Do you agree that technology is always at the advantageous side wherein it only results in good things?

Answers

Answer 1

Answer:

No, think about mass surveillance in China (and in USA!), and the "social credit" system.


Related Questions

Which three IP addresses may be pinged by the Test Management Network feature in the ESXi hosts DCUI

Answers

Answer:

Primary DNS server

Secondary DNS server

Default gateway

Explanation:

The following tests are performed by ESXi:

Pings the subnet gateway that is stated.Pings the primary DNS server that is stated.Pings the secondary DNS server that is stated.Ensure that the hostname of the ESXi host is resolved by it.

Based on the above, the three IP addresses may be pinged by the Test Management Network feature in the ESXi hosts DCUI are are therefore the following:

Primary DNS serverSecondary DNS serverDefault gateway

Write a method called lexLargest that takes a string object argument containing some text. Your method should return the lexicographical largest word in the String object (that is, the one that would appear latest in the dictionary).

Answers

Answer:

public static String lexLargest(String text){

       //split the text based on whitespace into individual strings

       //store in an array called words

       String[] words = text.split("\\s");

       

       //create and initialize a temporary variable

       int temp = 0;

       

       //loop through the words array and start comparing

       for(int i = 0; i < words.length; i++){

           

           //By ignoring case,

           //check if a word at the given index i,

           //is lexicographically greater than the one specified by

           //the temp variable.

          if(words[i].compareToIgnoreCase(words[temp]) > 0){

               

               //if it is, change the value of the temp variable to the index i

              temp = i;

           }    

       }

       

       //return the word given by the index specified in the temp

               // variable

       return words[temp];

    }

Sample Output:

If the text is "This is my name again", output will be This

If the text is "My test", output will be test

Explanation:

The code above has been written in Java. It contains comments explaining the code. Sample outputs have also been given.

However, it is worth to note the method that does the actual computation for the lexicographical arrangement. The method is compareToIgnoreCase().

This method, ignoring their cases, compares two strings.

It returns 0 if the first string and the second string are equal.

It returns a positive number if the first string is greater than the second string.

It returns a negative number if the first string is less than the second string.

Select the correct term to complete the sentence.
The
file format is used for video files.

A. .pptx

B. .mp3

C. .jpeg

D. .mp4

Answers

Answer: D. mp4

its mp4 because its always on video files

4. Write a program to calculate square root and
cube root of an entered number .​

Answers

Answer:

DECLARE SUB SQUARE (N)

CLS

INPUT “ENTER ANY NUMBER”; N

CALL SQUARE(N)

END

SUB SQUARE (N)

S = N ^ 2

PRINT “SQUARE OF NUMBER “; S

END SUB

Which of the following is true? a. There are RFCs that describe challenge-response authentication techniques to use with email. b. Filtering for spam sometimes produces a false positive, in which legitimate email is identified as spam. c. Spam relies heavily on the absence of email authentication. d. All of the above.

Answers

The option that is true is option b. Filtering for spam sometimes produces a false positive, in which legitimate email is identified as spam.

How is spam filtration carried out?

The processing of email to organize it in accordance with predetermined criteria is known as email filtering. The word can allude to the use of human intelligence, although it most frequently describes how messages are processed automatically at SMTP servers, sometimes using anti-spam tactics.

Therefore, Email filtering operates as previously stated by scanning incoming messages for red flags that indicate spam or phishing content and then automatically transferring such messages to a different folder. Spam filters evaluate an incoming email using a variety of criteria.

Learn more about Filtering for spam from

https://brainly.com/question/13058726
#SPJ1

What is the purpose of the property, transition-timing-function?
It sets how many times a transition will play.
It delays the start of a transition by a set number of seconds.
It changes the speed at different stages of the transition.
It adds a pause between steps in an animation.

Answers

Answer:

It changes the speed at different stages of the transition.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations that a web page displays.

Basically, the purpose of the property, transition-timing-function is that It changes the speed at different stages of the transition. Thus, it states the values between the beginning and ending of a transition are calculated over its duration.

Difference between computer hardware and computer software

Answers

Answer: Computer hardware is computer parts for the computer such as keyboards, mouses, and monitors. Computer software is a program on the computer where you can download it and that software you downloaded adds data to the computer that tells it how to work, etc.

Hope this helps :)

Explanation: N/A

In python, Create a conditional expression that evaluates to string "negative" if user_val is less than 0, and "non-negative" otherwise.

Answers

I am assuming that user_val is an inputted variable and a whole number (int)...

user_val = int(input("Enter a number: "))

if user_val < 0:

   print("negative")

else:

   print("non-negative")

how you use ict today and how will you use it tomorrow

Answers

Answer:

you use it in water today

Explanation:

tomorrow you'll use it in soda

g An OpenCl Compute Unit is composed of: Group of answer choices Processing Elements Devices Streaming Multiprocessors Platforms

Answers

Answer:

Processing Elements

Explanation:

Machine and assembly are referred to as a low level programming language used in writing software programs or applications with respect to computer hardware and architecture. Machine language is generally written in 0s and 1s, and as such are cryptic in nature, making them unreadable by humans but understandable to computers.

OpenCl is an abbreviation for open computing language.

An OpenCl Compute Unit is composed of processing elements.

What is the minimum number of cycles needed to completely execute 1024 instructions on a CPU with a 12-stage pipeline

Answers

Answer:

1035

Explanation:

Pipelining is a technique used in carrying out several instructions at the same time. The pipeline is divided into stages, each of which is attached to the next to create a pipe-like structure.

The parallelizability is calculated by multiplying the number of different instances of a given operation by the number of pipeline stages through which the operation can be separated.

From the given information:

The no of instruction (n) to be executed on CPU = 1024

The no of stages in a pipeline K = 12

The total minimum number of cycles = k + n - 1

= 12 + 1024 - 1

= 1035

write a program to enter 30 integer numbers into an array and display​

Answers

Answer:

i764

Explanation:

Answer:

Explanation:

Python:

numberlist = []

for i in range(0, 29):

   a = input("Enter a number: ")

   numberlist[i] = a

print(*meh, sep = "\n")

Why computer is known as versatile and diligent device? Explain​

Answers

They work at a constant speed to do the task. Unlike a human, they will not slow down or get bored or start making mistakes that they were not doing earlier. So once they are programmed correctly to do a task, they will do it diligently.

They are versatile because they can be used for all sorts of tasks. They can also do many of the same tasks in different ways. They are diligent because they will do a task thoroughly until it is finished.

Which of the following has the greatest impact on telecommunications design?
availability of resources used in manufacturing
consumer functionality demands
O cost of materials used in manufacturing
O currently trending fashion designs

Answers

Answer:

I don't know

Explanation:

Sorry if i'm not helpful. I just need to complete a challenge

If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls for applying social engineering techniques

Answers

Answer:

Baiting. As its name implies, baiting attacks use a false promise to pique a victim's greed or curiosity. ...

Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. ...

Pretexting. Here an attacker obtains information through a series of cleverly crafted lies. ...

Phishing. ...

Spear phishing

Explanation:

thank me later

Given a member function named set_age() with a parameter named age in a class named Employee, what code would you use within the function to set the value of the corresponding data member if the data member has the same name as the parameter

Answers

Answer:

Explanation:

This would be considered a setter method. In most languages the parameter of the setter method is the same as the variable that we are passing the value to. Therefore, within the function you need to call the instance variable and make it equal to the parameter being passed. It seems that from the function name this is being written in python. Therefore, the following python code will show you an example of the Employee class and the set_age() method.

class Employee:

   age = 0

   

   def __init__(self):

       pass

   

   def set_age(self, age):

       self.age = age

As you can see in the above code the instance age variable is targeted using the self keyword in Python and is passed the parameter age to the instance variable.        

Upang mas maging maganda ang larawang ini-edit, dapat isaalang-alang ang tatlong mahahalagang elemento. Ano-ano ang mga ito?​

Answers

Answer:

is this english?

Explanation:

A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.

Answers

Answer:

applet

Explanation:

A(n) applet is a small program that resides on a server and is designed to be downloaded and run on a client computer.

If AX contains hex information 2111 and BX contains hex information 4333, what is the content in BX in hex format after performing ASM instruction ADD BX, AX

Answers

Answer:

BX will hold 6444 in hex format.

Explanation:

From the given information:

We need to understand that AX is 64-bit hex number.

When performing ASM instruction (Assembly language instruction),

The addition of 2111 + 4333 = 6444 will be in BX.

This is because ADD, BX, AX will add bx and ax; and the final outcome will be stored in BX.

BX will hold 6444 in hex format.

Suppose the CashRegister needs to support a method void undo() that undoes the addition of the preceding item. This enables a cashier to quickly undo a mistake. What instance variables should you add to the CashRegister class to support this modification

Answers

Answer:

previousAddition instance variable

Explanation:

In order to accomplish this you would need to add a previousAddition instance variable. In this variable you would need to save the amount that was added at the end of the process. Therefore, if a mistake were to occur you can simply call the previousAddition variable which would have that amount and subtract it from the total. This would quickly reverse the mistake, and can be easily called from the undo() method.

At Greenwood ATCT, arrival information need NOT be forwarded while FDIO is operational unless the sequence of aircraft changes and/or the __________.

Answers

The available options are:

A. Arrival time differs by more than 3 minutes

B. Aircraft is issued an approach other than the tower specified

C. Verbal coordination has not been yet accomplished

Answer:

Aircraft is issued an approach other than the tower specified

Explanation:

Considering the situation described in the question, and according to Instrument Flight Rules (IFR), Approach Clearance Procedures, when at Greenwood Air Traffic Control Tower (ACTC), arrival information need not be forwarded while Flight Data Input-Output (FDIO) operational unless the sequence of aircraft changes and the "Aircraft is issued an approach other than the tower specified."

Write a 3-4 page paper (500-800 words) about your project that explains your project, the type of conditioning you used, and the methods and procedures used to execute your project. You should explain the process of shaping the behavior and utilize any or all appropriate vocabulary. Finally, include a discussion of the results and an analysis of recommendations for improvement or future changes.

Answers

Answer:

Following are the responses to the given question:

Explanation:

I have decided to take up my project as a change in my behavior of not working out and exercising on daily basis. To execute this project, I decided to use ‘Operant conditioning’ to be able to complete it successfully. The reason for choosing this as my project is to be able to change my unhealthy behavior of not exercising daily, which is now having an impact on my weight as well as on my mind.

Operant Conditioning is also known as instrumental conditioning was used by the behaviorist B.F Skinner. Through operant conditioning, Skinner explained how we adapt to several learned behaviors in our everyday life. Its idea of such conditioning would be that the acts that accompany reinforcement will most likely occur in the future.

They may call it a punishment for actions and retribution. A relationship is formed between that action as well as its consequences. I began my project with an order of a watch to keep track of my daily workout and even downloaded a phone-based software to track my calorie each day. The concept behind it was to understand my everyday work and my calorie consumption because these variables inspire me to choose more to achieve my aim to practice and maintain my weight safely.

So, to find any way to miss it I did the routine calendar. We also made a small and comprehensive strategy for the first few weeks such as early awakening and 10 minutes getting warmed up. I concentrated on the operating conditioning function and reaction. I've been honored by enjoying my important topics for one hour every week that I finished my practice according to my planned routine. I wanted and award myself quarterly rewards in addition to daily rewards. When the goal of a daily exercise is also achieved, I decided to go out to my favorite coffee just at end of November.

It's not a matter of giving one of my favorite stuff to my cousins to affirm my everyday life except for one year within a week (except when I'm unwell). The fear of missing one of my items that I'd always agreed only at beginning of the week prevented me from achieving my target of exercise every day and made me very content to go to my favorite coffee shop. It made it more motivating for someone like me to proceed with the positive and negative reinforcement of doing my everyday exercise routine. I also get used to my fresh and safe routine every day, but also the results are impressive.

Even though I don't feel about rewarding myself with something that I like, I am very much happy because of the positive result which I have a fit body and maintain a healthy lifestyle. Those who removed my daily positive and negative exercise reinforcements, as well as the monthly incentive, could not be required in the future. Moreover, I can work on a closer look for 6 abs.

Write a program to implement problem statement below; provide the menu for input N and number of experiment M to calculate average time on M runs. randomly generated list. State your estimate on the BigO number of your algorithm/program logic. (we discussed in the class) Measure the performance of your program by given different N with randomly generated list with multiple experiment of Ns against time to draw the BigO graph (using excel) we discussed during the lecture.

Answers

Answer:

Explanation:

#include<iostream>

#include<ctime>

#include<bits/stdc++.h>

using namespace std;

double calculate(double arr[], int l)

{

double avg=0.0;

int x;

for(x=0;x<l;x++)

{

avg+=arr[x];

}

avg/=l;

return avg;

}

int biggest(int arr[], int n)

{

int x,idx,big=-1;

for(x=0;x<n;x++)

{

if(arr[x]>big)

{

big=arr[x];

idx=x;

}

}

return idx;

}

int main()

{

vector<pair<int,double> >result;

cout<<"Enter 1 for iteration\nEnter 2 for exit\n";

int choice;

cin>>choice;

while(choice!=2)

{

int n,m;

cout<<"Enter N"<<endl;

cin>>n;

cout<<"Enter M"<<endl;

cin>>m;

int c=m;

double running_time[c];

while(c>0)

{

int arr[n];

int x;

for(x=0;x<n;x++)

{

arr[x] = rand();

}

clock_t start = clock();

int pos = biggest(arr,n);

clock_t t_end = clock();

c--;

running_time[c] = 1000.0*(t_end-start)/CLOCKS_PER_SEC;

}

double avg_running_time = calculate(running_time,m);

result.push_back(make_pair(n,avg_running_time));

cout<<"Enter 1 for iteration\nEnter 2 for exit\n";

cin>>choice;

}

for(int x=0;x<result.size();x++)

{

cout<<result[x].first<<" "<<result[x].second<<endl;

}

}

Kyra needs help deciding which colors she should use on her web page. What can she use to help her decide? (5 points)
.Color selection
.Color theory
.Proofreading
.Storyboarding

Answers

Color theory !!! Step by step explanation: no <3 just take the answer

Correct Answer: Color selection

Write a function that displays the character that appears most frequently in the string. If several characters have the same highest frequency, displays the first character with that frequency. Note that you must use dictionary to count the frequency of each letter in the input string. NO credit will be given without using dictionary in your program

Answers

Answer:

The function is as follows:

def getMode(str):

occurrence = [0] * 256

dict = {}

for i in str:

 occurrence[ord(i)]+=1;

 dict[i] = occurrence[ord(i)]

 

highest = max(dict, key=dict.get)

print(highest)

Explanation:

This defines the function

def getMode(str):

This initializes the occurrence list to 0

occurrence = [0] * 256

This creates an empty dictionary

dict = {}

This iterates through the input string

for i in str:

This counts the occurrence of each string

 occurrence[ord(i)]+=1;

The string and its occurrence are then appended to the dictionary

 dict[i] = occurrence[ord(i)]

This gets the key with the highest value (i.e. the mode)

highest = max(dict, key=dict.get)

This prints the key

print(highest)

What is the function of the NOS? Select all that apply.

•network management
•connects network nodes
•network security
•provides MACs
•gives access to privileges
•data protection

Answers

Answer:

.network management

Explanation:

pls need brainliest

Answer:

gives access privileges

network management

network security

data protection

Explanation:

For which two reasons might a designer use contrasting colors on a web page?

Answers

Check box 2 and 3. Those are both correct.
Contrasting colours are bound to bring attention to certain things such as messages and it could also be a pretty aesthetic which is appealing and will improve and boost interactions

11
The spreadsheet above indicates the number of Science graduates from a college during
period 2001 - 2003.
Use the following spreadsheet to answer the following questions 12 to 16. u
A
B
с
D
E
F
2001
2002
2003
Total
Chemisin
TOD
75
65
Biolo
70
Physics
15
5​

Answers

Answer:

need help too

Explanation:

Which of the following is NOT a computer hardware?
A) monitor
B) scanner
C) modem
D) Windows 10

Answers

Answer is d hope this helps

By convention only, either the first usable address or the last usable address in a network is assigned to the router (gateway) connected to that network. (true or false)

Answers

Answer:

t

r

u

e

n      .....................................................                                    

Other Questions
1. Joseph Stalin2. Mao Zedong3. Adolf Hitler4. Otto Von Bismarck ARIEESS got flakes in his bty PLEASE ANSWER FAST!!!!!!!!! INGLSESPAOLINGLSESPAOLthe bedthe nightstandthe pillowthe deskthe dresserthe armchairthe sinkthe microwavethe cupboardthe oventhe toasterthe trash canthe toilet paperthe towelthe mirrorthe hand towelthe televisionthe telephoneGRAMMAR: the verb SER (TO BE)I amYo ________________You areT ________________He/she isl/ella ________________ Helppppppppppppppppp plz plz Find the circumference.Use 3.14 for it.r = 2 mC = [?] mC=7d How does the concept ofjurisdiction impact the powersand functions of the courts atthe state and federal levels? what is the error in the in-text citation in this sentence?Several surveys have found that profitability among multinational corporations spiked in the last several years (Tishman 56.) Why would the poster claim that the slaves were well cared for and disease-free?QUICK I NEED HELP 15 POINTS! Help pleaseeeeeeeeeeee Which of the following three side lengths could be joined together to make a triangle?A. 12 cm, 12 cm, 10 cmB. 4 cm, 2 cm, 7 cmC. 8 cm, 10 cm, 1 cmD. 3 cm, 3 cm, 6 cm An electrical insulator is a material that:A) contains no charge B) does not allow electrons to flow C) has more protons than electrons D) must be a crystal Define Starlight.Thank you! Natural selection is best described asa. disruptive selectionb. stabilizing selection. a mechanism of evolutiond directional selection If x= -3, which of the following values is positive? x3, x2, 2x or 1/xPlssss answer Who led the raid on the federal arsenal at harpers ferry,Virginia, in the hopes of starting a slave rebellion hey lol pls help Over the past several years, the beverage industry has been rapidly changing. New drinks are constantly being invented, and more and more companies are looking to market healthy drinks, with less sugar and fewer artificial sweeteners. This type of environment demands that a company have a structure that is more: Find the difference of the two expressions.(2/5 x + 5) - (1/5 x - 3) I NEED HELP IMMEDIATELY!!!! PLS HELPP. PLS DO NOT GUESS EITHER BUT PLS CMON AND HELP ME PLSSS A magnetic field of 0.27 T exists in the region enclosed by a solenoid that has 599 turns and a diameter of 9.29 cm. Within what period of time must the field be reduced to zero if the average magnitude of the induced emf within the coil during this time interval is to be 12.8 kV