Answer:
d ) all of the above
Explanation:
is the correct answer
does anyone know how to code
Answer:
no
Explanation:
i do not know how to code
Why are people's visions of utopias and dystopias subjective?
A. Because the vision one person has of paradise will likely match
the vision most people have of a utopia
B. Because only certain technologies make things better and
different ones make things worse in a dystopia
C. Because all technology is dangerous and can lead to the downfall
of all societies, resulting in dystopia
D. Because the technology needed for one person's utopia may be
what creates disaster for another person's dystopia
Answer:
D. Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia.
Explanation:
Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia are people's visions of utopias and dystopias subjective. Thus option D is correct.
What are utopias and dystopias?Speculative fiction categories that study social as well as political structures include utopian and dystopian literature. In order to pique readers' interest, utopian fiction often depicts a world that adheres to the author's ethics and has many elements of a different reality.
Ultimately, it all varies depending on who you ask. A person's dystopia may be another person's utopia. We don't all have the same notions regarding what a utopia would look like, which is, in my opinion, one of the grounds why people don't live in one. Therefore, option D is the correct option.
Learn more about utopias and dystopias, Here:
https://brainly.com/question/905235
#SPJ2
why does this site suck so much?
Like why do I have to pay MONEY to get answers?
Answer:
you can answer ppl question to get points to ask questions
Explanation:
thats what i do and its free
Answer:
Money :))
They get revenue off of ads and that cash from your purchases to keep the site and themselves running.
AND REMEMBER: NOTHING IS FREEEEEEE
The Bellman-Ford algorithm for the shortest path problem with negative edge weights will report that there exists a negative cycle if at least one edge can still be relaxed after performing nm times of relaxations. The algorithm, however, does not specify which cycle is a negative cycle. Design an algorithm to report one such cycle if it exists. You should make your algorithm runs as fast as possible.
Answer:
- Iterate over the Bellman-Ford algorithm n-1 time while tracking the parent vertex and store in an array.
- Do another iteration and if no relaxation of the edges occurs in the nth iteration then print of return "There are no negative cycle".
- Else, store the vertex of the relaxed edge at the nth iteration with a variable name.
- Then iterate over the vertexes starting from the store vertex until a cycle is found then print it out as the cycle of negative weight.
Explanation:
The Bellman-Ford algorithm can be used to detect a negative cycle in a graph. The program should iterate over the algorithm, in search of a relaxed edge. If any, the vertex of the specified edge is used as a starting point to get the target negative cycle.
If an object someThing has a method someMethod( ), then you can call the method using the statement ____________ .
a. someMethod(someThing);
b. someThing.someMethod( );
c. someMethod.someThing() ;
d. someThing = someMethod( );
Answer:
C) someThing.someMethod( )
Explanation:
The methods in a class can be accessed outside the class (assuming they are public methods and not private to the class) by using the dot(.) symbol and calling the method on the instance or object of the class.
In this case, the object of the class someThing, calls the method, someMethod( ) by using a dot and the name of the method with a parentheses at the end. This enables the code in the method act on the class instance or object.
You are part of a sales group that has been asked to give a presentation.
Before you begin, what should you and your group do?
O A. Figure out who is the best public speaker.
O B. Look into file-sharing options so that everyone can work on the
same file at the same time.
OC. Buy the best software on the market.
O D. Ask if you have to give a slide presentation.
g A CPU is equipped with a cache; Accessing a word takes 20 clock cycles if the data is not in the cache and 5 clock cycles if the data is in the cache. What is the effective memory access time in clock cycles if the hit ratio is 90%
Answer:
6.5
Explanation:
The formula to calculate the efficiency is;
= (cache-click-cycle x hit ratio) + ( memory-clock-cycle x 1 - hit ratio)
= (5 x 0.9) + ( 20 x 0.1)
= 4.5 + 2
= 6.5
In this exercise we have to use the knowledge of efficiency, in this way, using the data already informed, we can say that the result of this is:
6.5 effective memory
In this exercise, it was informed that some conditions must be established, that is:
Hit radio: 90%Memory: 20Cache: 5
The formula to calculate the efficiency is;
[tex]efficiency= ((cache-click-cycle)(hit \ ratio)) + ( (memory-clock-cycle)(1 - hit \ ratio))[/tex]
Substituting the known values in the formula above, we find that:
[tex]= (5)(0.9) + ( 20)(0.1)\\= 4.5 + 2\\= 6.5[/tex]
See more about efficiency at brainly.com/question/6672666
Generally speaking, digital marketing targets any digital device and uses it to advertise and sell a(n) _____.
religion
product or service
governmental policy
idea
Answer:
product or service
Explanation:
Digital marketing is a type of marketing that uses the internet and digital media for the promotional purposes. It is a new form of marketing where the products are not physically present. The products and services are digitally advertised and are used for the popularity and promotion. Internet and digital space are involved in the promotion. Social media, mobile applications and websites are used for the purpose.
Answer:
A.) Product or service
Explanation:
Digital marketing is the practice of promoting products or services through digital channels, such as websites, search engines, social media, email, and mobile apps. The goal of digital marketing is to reach and engage with potential customers and ultimately to drive sales of a product or service. It can target any digital device that can access the internet, and it can use a variety of techniques such as search engine optimization, pay-per-click advertising, social media marketing, content marketing, and email marketing to achieve its objectives.
help please with the question in the photo
Answer:
A
Explanation:
A because, why would someone want to listen to your own interests?
what is spread sheet software?
Answer:
The answer to this question is given in the explanation section.
Explanation:
This is a type of software which show us data in tabular form. These software can easily store, analyze and organize data.
They are divided in rows and columns. They are mainly used for accounting and book keeping.
The commonly used spread sheet software in the market are MS Excel by Microsoft, Calc by libre office.
Question # 6
Dropdown
Choose the correct ending to the sentence below.
The function localtime() _____________________
Answer:
returns a different value every time you use it
Explanation: :)
Which important aspect of the Roman Empire did the barbarians destroy?
Answer:
centers of learning
Explanation:
Under the leadership of Emperor Valens, Rome was already having financial hardships. This meant that it didn't have enough money left to repair its empire nor to strengthen it against invaders. Soon, the barbarians such as the Franks, Huns, Saxons, etc. started attacking Rome. They spent a lot of time destroying the outer regions of the empire because they were also at war with each other. They penetrated Rome and it soon fell. The barbarians didn't only destroy the cities but they also destroyed the "centers of learning." Roman people were known to value education. With the fall of the Roman Empire, so did education and sophisticated architectures follow.
Answer:
i dont know but them barbs are crazy can't believe they were a thing back then
Explanation:
lol
g Assume that this program is run on a processor with data cache of size big enough that the entire array arr can fit in the cache. (a) How many paths does the function foo of this program have
Answer:
A. 2
Explanation:
The food function in the C source code uses two for loop statements to fill and array of size 100 with 100 values ranging from 1 to 100 and the second to get the total sum to the values in the array. With this, two program paths are created.
Most presentation programs allow you to save presentations so they can be viewed online by saving them as ____
files.
Explanation:
Most presentation programs allow you to save presentations so they can be viewed online by saving them as html
files.
Most presentation programs allow you to save presentations so they can be viewed online by saving them as html files.
Should video gaming be considered a school sport?
Answer:
I believe it should be in higher grades such as high school or college so people don't abuse it like little kids might.
Answer:
No because the defininition of sports is an activity involving physical exertion and Video games don't involve physical extertion.
Guys, please help me asap (Photo Attached) !!!!!!! HELP 25pts!!!!
Answer:
20%
Convert fraction (ratio) 30 / 150 Answer: 20%
The first one.
Please I need one more braniest for 'expert' may I get it?
Explanation:
The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for software validation testing.a. white box testingb. special box testingc. class box testingd. black-box testing
Answer:
d.) black-box testing
Explanation:
Software testing can be regarded as procedures/process engage in the verification of a system, it helps in detection of failure in the software, then after knowing the defect , then it can be corrected. Black Box Testing can be regarded as a type of software testing method whereby internal structure as well as design of the item under test is not known by one testing it. In this testing internal structure of code/ program is unknown when testing the software, it is very useful in checking functionality of a particular application. Some of the black box testing techniques commonly used are; Equivalence Partitioning, Cause effect graphing as well as Boundary value analysis. It should be noted that the purpose of black-box testing is to isolate the behavior of a given component of software.
Is it important to use varied methods when creating digital media presentations? Why or why not?
Yes, because no one method is capable of adequately delivering the information.
No, because using more than one method is confusing to the audience.
No, because the different methods are incompatible with each other.
Yes, because it makes the presentation more interesting for the audience.
having a bad day? enjoy this front view of phinias (can't spell his name)
Answer:
ouch what happened to him
congrats you ruined my childhood
(thanks for the free points!!)