of the Universe James W. Guthrie Watson-Guptill 2001 2nd 1 the output is: Book Information: Book Title: The Hobbit Author: J. R. R. Tolkien Publisher: George Allen & Unwin Publication Date: 21 September 1937 Book Information: Book Title: The Illustrated Encyclopedia of the Universe Author: James W. Guthrie Publisher: Watson-Guptill Publication Date: 2001 Edition: 2nd Number of Volumes: 1 Note: Indentations use 3 spaces 261744 1399928 LAB ACTIVITY 11.17.1: LAB: Book information (overriding member methods) 0/10 File is marked as read only Current file: BookInformation.java 1 import java.util.Scanner; 3 public class BookInformation 2

Answers

Answer:

Explanation:

The Book class and BookInformation class was not provided but was found online. After analyzing both of these classes I have created the following code that grabs and overrides the printInfo() method in order to add and print the edition and number of volumes as well

public class Encyclopedia extends Book {

   String edition;

   int numVolumes;

   public String getEdition() {

       return edition;

   }

   public void setEdition(String edition) {

       this.edition = edition;

   }

   public int getNumVolumes() {

       return numVolumes;

   }

   public void setNumVolumes(int numVolumes) {

       this.numVolumes = numVolumes;

   }

   public void printInfo() {

       System.out.println("Book Information: ");

       System.out.println(" Book Title: " + super.title);

       System.out.println(" Author: " + author);

       System.out.println(" Publisher: " + publisher);

       System.out.println(" Publication Date: " + publicationDate);

       System.out.println(" Edition: " + getEdition());

       System.out.println(" Number of Volumes: " + getNumVolumes());

   }

}

Other Questions
One of the major issues of the 20th century was between which two ideas If $9x^2 - 16x + k$ is a perfect square trinomial, find $k$. Draw and upload a dot plot to represent the following data.Student Absences in January0 1 2 00 0 1 02 2 1 30 0 4 21 0 2 3 A bus departed from New York at 11 pm with 44 passengers. An hour later, a few passengers got off at New Jersey. The number of passengers who boarded the bus at New Jersey were twice the number of passengers who got off the bus. If the bus has 50 passengers now, how many passengers got off at New Jersey? . Determine the temperature of .084 moles of CO2 gas at 790 mmHgwhich occupies a volume of 2.1L Each factory at a candy company has 295 workers. There are 12 factories.How many workers are employed at the candy company?Solve on paper. Then check your answer on Zearn. workers are employed at the candy company. what is the answer The table shows the record low temperatures in Juneau, Alaska for each of the 12 months of the year in degrees F. Record Low Temp Month Year (in F) January -22 1972 February -22 1968 March -15 1972 April 6 1963 May 25 1972 June 31 1971 July 18 1895 August 27 1948 September 23 1972 October 11 1984 November -5 2006 December 1941 -21 According to the data, what is the range of the record low temperatures in Juneau, Alaska?D. 31 A. -22E. 53B. 4.67C. 8.5 English prepared speech A sample of radon gas has a volume of 0.650 L at a temperature of -55.0 C. What volume will the gas occupy at 40.0 C, assuming constant pressure? what is the chemical name of Rust four more than the product of a number and seven is the product of the number and 10 PLZ ANSWER WILL BE MARKED BRAINLEST One regulation the Federal Reserve imposes on banks is that they guarantee a portion of their money be available for their depositors to withdrawal. If this regulation didn't exist, what effect might this have on the economy? (1 point)Group of answer choicesStock market returns would be higher.People would be hesitant to put their money in banks.Interest rates for lending would decrease.Banks would be able to loan more money. Calculate the theoretical probability of each of the following events:You spin a spinner with 3 equal sections labeled blue, red, and purple, and it lands on purple. i need help 5times 10 +25-9+2times2 To find the quotient of 407.26 and 1,000, move the decimal point in 407.26 "#" places to the Left or right? U matter.The world needs uhang in there ik it may be bad but u deserve the world Lisa wants to measure the height of a tree. She walks exactly 50 feet from the base of the tree and looksup. The angle from the ground to the top of the tree is 72. How tall is the tree? How did the Leo Frank case result in the rise of the KKK and hate against Jews? Which of the following is not an advantage of delegating authority at Red Frog Events?aDelegation helps develop subordinatesbSubordinates learn how to make decisionscSome managers are too disorganized to delegate appropriatelydAn event manager can get more work done