with aid of two examples, describe the use of merging of docments

Answers

Answer 1

Answer:

Answer down below

Explanation:

Q's Asked: With the aid of two examples, describe the use of merging of documents.

------------------------------------------------------------------------------------------------------------

Explanation of "merging documents":

What is the use of merging of documents?

Well merging documents is really only used for organization or systems where documents/ data are changed by different users or systems.

Anyway The requirements for "mail merging" is :

(a) Main Document,

(b) Data Source,

(c) Merge Document.

: Meaning of A horizontal merger: A horizontal merger is when competing companies merge—companies that sell the same products or services.

: Meaning of A vertical merger: A vertical merger is a merger of companies with different products. :3

Welp anyway back to the Q's: With the aid of two examples, describe the use of merging of documents.Umm some people that use "merging of documents", are horizontal mergers which increase market share, such as Umm... T-moblie and sprit bc they are both a phone company. vertical mergers which exploit existing synergies.  So like ummm.... a sports drink company and a car company combining together. hope this helps ~~Wdfads~~~

Related Questions

How many subnets and host per subnet are available from network 192.168.43.0 255.255.255.224?

Answers

It is to be noted that from network 192.168.43.0 255.255.255.224 the number of subnets and hosts available are 8 and 32 respectively. Out of the 32 hosts only 30 are usually usable.

What is a host in networking?

A computer or other device linked to a computer network is referred to as a network host. A host can function as a server, providing information resources, services, and programs to network users or other hosts. At least one network address is assigned to each host.

A computer network is a collection of computers that share resources that are located on or provided by network nodes. To interact with one another, the computers employ standard communication protocols across digital linkages.

So with regard to the above answer, note that by entering the data into an online IPv4 subnet calculator, we are able to arrive at the total number of:

8 subnets; and 30 hosts available for 192.168.43.0 (IP Address) and 255.255.255.224 (Subnet)

Learn more about Subnets:
https://brainly.com/question/15055849
#SPJ1

6.6 code practice question 2? 4 adjacent circles one

Answers

We have to create a program that draws an image of concentric circles with the help of canvas  and frame using python.

Codding strucute of the given problem:

import simplegui

def draw_handler(canvas):

  canvas.draw_circle((200, 130), 90, 5, "Green")

  canvas.draw_circle((200, 130), 70, 5, "Green")

  canvas.draw_circle((200, 130), 50, 5, "Green")

  canvas.draw_circle((200, 130), 30, 5, "Green")

  canvas.draw_circle((200, 130), 10, 5, "Green")

frame = simplegui.create_frame('Circle', 600, 600)

frame.set_canvas_background("White")

frame.set_draw_handler(draw_handler)

frame.start()

To know more about Python, visit: https://brainly.com/question/26497128

#SPJ1

SMCS School has hired you to set up an Internet connection within the school premises. The Internet connection will be utilized by both the junior and senior sections of the school situated in two different buildings on the same campus. Which of the following types of networks will you install in this scenario?

Answers

The network that will be install in the school premises and will be utilized by both the junior and senior sections of the school situated in two different buildings on the same campus is CAN (Campus Area Network).

Different Type of Networks:

Option 1 : MAN

Metropolitan Area Network is used to set up an Internet connection within the city.

So, this is the wrong option.

Option 2: WAN

Wide Area Network is used to setup an internet connection over a state, province or country.

So, this is the wrong option.

Option 3: CAN

Campus area network is used to setup internet connection within a limited geographical area like school campus, university campus etc. Given scenario is, the Internet connection will be utilized by both the junior and senior sections of the school situated in two different buildings on the same campus. When internet connection is to be used within the campus i.e., between two or three buildings then campus Area Network must be used there.

So, this is the Correct answer.

Option 4: LAN

Local Area Network is used to setup internet connection over the smallest area such as one school building, college buliding but not within the overall campus.

So, this is the wrong option.

To know more about network, visit: https://brainly.com/question/1167985

#SPJ1

One of the four function of Information.
Security
is called

Answers

Answer:

The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

The 4 functions of Information Security:It protects the organisation's ability to function.It enables the safe operation of applications implemented on the organisation's IT systems.It protects the data the organisation collects and uses.It safeguards the technology the organisation uses.

Downloading what appears to be a legitimate app, a user installs malware which contains keylogging software. What type of breach is the downloading of malware?
CIA Traid -
explain

Answers

Downloading what appears to be a legitimate app, a user installs malware which contains keylogging software. The type of breach that this downloading of malware is  called option B: integrity.

What is CIA Traid about?

The CIA triad, also known as confidentiality, integrity, and availability, is a concept created to direct information security policies inside a company. To avoid confusion with the Central Intelligence Agency, the approach is sometimes frequently referred to as the AIC triad (availability, integrity, and confidentiality).

Note that In the event of a cyber breach, the CIA triad offers organizations a clear and thorough checklist to assess their incident response strategy. The CIA trio is particularly crucial for identifying vulnerability sources and aiding in the investigation of what went wrong once a network has been infiltrated.

Learn more about malware from

https://brainly.com/question/399317
#SPJ1

See full question below

Downloading what appears to be a legitimate app, a user installs malware which contains keylogging software. What type of breach is the downloading of malware?

answer choices

Confidentiality

Integrity

A research scholar has to work as a judge and derive the truth and not as a pleader who is only eager
to prove his case in favour of his plaintiff. Discuss the statement pointing out the objectives of
research.

Answers

A research scholar is a person who focuses primarily and is practical to affect changes in the world, not a judge in which he proves something.

Who is a researcher?

Someone who conducts research is a researcher. This signifies that the person conducts one type of research on a certain topic, which also suggests that only some previously acquired knowledge may be further examined.

The responsibilities of a scholar include: assisting freshmen in learning various cutting-edge approaches to keep graduates current with the area. it is to take control of the group's research, production, and statistical activities. to examine their research and make sure it is original and free of plagiarism.

Learn more about researcher, here:

https://brainly.com/question/14693819

#SPJ1

Write a java program to find the average of any three numbers.​

Answers

import java.util.Scanner;

public class JavaExample {

public static void main(String[] args)

{

Scanner scan = new Scanner(System.in);

System.out.print("Enter the first number: ");

double num1 = scan.nextDouble();

System.out.print("Enter the second number: ");

double num2 = scan.nextDouble();

System.out.print("Enter the third number: ");

double num3 = scan.nextDouble();

scan.close();

System.out.print("The average of entered numbers is:" + avr(num1, num2, num3) );

}

public static double avr(double a, double b, double c)

{

return (a + b + c) / 3;

}

}

The output is attached to the answer. You can also check it..

Below you can see stringSize, which is implemented in Java

Answers

It will return correct values as it will iterate until the length is met (and therefore i is not less than s.length() but is equal to s.length). It is poorly designed as s.length() can be used directly to obtain the number of characters in a string. This function likely has a Big O notation greater than O(n) because - due to the unnecessary loop - it has to iterate again. It also increments size multiple times instead of mutating it once when the for loop is finished to reduce on read/write time

The sequence [tex]x_{n}[/tex] is defined, for n > 2, by the recursive formula

[tex]x_{n}[/tex] = [tex]2x_{n - 1}[/tex] + [tex]x_{n - 2}[/tex] where [tex]x_{1}[/tex] = 2 and [tex]x_{2}[/tex] = 3.

Write a program that first invites the user to input a natural number n. Then compute the n-th number in the sequence [tex]x_{n}[/tex] and display it appropriately to the user.

(The solution has to be in the Python programming language!)

Answers

Using the knowledge of the computational language in python it is possible to write a code that write a program that first invites the user to input a natural number n.

Writting the code:

def func(n):

   

   # Base cases:

   # When n reaches 1 then return 2 as X1 = 2.

   if(n == 1):

       return 2

   

   # When n reaches 2 then return 3 as X2 = 3.

   if(n == 2):

       return 3

     

   ans = 2 * func(n-1) + func(n-2)

      return ans

n = int(input("Enter a natural number: "))

print("The" ,n,"-th number of the sequence is: " ,func(n))

See more about python at brainly.com/question/18502436

#SPJ1

17 Can you determine Lack of Encryption and Security Misconfiguration in an organisation?

Answers

It is possible for the person to determine the lack of Encryption and Security Misconfiguration in an organization.

What do you mean by Security misconfiguration?

Security misconfiguration may be defined as a type of security control that is significantly configured or left insecure inaccurately by putting your systems and data at risk. It may arise when essential security settings are either not implemented or implemented with errors.  

A lack of encryption and security misconfiguration is easily determined by the employees of an organization. It may cause a potential threat to the organization by stealing all its personal and confidential information that harms the whole institution or organization.

Therefore, it is possible for the person to determine the lack of Encryption and Security Misconfiguration in an organization.

To learn more about Security misconfiguration, refer to the link:

https://brainly.com/question/29095078

#SPJ1

5. Define a procedure “DistanceBetweenTwoPoints” that will take four paramaters x1, y1, x2
and y2 and will calculate the distance between these two points using the formula
√((x2 – x1)² + (y2 – y1)²). You must use the SquareRoot function you defined previously.
[10 points]

Test case:
> (DistanceBetweenTwoPoints 2 5 3 2)
3.1622776601683795
Can anyone please help me to write this procedure in Scheme Language? I am stuck! Please help!

Answers

Using the knowledge in computational language in JAVA it is possible to write the code that define a procedure “DistanceBetweenTwoPoints” that will take four paramaters x1, y1, x2 and y2.

Writting the code:

package org.totalbeginner.tutorial;

public class Point {

   public double x;

   public double y;

   Point(double xcoord, double ycoord){

       this.x = xcoord;

       this.y = ycoord;

   }

   public double getX() {

       return x;

   }

   public double getY() {

       return y;

   }    

}

package org.totalbeginner.tutorial;

public class Line {

   double x;

   double y;

   Point p1 = new Point(2.0,2.0);

   Point p2 = new Point(4.0,4.0);

   Point mp = new Point(x,y);

   public void midpoint() {

       x = (p1.getX() + p2.getX()) / 2;

       y = (p1.getY() + p2.getY()) / 2;

   }

See more about JAVA at brainly.com/question/12975450

#SPJ1

1. Design and implement a class dayType that implements the day of the week in a program. The class dayType should store the day, such as Sun for Sunday. The program should be able to perform the following operations on an object of type dayType:

a. Set the day.
b. Print the day.
c. Return the day.
d. Return the next day.
e. Return the previous day.
f. Calculate and return the day by adding certain days to the current day. For example, if the current day is Monday and we add 4 days, the day to be returned is Friday. Similarly, if today is Tuesday and we add 13 days, the day to be returned is Monday.
Add the appropriate constructors.

2. Also, write a program to test various operations on this class .

Answers

Using the knowledge in computational language in C++ it is possible to write the code that design and implement a class dayType that implements the day of the week in a program.

Writting the code:

#include "stdafx.h"

#include<iostream>

#include<cmath>

sing namespace std;

class dayType

{

public: int presday;

int prevday;

int nextday;

dayType()

presday = 0;

nextday = 0;

prevday = 0;

}

void set(int day); //function declarations

void print(int day);

int Next_day(int day);

int day();

int prev_day(int pres);

};

void dayType::set(int day) //member functions

{

presday = day;

}

/* modify here*/

int dayType::prev_day(int day)

{

prevday = presday - day;// =abs(presday-day);

if (prevday<0)prevday += 7;

return prevday;

}

int dayType::day()

{

return presday;

}

int dayType::Next_day(int day)

{

nextday = presday + day;

if (nextday>7)

{

nextday = nextday % 7;

}

return nextday;

}

void dayType::print(int d)

{

if (d == 1)

cout << "Monday" << endl;

if (d == 2)

cout << "Tuesday" << endl;

if (d == 3)

cout << "Wednesday" << endl;

if (d == 4)

cout << "Thursday" << endl;

if (d == 5)

cout << "Friday" << endl;

if (d == 6)

cout << "Saturday" << endl;

if (d == 7)

cout << "Sunday" << endl;

}

/* here modify change void to int type */

int main()

{

int d, p, n;

dayType obj;

cout << "1-Mon" << endl << "2-Tue" << endl << "3-Wed" << endl << "4-Thur" << endl << "5-Fri" << endl << "6-Sat" << endl << "7-sun" << endl;

cout << "Enter Day";

cin >> d;

obj.set(d);

cout << "Present day is";

obj.print(d);

cout << "Enter number of days next";

cin >> d;

n = obj.Next_day(d);

cout << "Next day is";

obj.print(n);

cout << "Enter number of days previous";

cin >> d;

p = obj.prev_day(d);

cout << "previous day is";

obj.print(p);

system("Pause");

return 0;

}

See more about C++ at brainly.com/question/29225072

#SPJ1

help help help help....​

Answers

Answer:redo reload copy cut paste bullet list highlight bold numbered list center right left.

Explanation:

That's all I can help with right now

Write an SQL statement to display for every restaurant the name of the restaurant (where the name of the restaurant consists of more than 10 characters) and for every category of menu item its description (catdesc). Furthermore, display the average; cheapest or lowest; and highest or most expensive price of all menu items in that category at that restaurant. Use single row functions to format all the prices. The average price must be padded; the cheapest price must be rounded; but the highest price must not be rounded. Display only those menu items of which the average item price is more than R40. Sort your results according to the restaurant names and for every restaurant from the most expensive average menu item to the cheapest average menu item. Display your results exactly as listed below.

Answers

Using the knowledge in computational language in SQL it is possible to write the code that display for every restaurant the name of the restaurant  and for every category of menu item its description.

Writting the code:

INSERT INTO Dish Values(13, 'Spring Rolls', 'ap');

INSERT INTO Dish Values(15, 'Pad Thai', 'en');

INSERT INTO Dish Values(16, 'Pot Stickers', 'ap');    

INSERT INTO Dish Values(22, 'Masaman Curry', 'en');  

INSERT INTO Dish Values(10, 'Custard', 'ds');  

INSERT INTO Dish Values(12, 'Garlic Bread', 'ap');    

INSERT INTO Dish Values(44, 'Salad', 'ap');    

INSERT INTO Dish Values(07, 'Cheese Pizza', 'en');  

INSERT INTO Dish Values(19, 'Pepperoni Pizza', 'en');    

INSERT INTO Dish Values(77, 'Veggie Supreme Pizza', 'en');

INSERT INTO MenuItem Values(0, 0, 13, 8.00);

INSERT INTO MenuItem Values(1, 0, 16, 9.00);

INSERT INTO MenuItem Values(2, 0, 44, 10.00);

INSERT INTO MenuItem Values(3, 0, 15, 19.00);

INSERT INTO MenuItem Values(4, 0, 22, 19.00);

INSERT INTO MenuItem Values(5, 3, 44, 6.25);

INSERT INTO MenuItem Values(6, 3, 12, 5.50);

INSERT INTO MenuItem Values(7, 3, 07, 12.50);

INSERT INTO MenuItem Values(8, 3, 19, 13.50);

INSERT INTO MenuItem Values(9, 5, 13, 6.00);

INSERT INTO MenuItem Values(10, 5, 15, 15.00);

INSERT INTO MenuItem Values(11, 5, 22, 14.00);

See more about SQL atbrainly.com/question/13068613

#SPJ1

What is output by the following code? Select all that apply.

c = 0
while (c < 11):
c = c + 6
print (c)

Answers

When the above code is entered into the Python online compilers and run, the output is 12.

What is an online compiler?

An online compiler is a technology that allows you to build and run source code in a variety of computer languages online. For program execution, an online compiler is required. It translates the text-based source code into an executable form known as object code.

The print() function sends the specified message to the screen or another output device. The message can be a string or another object that is converted to a string before being shown on the screen.

Hence, where:

c = 0

while (c < 11):

 c = c + 6

print (c)

Output = 12

Learn more about compilers:
https://brainly.com/question/27882492
#SPJ1

You wrote a pseudocode outline of your program using comments. Which character do you use to indicate a line is a comment? O # O/ O& O"​

Answers

It depends on the coding language but assuming you’re studying Python the correct way to comment is with # symbol

What does it mean to say,"we are in a post-PC world?"

Answers

Answer:

The use of mobile devices rather than only desktop computers for games, Internet access, general computing and as a terminal to the corporate network. We are in the post-PC era today.

when computer and communications are combined, the result is information and cominiations Technology (true or false)​

Answers

Answer: When computer and communication technologies are combined the result is Information technology.

Explanation: This is a technology that combines computation with high-speed data, sound, and video transmission lines. All computer-based information systems utilized by companies, as well as their underlying technologies, are referred to as information technology.

As a result, information technology encompasses hardware, software, databases, networks, and other electronic gadgets.

IT refers to the technological component of information systems, making it a subsystem of information systems.

Information systems, users, and administration would all be included in a broader definition of IT.

Many organizations rely on IT to support their operations, since IT has evolved into the world's primary facilitator of project activities. IT is sometimes utilized as a catalyst for fundamental changes in an organization's structure, operations, and management. This is because of the capabilities it provides for achieving corporate goals.

These competences help to achieve the following five business goals:

Increasing productivity,

lowering expenses,

improving decision-making,

improving customer interactions, and

creating new strategic applications.

Welcome to Gboard clipboard, any text that you copy will be saved here.​

Answers

Answer: Welcome to Gboard clipboard, any text you copy will be saved here.

Can someone help me out with a code. Code's in python write a function that returns the longest common prefix of two strings. For example, the longest
common prefix of distance and disinfection is dis. The header of the method is:
def prefix(s1, s2)
If the two strings have no common prefix, the method returns an empty string.
Write a main function that prompts the user to enter two strings and displays their common
prefix.
here's what I have currently but its not working.
def longestCommonPrefix(self, arr):

arr.sort(reverse = False)
print(arr)
n= len(arr)
str1 = arr[0]
str2 = arr[n-1]

n1 = len(str1)
n2 = len(str2)
result = ""
j = 0
i = 0

while(i <= n1 - 1 and j <= n2 - 1):
if (str1[i] != str2[j]):
break
result += (str1[i])

i += 1
j += 1

return (result)

Answers

Just 10 lines of code.

from functools import reduce

list = []

def compare():

   calc = [reduce(lambda a, b: a if a == b else None, x) for x in zip(*list)] + [None]

   return list[0][:calc.index(None)]

   

list.append(input("Enter the first string: "))

list.append(input("Enter the second string: "))

print(compare())

Tech A says that it is usually better to pull a wrench to tighten or loosen a bolt. Tech B says that
pushing a wrench will protect your knuckles if the wrench slips. Who is correct?

Answers

Tech A is correct because pulling a wrench to tighten or loosen a bolt secures it to the bolt threading, reducing the possibility of it slipping.

How to tighten nuts and bolts?

Place your socket on the wrench's head. To begin using your torque wrench, insert a socket that fits your nut or bolt into the torque wrench's head. If you have an extender or adaptor, you can insert it into the opening at the head instead.

Hand-tighten the nut or bolt until it catches the threading on the screw. Place the nut or bolt to be tightened over the threading for the screw or opening on your vehicle by hand. Turn the nut or bolt on the vehicle clockwise with your fingers until the threading on the screw catches. Turn the nut or bolt until it can no longer be turned by hand.

Place the wrench on top of the nut or bolt being tightened. Hold the torque wrench handle in your nondominant hand while the nut or bolt is set on the threading.

Tighten the nut or bolt by turning the handle clockwise. When the wrench starts clicking or stops moving, stop turning it.

To know more about wrench and bolts, kindly visit: https://brainly.com/question/15075481

#SPJ1


Cloud computing is an example of a social networking site

Answers

Answer: no

Explanation:

cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet

No, cloud computing is not an example of a social networking site. Cloud computing refers to the delivery of computing services, including storage, databases, software, and networking, over the internet.

It involves the use of remote servers hosted on the internet to store, manage, and process data, rather than relying on local servers or personal devices.

On the other hand, social networking sites are web platforms that enable users to create profiles, connect with others, and share content, ideas, and interests.

While both cloud computing and social networking sites are technology-related concepts, they serve different purposes.

Cloud computing focuses on the delivery of computing services, while social networking sites focus on facilitating social interactions and content sharing among users.

Thus, the given statement is false.

For more details regarding cloud computing, visit:

https://brainly.com/question/30122755

#SPJ6

What percent of 2.5 hours decrease to 1 hour

Answers

Answer: 60% decrease

Explanation:

How to calculate percentage decrease:

Subtract starting value minus final value

Divide that amount by the absolute value of the starting value

Multiply by 100 to get percent decrease

If the percentage is negative, it means there was an increase and not an decrease.

Percentage Decrease Formula

You can use the percentage decrease formula for any percent decrease calculation:

Percentage Decrease=Starting Value−Final Value|Starting Value|×100

Example Problem: Percentage Decrease

You have a lamp with a 60-watt traditional light bulb. Your lamp uses 60 watts of electricity per hour. You're considering replacing the bulb with an LED light bulb that uses 8 watts of electricity per hour. What is the percentage decrease in the lamp's hourly energy use if you switch to an LED light bulb?

Percentage Decrease = [ (Starting Value - Final Value) / |Starting Value| ] × 100

60 - 8 = 52

52 / 60 = 0.8667

0.8667 × 100 = 86.67%

So if you switch to an LED light bulb your lamp will use 86.67% less energy per hour.

Related Calculators

Answer:

40%

Explanation:

Whenever we find "x" percent of a number, we simply multiply by "x/100", because "percent" just means "per 100".

We can divide the 2.5, by 100 to see how many "groups" of 100 are in 2.5, which gets us, 0.025.

Now we multiply this by some value, which will be our percent, to get "1"

So we have the equation: [tex]0.025 * x = 1[/tex]

Dividing both sides by 0.025 gives us: [tex]x=40[/tex]

so our percentage would be 40.

But generally whenever you solve these problems you convert the "percentage" to a "decimal" by dividing the percentage by 100.

So finding "x" percent of "a", can be calculated by: [tex]a*\frac{x}{100}[/tex]

and from here you would calculate the value with the givens.

What is output by the following code? Select all that apply.

c = 2




while (c < 12):

print (c)
c = c + 3

Answers

When the above code is run via a compiler, the output will be 5.

What is code in programming?

In computer programming, computer code is a set of instructions or a set of rules expressed in a specific programming language (i.e., the source code). It is also the name given to source code after it has been compiled and is ready to execute on a computer.

The print() method outputs the message supplied to the screen or another standard output device. The message can be a string or any other object, which will be transformed to a string before being displayed on the screen.

When the above code is correctly entered into the compiler and rightly indented, the output given is 5.

Learn more about compilers:
https://brainly.com/question/27882492

#SPJ1

Problem: A company wants a program that will calculate the weekly paycheck for an employee based on how many hours they worked. For this company, an employee earns $20 an hour for the first 40 hours that they work. The employee earns overtime, $30 an hour, for each hour they work above 40 hours.

Example: If an employee works 60 hours in a week, they would earn $20/hr for the first 40 hours. Then they would earn $30/hr for the 20 hours they worked overtime. Therefore, they earned: ($20/hr * 40hrs) + ($30/hr * 20 hrs) = $800 + $600 = $1400 total.

For this assignment, you must create pseudocode and a flowchart to design a program that will calculate an employee’s weekly paycheck.

Write pseudocode to design a programming solution by outlining a series of steps and using appropriate indentation and keywords. As you write your pseudocode, be sure to consider the following:
What input does the computer need?
What steps does the program need to follow to process the input? What output should result?
When might you need to use decision branching? If you used decision branching, did you account for all possible input values?
Did you use appropriate indentation and keywords (such as IF, ELSE, CALCULATE, and so on) throughout your pseudocode?
Create a flowchart to design a programming solution by organizing a series of steps and using appropriate symbols and arrows. As you create your flowchart, be sure to use appropriate arrows and symbols for each of the following:
Start and end points
Input and output
Decision branching
Processing steps
Note: You may find the correct shapes to create your flowchart on the Insert menu in Microsoft Word. Or you may draw your flowchart by hand, take a clear picture, and insert the picture into your Word document. Use the add shapes or insert pictures tutorials to help you. You could also use a flowcharting tool that you are familiar with, such as Lucidchart, if you prefer.

Answers

Using the knowledge in computational language in pseudocode  it is possible to write a code that programming solution by outlining a series of steps and using appropriate indentation and keywords.

Writting the code:

h = int(input('Enter hours '))

rate = 20

if h <= 40:

   pay = h * rate

elif h > 40:

   pay = ((h-40) * rate * 1.5) + rate * 40

print("Your pay is %.2f" % pay)

Set hourly rate to 20

Input hours worked

If hours worked is under 40

   Compute hours worked times hourly rate equals pay

Else hours worked is over 40

   Compute ?

Endif

Print pay

See more about pseudocode at brainly.com/question/12975450

#SPJ1

how do you think the internet and social media will impact global communities in the next five years?

Answers

I do think that the internet and social media will impact global communities in the next five years as it will bring about huge growth in the nations economy and also more improvement in the healthcare system.

What is social media, and how does it affect the neighborhood?

In actuality, social media can be advantageous for society. People may connect and their relationships may become deeper as a result. Student learning and development are also encouraged by social media. Additionally, it can help firms grow their clientele and increase their revenue.

Therefore, Future communication will be based on the framework established by what is currently referred to as social media, but it will look very different. By 2033, the amount of data that will be accessible to everyone as well as its ability to influence decisions will have undergone the most significant change.

Learn more about social media  from

https://brainly.com/question/3653791

#SPJ1

Write a function so that the main() code below can be replaced by the simpler code that calls function MphAndMinutes ToMiles().
Original main):
int main()
double milesPerHour;
double minutesTraveled;
double hoursTraveled;
double milesTraveled;
cin >> milesPerHour;
cin >> minutesTraveled;
hoursTraveled minutesTraveled / 60.0;
milesTraveled - hoursTraveled * milesPerHour;
cout ‹< "Miles:
<< milesTraveled ‹‹ endl;
return 0;

Answers

#include <iostream>

double mph_and_minutes_to_miles(double mph, double min) {

   return mph*double(min/60);

}

int main(int argc, char* argv[]) {

   double imph, imin; std::cin>>imph>>imin;

   std::cout << "Miles: " << mph_and_minutes_to_miles(imph,imin) << std::endl;

   return 0;

}

Ask the user to think of a number between zero and one hundred. Your goal is to guess the number in as few guesses as possible. The user will inform you if you guessed too high, low or correct. Start by always guessing the middle number 50. If the user informs you it’s too low, then try 75. If 50 was too high, then try 25. Always guess the middle of the range of numbers left. In doing so, the range of numbers will be cut in half after each guess. If done correctly, no more than 7 guesses are needed. Print out “you cheated” if you reach 7 guesses and are still wrong.

Answers

A program in Python that asks the user to think of a number between zero and one hundred and tries to guess the number in as few guesses as possible is given below:

The Program

import random

import math

# Taking Inputs

lower = int(input("Enter Lower bound:- "))

# Taking Inputs

upper = int(input("Enter Upper bound:- "))

# generating random number between

# the lower and upper

x = random.randint(lower, upper)

print("\n\tYou've only ",

round(math.log(upper - lower + 1, 2)),

" chances to guess the integer!\n")

# Initializing the number of guesses.

count = 0

# for calculation of minimum number of

# guesses depends upon range

while count < math.log(upper - lower + 1, 2):

count += 1

# taking guessing number as input

guess = int(input("Guess a number:- "))

# Condition testing

if x == guess:

 print("Congratulations you did it in ",

  count, " try")

 # Once guessed, loop will break

 break

elif x > guess:

 print("You guessed too small!")

elif x < guess:

 print("You Guessed too high!")

# If Guessing is more than required guesses,

# shows this output.

if count >= math.log(upper - lower + 1, 2):

print("\nThe number is %d" % x)

print("\tBetter Luck Next time!")

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1

Secure websites use technology that scrambles the information you send. This is known as
A. hacking.
B. encryption.
C. padlocking.
D. digital media.

Answers

Answer:

B. Encryption.

Explanation:

Encryption encrypts data so that it can not be understood if/when it is intercepted by a third party between the sender and the recipient.

For example, if you're encrypting via the keyword vanilla, and then sending an email to Bob saying "Hi Bob", it would get encrypted as something like Vjh D5xx. The recipient would then use the keyword vanilla to decrypt this message so they can read it as Hi Bob. Anyone who intercepts this wouldn't have the keyword, and would just see incoherent letters, numbers, and symbols that they couldn't make heads or tails of.

Secure websites use technology that scrambles the information you send. This is known as, Encryption. So, the correct option is B.

Given that,

Secure websites use technology that scrambles the information you send.

Since, Secure websites use encryption technology to scramble the information you send, ensuring that it remains secure and protected during transmission.

Encryption involves the use of mathematical algorithms to transform data into an unreadable format, making it extremely difficult for unauthorized parties to access or understand the information.

This is a fundamental method used to safeguard sensitive data on the internet.

So, Option B is true.

To learn more about Encryption visit:

https://brainly.com/question/30408255

#SPJ6

Write the following short piece of code in python:

Answers

Programmers refer to a brief section of reusable source code, machine code, or text as a “snippet.” These are typically explicitly defined operational units that are integrated into bigger programming modules.

What are the short piece of code in python?

Guido van Rossum created Python, an interpreted, object-oriented, high-level programming language with dynamic semantics. It was first made available in 1991.

The syntax of Python is straightforward and resembles that of English. Python's syntax differs from various other programming languages in that it enables programmers to construct applications with fewer lines of code.

Therefore, Python operates on an interpreter system, allowing for the immediate execution of written code. As a result, prototyping can proceed quickly.

Learn more about python here:

https://brainly.com/question/10718830

#SPJ1

Other Questions
9(9-10r)+(-8-2r)I don't know how much to do this I need help Find the values of x and y. Implication if the intellectual property rights do not exist using cluesnfrom the movie, place the events in cronological order 20Thomas's job is pretty stressful. He lives in France and his job responsibilities include things like coordinating housing assignments for embassyworkers and handing any disputes between the embassy, those who work for the embassy, and French citizens. Now he is preparing for a meetingwith embassy officials from Germany and Italy. What job does Thomas MOST likely have?O A.O C.O D.diplomatambassadormediumentrepreneur alma won a beauty contest and received $7000 in cash. in 3 years, when alma turns 21, she wishes to go to las vegas. her parents agree to pay for her hotel and air. but she needs spending cash. her credit union will pay 6% per year compounded quarterly. how much will alma have for her trip when she turns 21, if she invests her money in this account? what morphological features have traditionally been used to classify animals, but are now recognized as being less useful in determining evolutionary relationships than originally thought In the middle of a park, there is a fenced off area in the shape of a square with an area of 225 yards. What is the side length of the square? What is the perimeter of the fenced off area? what is a peremiter molecular hydrogen effuses 4.0 times as fast as gas x at the same temperature. what is the molar mass of gas x? Which equation below represents the Exponent Property of Logs? Examine this set of Pythagorean triples. Look for a pattern that is true for each triple regarding the difference between the three values that make up the triple.Describe this pattern. Then see if you can think of another Pythagorean triple that doesnt follow the pattern you just described and that cant be generated using the identity . Explain your findings.x-value Pythagorean Triple3 4 5 6 720 divided by 50 gives the same answer as x divided by 100what is the value of X The three gorges dam is rated at 22.5 gwe maximum output. if its generating efficiency is 90% and its head is 81 m, what is the rate of flow (in kg/s) of water through its turbines at maximum output? use e for exponent; for e.g. 3x10^8 should be written as 3e8. If f(x) = e/x then f(x)= what happens when hydrogen peroxide is added to a catalase-positive culture? what is the appearance of the catalase-negative culture when hydrogen peroxide is added? if the standard deviation of demand is 10 and the desired service level is 0.90, then what is the safety stock? group of answer choices 23.3 16.5 12.8 9 10 2.1 & 2.2 Assessment: Vertex & Standard Form of Quadratic FunctionsWhat is the equation, written in vertex form, of a parabola with a vertex of (1, -9) thatpasses through the point (2, -7)?The equation of the parabola in vertex form is _______________ Observe a live classroom for at least 2 hours. Here are some things to look for; interactions between students and teachers, classroom expectations, classroom culture. Write a one-page summary of what you observe. The main function of prop roots in mangroves is toA. aerate the plantB. produce and store foodC. keep mangroves uprightD. absorb water far below the earth PLEASE HELP I WILL GIVE BRAINLIESTFind x and y*image is linked below*