What is something about online conferencing that you understand better now.
What did you learn?

Answers

Answer 1

Answer:

man this question is really about your personal experience but i'll try my best to answer this

Explanation:

onnline Web Conferencing is used by businesses and now schools who went to online because of the virus. for businesses i learned they use it to present and share with online collaboration on different applications including documents, web sites, data files, video, emails, and reduce the time and cost of business travel for meetings. i understand now that online conferencing can be used for Applications for web conferencing include meetings, training events, lectures, or presentations from a web-connected computer to other web-connected computers.


Related Questions

Allison is writing a program in Java and keeps getting an error. Which line of code is causing the error?

A. Int a = 0, b = 3, c;
B. for(i = 0, i <= 13, i++) {
C. c = (a * 2) + i;
D. System.out.println(c);

}

Answers

B will cause an error.

Allison needs to declare a type for variable i and use semi-colons.

The for statement should be for(int i = 0; i <=13; i++){

Write a script that inputs a line of plaintext and a distance value and outputs an encrypted text using a Caesar cipher.
The script should work for any printable characters. An example of the program input and output is shown below:
Enter a message: Hello world!
Enter the distance value: 4
Output: Lipps${svph%

Answers

Answer:

def encrypt_text(text,value):

   encoded = ""

   for i in range(len(text)):

       char = text[i]

       if (char.isupper()):

           encoded += chr"po"ord'po'char'pc' + value -65'pc' % 26 + 65'pc'

       else:

           encoded += chr'po'ord'po'char'pc' + value -97'pc' % 26 + 97'pc'

   return encoded

plaintext = input("Enter sentence of encrypt: ")

dist_value = int(input("Enter number: "))

encrypted = encrypt_text(plaintext, dist_value)

print(encrypted)

Explanation:

The python program above is a Ceasar cipher implementation. The encrypt_text function is defined to accept text input and a distance value, which is used to encrypt the plaintext.

The user can directly input text and the distance value from the prompt and get the encrypted text printed on the screen.

Create a new program with a struct, Data, that contains: an int a char[80] Write a function newData(char[]), that takes char[] as a parameter

Answers

Answer:

#include <iostream>

#include <cstring>

using namespace std;

struct Data {

   int userId;

   char name[80];

}

void newData(string data char[]){

   int counts= 0;

   struct Data name;

   data.userId = ++counts;

   data.name = char[];

   cout<< data.userId << "\n"<< data.name ;

}

int main( ) {

   char myName;

   string mydata;

   cin>> myName;

   cin>> mydata;

   newData( myName, mydata);

}

Explanation:

The c++ source code above stores its data in a struct called "Data". The function newData dynamically creates new data from the struct defined.

20 pts, please write in JAVA. need this ASAP
In the Lesson Slides for this activity, we developed a method findChar for figuring out if a character was in a String.

The implementation was:

public boolean findChar(String string, String key)
{
for(int index = 0; index < string.length(); index++)
{
String character = string.substring(index,index+1);
if(character.equals(key))
{
return true;
}
}
return false;
}
However, there is a much more efficient and simple algorithm that we can use to determine if a character is in a String. Using the method signature public boolean findChar(String string, String key), figure out a more efficient method with a lower exection count.

Hint: We’ve learned a couple of methods that can tell us what index a character is at - can we use those to determine if the character is in a String?

Answers

public class JavaApplication78 {

   public boolean findChar(String string, String key){

       if (string.contains(key)){

           return true;

       }

      return false;

   }

   public static void main(String[] args) {

       JavaApplication78 java = new JavaApplication78();

       System.out.println(java.findChar("hello", "h"));

   }

   

}

First I created the findChar method using the contains method. It checks to see if a certain sequence of characters is in another string. We returned the result. In our main method, we had to create a new instance of our main class so we could call our findChar method.

A database has one physical schema and one conceptual (logical) schema but many external schemas (views).
a) True
b) False

Answers

Answer:

true

Explanation:

A database has one physical schema and one conceptual (logical) schema but many external schemas (views): a. True.

A database refers to a structured (organized) collection of data that are stored on a computer system and usually accessed in various ways such as electronically.

In database management, a database schema can be defined as a structure which is typically used to represent the logical design of the database. Thus, it denotes how data are stored (organized) and the relationships existing in a database management system (DBMS).

Generally, there are two (2) main types of a database schema and these include;

Physical database schema: it is only one per database.Conceptual (logical) schema: it is only one per database.

However, there are multiple number of external schemas (views) for each database because it is what an end user is interested in.

Read more on database here: https://brainly.com/question/3259292

Shrink-wrap, box-top, and click-wrap agreements are inherent to e-commerce. How you feel about them often depends on whether you are the vendor or purchaser. What are the best practices to assure shrink-wrap, box-top, and click-wrap agreements are legal? What are the best ethical practices that the e-commerce industry should adopt?

Answers

Answer:

Shrink-wrap, Box-top, and Click-wrap Agreements

a) The best practices to assure that shrink-wrap, box-top, and click-wrap agreements are legal include  

1) having e-commerce terms and conditions separate from the normal trade terms and conditions,  

2) ensuring that customers agree to the terms before entering into a transaction, and  

3) laying the code of conduct for all visitors interacting with your site or doing any business transaction on your site.

b) The best ethical practices that the e-commerce industry should adopt are:

1) Put additional layers of protection like a web application firewall to their websites.  

2) Ensure they always adhere to PCI (Payment Card Industry) compliance guidelines.

3) They should not store customers' data which they do not need.

4) Ensure privacy and security of customers' data.

5) Establish trust by safeguarding intellectual property rights.

6) Consider some environmental issues (customers care about them).

Explanation:

a) Websites' Terms and Conditions (T&C) establish some form of legal contract between the organization and its clients.  

b)To ensure that organizations that process, store, or transmit credit card information maintain secure online environment, they are required to comply with PCI DSS.  It is a set of Payment Card Industry requirements for all organizations involved in the use of online cards for payment for their goods and services.

Help me! I’ll mark you brainly and give extra points!

Answers

Answer:

52 5,

Explanation:

Other Questions
Which statement is not true of mitosis?The statements are:A There are four stages of mitosisB It is the division of genetic material of a dividing eukaryotic cell into two partsC it is a process that takes an average of eight minutes for any cell to complete the processD each daughter cell receives a full set of chromosomes identical to the parent cell asheed and Sofia are riding a merry-go-round that is spinning steadily (uniform circular motion). Sofia is twice as far from the axis as is Rasheed. Sophia's acceleration is _________ that of Rasheed. * Ellas y Tom .........amables (friendly).esestnsonestwhich one Sarah was summoned to the chapel to meet der Werwolf after ---Ashe was severely beaten by a teacher who was then sent away from the schoolBMauser was removed from the school by her father after Sarah reported herCher "uncle" visited her and donated a large sum of money to the schoolDa girl claimed to have seen her break into the headmaster's private quarters Allison is writing a program in Java and keeps getting an error. Which line of code is causing the error?A. Int a = 0, b = 3, c;B. for(i = 0, i why is 33 question so long :( help me pleaseeeeeee fill in thr blank with conjunctions. _____ the teacher ______ the students apologized to each other The computer was regularly priced at $1500. If you order the computer over the Internet, you can save money as the price is only $1200.What percent discount (change) are you getting? Everytime you make a comment, your friend has to be one step bigger or better. Below are two statements you made. What did your friend say when you told him this? Use mieux, or meilleur in your responses. What single transformation maps ABC onto A'B'C'? What kind of relationship do Buck and Spitz have? Put the following events and people in order of who/what came first. Somewere around the same time, but which ones were more prominent first?..The United NationsVladimir LeninThe Russian RevolutionAdolf Hitler and Joseph Stalin's agreementWorld War IILeon Trotsky and Joseph StalinThe Battle of StalingradThe GulagsKarl MarxThe Cold WarCzar Nicolas II of RussiaWorld War I.... What made Hatshepsut different from any other pharaoh? 6th grade history I mark as brainliest Factor:25y + 27xPlz help clarify the important of development project Helene was given the following enlargement of a triangle. A triangle has side lengths 2 centimeters, 7 centimeters, and 5 centimeters. The corresponding sides are A, B, and 30 centimeters. What are the lengths of sides A and B? A = 30 cm, B = 39 cm A = 30 cm, B = 48 cm A = 20 cm, B = 26 cm A = 20 cm, B = 33 cm Hey I am doing a Nomads and farmers assignment and i need help What kind of site is not credible because anyone can change the information on them?(1 A: pointblogsB: wikisC:magazinesD:eBooks