Professional: Using social media to advertise a company you created
Unprofessional: Using social media to watch cat videos
The professional use of social media involves the use for job posting, while the unprofessional use involves watching videos.
What is social media?A social media is given as the network that forms the connections of the individuals over the internet. It enables the user to connect irrespective of borders.
The use of social media has been professional and unprofessional both. The professional use of social media involves the use for job posting, while the unprofessional use involves watching videos.
Learn more about social media, here:
https://brainly.com/question/9564823
#SPJ5
explain the concepts of sampling and sampling rate
Which of the following is the main federal law protecting job applicants against discrimination based on race, color, religion, national origin,
disability, or genetic information?
The main federal law protecting job applicants against discrimination based on race, color, religion, national origin, disability, or genetic information is Title VII. The correct option is c.
What is Title VII of federal law?Federal laws are standards that have been evaluated by both legislatures of Congress, have the signature of the president, have counteracted the president's vote, or have otherwise been given the go-ahead to become a legal document.
Employment discrimination based on racial, ethnic, religious, sexual, and national origin is illegal under Title VII.
Therefore, the correct option is c. Title VII.
To learn more about federal law, refer to the link:
https://brainly.com/question/14443349
#SPJ9
The question is incomplete. The missing options are given below:
a. Title I
b. Title IV
c. Title VII
d. Title III
10. Question
Which statement is true about computer security?
Answer:
they cannot share your privacy with others without your concern
3. In relationship to the four ways of knowing, explain how "authority" and "science" may simultaneously operate.
Answer:
The summary of given question is summarized in the below segment.
Explanation:
Authority was among the most prevalent means of information acquisition. It entails the development of innovative concepts that the appropriate authorities have said are correct.
Individuals prefer to trust knowledge like this one that no one has any time to investigate every deep understanding we choose to gain via authoritative autonomously.
Numerous scientists' hypotheses were affirmed to be true. But when such statements are proven to be incorrect, they merely lead to misconceptions and therefore also impede the growth of these kinds of fields.
For this activity, you will practice being both proactive and reactive to bugs. Both are necessary to get rid of errors in code.
Proactive:
Log in to REPL.it and open your Calculator program that you built in Unit 5.
In the index.js file, type and finish the following block of code that validates the input to make sure both are numbers (not letters or symbols):
try{
if (isNaN(…) || isNaN(…)){
throw …
}
else{
document.getElementById("answer").innerHTML = num1 + num2;
}
}
catch(e){
document.getElementById("answer")…
}
(Note: The || symbol is used in JavaScript to mean or . You can find this key to the left of the Z key if you’re using a PC or directly above the Enter key if you’re using a Mac.)
Add the finished code above to the correct place in your add() function. Make sure to delete this line since we moved it into the try block:
document.getElementById("answer").innerHTML = num1 + num2;
Paste the same code into the subtract() , multiply() , and divide() functions, making the necessary changes. Be careful with your divide() function since you already have an extra if else statement checking for a division by 0 mistake. (Hint: Cut and paste the entire if else statement inside the else block of your try statement.)
Test your program by typing in letters or symbols instead of numbers. Make sure you get the appropriate error message. (Note: The function is not supposed to check whether the text field is empty, only whether it contains non-numbers.)
When you are finished, share the link to your webpage with your teacher by clicking on the share button and copying the link.
Reactive:
The following Python program should print the sum of all the even numbers from 0 to 10 (inclusive), but it has two bugs:
x = 0
sum = 0
while x < 10:
sum = sum + x
x = x + 1
print(sum)
Complete a trace table and then write a sentence or two explaining what the errors are and how to fix them. You can choose whether to do the trace table by hand or on the computer. Turn in your trace table and explanation to your teacher.
Answer:
okk
Explanation:
Can anyone please help me out
Answer:
No se ve nada
Which of the following is not a recognized cabling type for horizontal cabling as per the ANSI/TIA standards?A) STPB) Fiber optic cableC) UTPD) Patch cable
UTP, STP, and fibre optics are recognised by TIA/EIA; coaxial is not.
Which of the following doesn't qualify as a backbone cable according to the TIA?It should be noted that the ANSI/TIA-568-C version of the standard does not recognise coaxial cabling. The wall outlet, also known as the telecommunications outlet, is where the horizontal cable terminates in the work area. Users and communication devices are connected to the structured-cable infrastructure in the work area.
What is the longest horizontal cable that can be used?The horizontal separation must not exceed 76 metres (250 feet). Cable trays are the recommended method for distributing the horizontal wire from the telecommunications room to the communication outlets because they make cable installation simple and allow for future extension in hallways or significant distribution routes.
To know more about UTP visit:-
https://brainly.com/question/14959702
#SPJ1
Are the blank space around the edges of the page
Answer:
The blank space around the edges of a sheet of paper — as with the page of a book — that surrounds the text is called the margin.
In 2019, the tuition for a full time student is $7,180 per semester. The tuition will be going up for the next 7 years at a rate of 3.5% per year. Write your program using a loop that displays the projected semester tuition for the next 7 years. You may NOT hard code each years tuition into your program. Your program should calculate the tuition for each year given the starting tuition in 2019 ($7, 180) and the rate of increase (3.5%). You should then display the actual year (2020, 2021, through 2026) and the tuition amount per semester for that year
Answer:
In Python:
tuition = 7180
year = 2019
rate = 0.035
for i in range(2019,2027):
print(str(year)+": "+str(round(tuition,2)))
tuition = tuition * (1 + rate)
year = year + 1
Explanation:
This initializes the tuition to 7180
tuition = 7180
This initializes the year to 2019
year = 2019
This initializes the rate to 3.5%
rate = 0.035
This iterates through years 2019 to 2026
for i in range(2019,2027):
This prints the year and tuition
print(str(year)+": "+str(round(tuition,2)))
This calculates the tuition
tuition = tuition * (1 + rate)
This increments year by 1
year = year + 1
What is the best way to display numbers that are outliers as well as the mean
(4, 1, 3, 10, 18, 12, 9, 4, 15, 16, 32)
Stem and leaf plots would be the best choice to display numbers that are outliers as well as the mean.
What do you mean by Stem and leaf plot?A stem and leaf plot may be defined as a type of technique that is significantly used to classify either discrete or continuous variables. This is used to organize data as they are collected.
A stem and leaf plot looks something like a bar graph. Each number in the data is broken down into a stem and a leaf. These types of techniques are useful for displaying the relative density and shape of the data, giving the reader a quick overview of the distribution.
They retain the raw numerical data, often with perfect integrity. They are also useful for highlighting outliers and finding the mode.
Therefore, stem and leaf plots would be the best choice to display numbers that are outliers as well as the mean.
To learn more about stem and leaf plots, refer to the link:
https://brainly.com/question/8649311
#SPJ1
Your question seems incomplete. The most probable complete question is as follows;
What is the best way to display numbers that are outliers as well as the mean (4, 1, 3, 10, 18, 12, 9, 4, 15, 16, 32)?
Pie chart.Bar graph.Stem and leaf plot.Venn diagram.Luke is setting up a wireless network at home and is adding several devices to the network. During the setup of his printer, which uses 802. 11g standard, he finds that he can't connect to the network. While troubleshooting the problem, he discovers that his printer is not compatible with the current wireless security protocol because it is an older version of hardware.
What wireless network security protocol will allow Luke to use the printer on his wireless network?
a. WPA
b. WEP
c. WPA2
d. WPA-PSK+WPA2-PSK
The wireless network security protocol that will allow Luke to use the printer on his wireless network is WEP. The correct answer is option b.
WEP (Wired Equivalent Privacy) is a security protocol that is used to secure wireless networks. It was introduced in 1999 and was widely used in the early days of wireless networking. However, it is an older version of hardware and is considered less secure than newer protocols such as WPA (Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access 2).
Since Luke's printer is an older version of hardware, it is not compatible with the current wireless security protocol. Therefore, using WEP will allow Luke to use the printer on his wireless network.
Learn more about wireless network security:
brainly.com/question/30087160
#SPJ11
Su now wants to highlight several inventors in her presentation, so she decides to use the underline color option.
Which tab should su use?
Which command group should she navigate to?
What does she click in the command group to open the Font dialog box?
Under which heading would the underline color menu be found?
Answer:
1) Home
2) Font
3) the arrow at the bottom right
4) All Text
Explanation:
Answer:
1. home
2. font
3. the arrow at the bottom right
4. all text
Explanation:
It is important to create a strong password because it will
let someone steal your personal information
allow your friends to easily guess it
keep your private information safe and secure
give your computer a virus
What does the Address Resolution Protocol do?
Answer: It is used to map MAC addresses to IP addresses.
Explanation: <3
what is the program used to send and receive emails
The program used to send and receive emails is called an email client.
A piece of software known as an email client is an application that, when used in conjunction with an email server, enables users to send and receive electronic mail.
This functionality is only available to users who have access to both the email client and the email server. Clients for sending and receiving email include a variety of programmes such as Apple Mail, Microsoft Outlook, and Mozilla Thunderbird, amongst others.
Learn more about e-mail client, here:
https://brainly.com/question/13086477
#SPJ1
>>> phrase = "abcdefgh"
>>> phrase[3:6]
Answer:
Following are the correct code to this question:
phrase = "abcdefgh"#defining a variable phrase that holds a string value
print(phrase[3:6])#use print method for slicing and print its value
Output:
def
Explanation:
In the above code, a variable "phrase" is defined that holds a string value, and use a print method, inside the method, the variable is used as a list and use slicing.
It is a characteristic that enables you to access the series parts like strings, tuples, and lists. It also uses for modifying or removing objects in series, in the above slicing it starts from 3 and ends when it equal to the 6th letter, that's why it will print "def".
What does ATM mean on lego mario mean I know that this is not school related but I trying to help my brother
Answer:
I HAVE NO IDEA-
Explanation:
match the cell reference to its definition
Answer:
which cell reference:-|
Answer:
absolute reference: the cell remains constant when copied or moved.
mixed reference: the cell has a combination of two other types of cell references.
relative reference: the cell changed based on the position of rows and columns.
Write a program that prompts a user to enter the number of elements to store in an array. Then prompt the user to enter all the numbers stored in the array.
The program should then cycle through the array to see if any numbers are divisible by 5. If any number is divisible by 5 print out which ones are and identify them in the output.
Answer:
Here's an example of a program that does what you've described:
# Get the number of elements in the array
n = int(input("Enter the number of elements to store in the array: "))
# Initialize the array
arr = []
# Get the elements of the array from the user
print("Enter the elements of the array:")
for i in range(n):
arr.append(int(input()))
# Print out which numbers are divisible by 5
print("The following numbers are divisible by 5:")
for i, x in enumerate(arr):
if x % 5 == 0:
print(f"{i}: {x}")
This program will first prompt the user to enter the number of elements in the array. It then initializes an empty array and prompts the user to enter each element of the array. Finally, it loops through the array and prints out the index and value of any element that is divisible by 5.
Explanation:
In reinforcement learning, an episode:
In reinforcement learning, an episode refers to a sequence of interactions between an agent and its environment. It represents a complete task or a single run of the learning process.
The reinforcement learningDuring an episode, the agent takes actions in the environment based on its current state. The environment then transitions to a new state, and the agent receives a reward signal that indicates how well it performed in that state. The agent's objective is to learn a policy or a strategy that maximizes the cumulative reward it receives over multiple episodes.
The concept of episodes is particularly relevant in episodic tasks, where each episode has a clear start and end point.
Read more on reinforcement learning here:https://brainly.com/question/21328677
#SPJ1
In terms of Pseudo-Code: Which of the following statements is NOT correct
Question 10 options:
A set of instruction that have to use a specific syntax
No strict set of standard notations
Is not a programming language
Easy to understand, and clear
A pseudocode is simply a false code that is used as a prototype for an actual program
The incorrect statement is option (a)
Take for instance, the following pseudocode to add two numbers
input a
input b
c = a + b
display c
Using the above pseudocode as a guide, we have the following observations
It is clear and can be easily understoodThere is no standard notation; I can decide to replace "input" with "accept", and the pseudocode will still have the same meaningFrom the definition of pseudocode, I stated that it is a prototype for an actual program.
This means that, it is not a programming language
From the above explanation, we can conclude that the correct option is (a).
This is so, because a pseudocode does not have a syntax
Read more about pseudocodes at:
https://brainly.com/question/18875548
Statistics are often calculated with varying amounts of input data. Write a program that takes any number of non-negative integers as input, and outpu
Answer:
Explanation:
The following program is written in Java and is a function that asks the user for an input and keeps doing so until a negative value is entered, in which case it calculates the average and max values and prints it to the screen.
public static void average () {
int num;
int sum = 0;
Scanner in = new Scanner(System.in);
System.out.println("Enter Number");
num = in.nextInt();
int count = 0;
int max = 0;
while(num >= 0)
{
sum+=num;
System.out.println("Enter Number");
num = in.nextInt();
count++;
if(num>=max){
max = num;
}
}
System.out.println(sum/count);
System.out.println(max);
}
Answer:hi
Explanation:
Without an app, the emergency response team would radio information back to the hospital. What are some benefits of using an app to send information in a situation like this
Theres a lot of benefits, it just depends on the situation. For example, say that person whos calling is in a trafficing situation, or kidnapping. it would give the dispacter more information than what the person could say. Or if you just got into a car accident, say all you had to do was press one button and then it sends the dispacher all of your information. Social security number, phone number, id, location, emergency contacts and more.
Input a list of employee names and salaries and store them in parallel arrays. End the input with a sentinel value. The salaries should be floating point numbers Salaries should be input in even hundreds. For example, a salary of 36,510 should be input as 36.5 and a salary of 69,030 should be entered as 69.0. Find the average of all the salaries of the employees. Then find the names and salaries of any employee who's salary is within 5,000 of the average. So if the average is 30,000 and an employee earns 33,000, his/her name would be found. Display the following using proper labels. Save your file using the naming format LASTNAME_FIRSTNAME_M08 FE. Turn in your file by clicking on the Start Here button in the upper right corner of your screen. 1.Display the names and salaries of all the employees. 2. Display the average of all the salaries 3. Display all employees that are within 5,000 range of the average.
Using the knowledge in computational language in JAVA it is possible to write the code being Input a list of employee names and salaries and store them in parallel arrays
Writting the code in JAVA:
BEGIN
DECLARE
employeeNames[100] As String
employeeSalaries[100] as float
name as String
salary, totalSalary as float
averageSalary as float
count as integer
x as integer
rangeMin, rangeMax as float
INITIALIZE
count = 0;
totalSalary =0
DISPLAY “Enter employee name. (Enter * to quit.)”
READ name
//Read Employee data
WHILE name != “*” AND count < 100
employeeNames [count] = name
DISPLAY“Enter salary for “ + name + “.”
READ salary
employeeSalaries[count] = salary
totalSalary = totalSalary + salary
count = count + 1
DISPLAY “Enter employee name. (Enter * to quit.)”
READ name
END WHILE
//Calculate average salary with mix , max range
averageSalary = totalSalary / count
rangeMin = averageSalary - 5
rangeMax = averageSalary + 5
DISPLAY “The following employees have a salary within $5,000 of the mean salary of “ + averageSalary + “.”
For (x = 0; x < count; x++)
IF (employeeSalaries[x] >= rangeMin OR employeeSalaries[x] <= rangeMax )
DISPLAY employeeNames[x] + “\t” + employeeSalaries[x]
END IF
END FOR
END
See more about JAVA at brainly.com/question/12978370
#SPJ1
Write a program named IntegerExpressions that asks the user for three integers.
The program must then output results based on the following calculations:
firstResult = The sum of firstInt and secondInt divided by thirdInt
secondResult = The product of secondInt and thirdInt divided by the sum of secondInt and firstInt
thirdResult = The product of firstInt and thirdInt mod by the secondInt
Note:
firstInt, secondInt, and thirdInt represent the three integers entered by the user.
firstResult, secondResult, and thirdResult represent the results of the calculations.
n mod m means the remainder obtained when n is divided by m.
The prompt to the user to enter the integers must be:
Enter firstInt:
Enter secondInt:
Enter thirdInt:
The output must be in the format:
First Result = firstResult
Second Result = secondResult
Third Result = thirdResult
Please make sure to end each line of output with a newline.
Please note that your class should be named IntegerExpressions.
My code:
import java.util.Scanner;
public class IntegerExpressions {
public static void main(String[] args) {
Scanner = new Scanner(System.in);
int userInput = scnr.next();
int firstInt;
int secondInt;
int thirdInt;
firstInt = userInput;
secondInt = userInput;
thirdInt = userInput;
int firstResult = (firstInt + secondInt)/ thirdInt;
int secondResult; (secondInt * thirdInt)/(secondInt + firstInt);
int thirdResult; firstInt * thirdInt % secondInt;
System.out.println("First Result = " + firstResult);
System.out.println("Second Result = " + secondResult);
System.out.println("Third Result = " + thirdResult);
}
}
Error Messages:
IntegerExpressions.java:16: error: not a statement
int secondResult; (secondInt * thirdInt)/(secondInt + firstInt);
^
IntegerExpressions.java:17: error: not a statement
int thirdResult; firstInt * thirdInt%secondInt);
^
IntegerExpressions.java:17: error: ';' expected
int thirdResult; firstInt * thirdInt%secondInt);
^
3 errors
I have no clue where I'm going wrong please help.
Answer:
its the first result and reread the second result
Explanation:
Charley discovered that someone accessed his home network without permission. What is one reason below that could have made this possible? a. He had strong password
b. He used two-factor authentication c. He used different passwords for every account
d. His anti-virus software was outdated
The one reason below that could have made this possible is that: He used two-factor authentication
What are the two factors used in two-factor authentication?The user is known to be given two factors of authentication: The password which is seen as the knowledge factor, and the YubiKey which is seen as the possession factor.
A study has revealed that two-factor authentication are no longer safe and are prone to being breached into with no form of intervention from the user. The network invader can be called "Man-in-the-Middle".
So, the Two-Factor authentication is shown to no longer be as safe as it used to be.
Hence, The one reason below that could have made this possible is that: He used two-factor authentication
Learn more about two-factor authentication from
https://brainly.com/question/14330595
#SPJ1
the c library provides functions for converting a string representation of a number to a numeric data type and vice versa. T/F
The C++ library provides functions for converting a string representation of a number to a numeric data type and vice- versa is True.
Which of the following is a function that converts a C-string to an integer and returns the integer value?A character string is transformed into an integer value using the atoi() method. A string of characters known as the input string can be used to represent a numeric value of the chosen return type. At the first character that it cannot identify as a component of a number, the function stops reading the input string.
Before performing the operation, the compiler tries to uniformly type the operands when they are of different types. In some circumstances, you must also include type conversion instructions in your software.
The result of a type conversion is the value of an expression in a new type, which may either be void (in which case the expression's value is ignored).
To learn more about Numeric data refer to:
https://brainly.com/question/29323914
#SPJ4
how to match this things
1.we will cross bridge when we get to it ------- proactive,not reactive
2.privacy not displayed after collection of data---privacy embeeded into deisgn
3.we will have preticked check box on share my personal data with 3rd party-----visiboty and transparency
4.in acall recording privacy ntoice not shown to participants who were not part of invite but joined----privay by default
A proactive organization anticipates and responds to possible obstacles and opportunities.
This requires a clear vision of where you want to go as well as a strategy. Proactive organizations are forward-thinking and always looking for new ways to innovate and improve.
Learn more about privacy at:
https://brainly.com/question/27034337
#SPJ1
Creating a company culture for security design document
Use strict access control methods: Limit access to cardholder data to those who "need to know." Identify and authenticate system access. Limit physical access to cardholder information.
Networks should be monitored and tested on a regular basis. Maintain a policy for information security.
What is a healthy security culture?Security culture refers to a set of practises employed by activists, most notably contemporary anarchists, to avoid or mitigate the effects of police surveillance and harassment, as well as state control.
Your security policies, as well as how your security team communicates, enables, and enforces those policies, are frequently the most important drivers of your security culture. You will have a strong security culture if you have relatively simple, common sense policies communicated by an engaging and supportive security team.
What topics can be discussed, in what context, and with whom is governed by security culture. It forbids speaking with law enforcement, and certain media and locations are identified as security risks; the Internet, telephone and mail, people's homes and vehicles, and community meeting places are all assumed to have covert listening devices.
To learn more about security culture refer :
https://brainly.com/question/14293154
#SPJ1
answer for brainliest Today, trending current events are often present on websites. Which of the following early developments in audiovisual technology is most closely related to this? soundtracks newsreels microphones televisions