List one unprofessional AND one professional example of internet/social media

Answers

Answer 1

Professional: Using social media to advertise a company you created

Unprofessional: Using social media to watch cat videos

Answer 2

The professional use of social media involves the use for job posting, while the unprofessional use involves watching videos.

What is social media?

A social media is given as the network that forms the connections of the individuals over the internet. It enables the user to connect irrespective of borders.

The use of social media has been professional and unprofessional both. The professional use of social media involves the use for job posting, while the unprofessional use involves watching videos.

Learn more about social media, here:

https://brainly.com/question/9564823

#SPJ5


Related Questions

explain the concepts of sampling and sampling rate

Answers

Sampling is the process of converting a continuous signal into a discrete signal by measuring the signal's amplitude at regular intervals. This is done by taking a series of samples of the continuous signal at specific points in time. The resulting discrete signal can be stored and manipulated more easily than the original continuous signal.

Sampling rate is the number of samples taken per second when converting a continuous signal to a discrete signal. It is measured in Hertz (Hz) and is also known as the sampling frequency. The sampling rate is an important parameter because it determines the quality of the resulting discrete signal. A higher sampling rate means that more samples are taken per second, which results in a more accurate representation of the original continuous signal. However, a higher sampling rate also requires more storage space and processing power. A lower sampling rate means that fewer samples are taken per second, which results in a less accurate representation of the original continuous signal. However, a lower sampling rate requires less storage space and processing power. Therefore, the sampling rate must be chosen carefully based on the specific requirements of the application.


Which of the following is the main federal law protecting job applicants against discrimination based on race, color, religion, national origin,
disability, or genetic information?

Answers

The main federal law protecting job applicants against discrimination based on race, color, religion, national origin, disability, or genetic information is Title VII. The correct option is c.

What is Title VII of federal law?

Federal laws are standards that have been evaluated by both legislatures of Congress, have the signature of the president, have counteracted the president's vote, or have otherwise been given the go-ahead to become a legal document.

Employment discrimination based on racial, ethnic, religious, sexual, and national origin is illegal under Title VII.

Therefore, the correct option is c. Title VII.

To learn more about federal law, refer to the link:

https://brainly.com/question/14443349

#SPJ9

The question is incomplete. The missing options are given below:

a. Title I

b. Title IV

c. Title VII

d. Title III

10. Question
Which statement is true about computer security?

Answers

Answer:

they cannot share your privacy with others without your concern

3. In relationship to the four ways of knowing, explain how "authority" and "science" may simultaneously operate.

Answers

Answer:

The summary of given question is summarized in the below segment.

Explanation:

Authority was among the most prevalent means of information acquisition. It entails the development of innovative concepts that the appropriate authorities have said are correct.

Individuals prefer to trust knowledge like this one that no one has any time to investigate every deep understanding we choose to gain via authoritative autonomously.

Numerous scientists' hypotheses were affirmed to be true. But when such statements are proven to be incorrect, they merely lead to misconceptions and therefore also impede the growth of these kinds of fields.

For this activity, you will practice being both proactive and reactive to bugs. Both are necessary to get rid of errors in code.

Proactive:

Log in to REPL.it and open your Calculator program that you built in Unit 5.
In the index.js file, type and finish the following block of code that validates the input to make sure both are numbers (not letters or symbols):
try{
if (isNaN(…) || isNaN(…)){
throw …
}
else{
document.getElementById("answer").innerHTML = num1 + num2;
}
}
catch(e){
document.getElementById("answer")…
}

(Note: The || symbol is used in JavaScript to mean or . You can find this key to the left of the Z key if you’re using a PC or directly above the Enter key if you’re using a Mac.)
Add the finished code above to the correct place in your add() function. Make sure to delete this line since we moved it into the try block:
document.getElementById("answer").innerHTML = num1 + num2;
Paste the same code into the subtract() , multiply() , and divide() functions, making the necessary changes. Be careful with your divide() function since you already have an extra if else statement checking for a division by 0 mistake. (Hint: Cut and paste the entire if else statement inside the else block of your try statement.)
Test your program by typing in letters or symbols instead of numbers. Make sure you get the appropriate error message. (Note: The function is not supposed to check whether the text field is empty, only whether it contains non-numbers.)
When you are finished, share the link to your webpage with your teacher by clicking on the share button and copying the link.
Reactive:
The following Python program should print the sum of all the even numbers from 0 to 10 (inclusive), but it has two bugs:

x = 0
sum = 0
while x < 10:
sum = sum + x
x = x + 1
print(sum)
Complete a trace table and then write a sentence or two explaining what the errors are and how to fix them. You can choose whether to do the trace table by hand or on the computer. Turn in your trace table and explanation to your teacher.

Answers

Answer:

okk

Explanation:

Can anyone please help me out

Can anyone please help me out

Answers

Answer:

No se ve nada

Which of the following is not a recognized cabling type for horizontal cabling as per the ANSI/TIA standards?A) STPB) Fiber optic cableC) UTPD) Patch cable

Answers

UTP, STP, and fibre optics are recognised by TIA/EIA; coaxial is not.

Which of the following doesn't qualify as a backbone cable according to the TIA?

It should be noted that the ANSI/TIA-568-C version of the standard does not recognise coaxial cabling. The wall outlet, also known as the telecommunications outlet, is where the horizontal cable terminates in the work area. Users and communication devices are connected to the structured-cable infrastructure in the work area.

What is the longest horizontal cable that can be used?

The horizontal separation must not exceed 76 metres (250 feet). Cable trays are the recommended method for distributing the horizontal wire from the telecommunications room to the communication outlets because they make cable installation simple and allow for future extension in hallways or significant distribution routes.

To know more about UTP visit:-

https://brainly.com/question/14959702

#SPJ1

Are the blank space around the edges of the page

Answers

Answer:

The blank space around the edges of a sheet of paper — as with the page of a book — that surrounds the text is called the margin.

In 2019, the tuition for a full time student is $7,180 per semester. The tuition will be going up for the next 7 years at a rate of 3.5% per year. Write your program using a loop that displays the projected semester tuition for the next 7 years. You may NOT hard code each years tuition into your program. Your program should calculate the tuition for each year given the starting tuition in 2019 ($7, 180) and the rate of increase (3.5%). You should then display the actual year (2020, 2021, through 2026) and the tuition amount per semester for that year

Answers

Answer:

In Python:

tuition = 7180

year = 2019

rate = 0.035

for i in range(2019,2027):

   print(str(year)+": "+str(round(tuition,2)))

   tuition = tuition * (1 + rate)

   year = year + 1

   

Explanation:

This initializes the tuition to 7180

tuition = 7180

This initializes the year to 2019

year = 2019

This initializes the rate to 3.5%

rate = 0.035

This iterates through years 2019 to 2026

for i in range(2019,2027):

This prints the year and tuition

   print(str(year)+": "+str(round(tuition,2)))

This calculates the tuition

   tuition = tuition * (1 + rate)

This increments year by 1

   year = year + 1

What is the best way to display numbers that are outliers as well as the mean
(4, 1, 3, 10, 18, 12, 9, 4, 15, 16, 32)

Answers

Stem and leaf plots would be the best choice to display numbers that are outliers as well as the mean.

What do you mean by Stem and leaf plot?

A stem and leaf plot may be defined as a type of technique that is significantly used to classify either discrete or continuous variables. This is used to organize data as they are collected.

A stem and leaf plot looks something like a bar graph. Each number in the data is broken down into a stem and a leaf. These types of techniques are useful for displaying the relative density and shape of the data, giving the reader a quick overview of the distribution.

They retain the raw numerical data, often with perfect integrity. They are also useful for highlighting outliers and finding the mode.

Therefore, stem and leaf plots would be the best choice to display numbers that are outliers as well as the mean.

To learn more about stem and leaf plots, refer to the link:

https://brainly.com/question/8649311

#SPJ1

Your question seems incomplete. The most probable complete question is as follows;

What is the best way to display numbers that are outliers as well as the mean (4, 1, 3, 10, 18, 12, 9, 4, 15, 16, 32)?

Pie chart.Bar graph.Stem and leaf plot.Venn diagram.

Luke is setting up a wireless network at home and is adding several devices to the network. During the setup of his printer, which uses 802. 11g standard, he finds that he can't connect to the network. While troubleshooting the problem, he discovers that his printer is not compatible with the current wireless security protocol because it is an older version of hardware.


What wireless network security protocol will allow Luke to use the printer on his wireless network?

a. WPA

b. WEP

c. WPA2

d. WPA-PSK+WPA2-PSK

Answers

The wireless network security protocol that will allow Luke to use the printer on his wireless network is WEP. The correct answer is option b.

WEP (Wired Equivalent Privacy) is a security protocol that is used to secure wireless networks. It was introduced in 1999 and was widely used in the early days of wireless networking. However, it is an older version of hardware and is considered less secure than newer protocols such as WPA (Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access 2).

Since Luke's printer is an older version of hardware, it is not compatible with the current wireless security protocol. Therefore, using WEP will allow Luke to use the printer on his wireless network.

Learn more about wireless network security:

brainly.com/question/30087160

#SPJ11

Su now wants to highlight several inventors in her presentation, so she decides to use the underline color option.
Which tab should su use?
Which command group should she navigate to?
What does she click in the command group to open the Font dialog box?
Under which heading would the underline color menu be found?​

Answers

Answer:

1) Home

2) Font

3) the arrow at the bottom right

4) All Text

Explanation:

Answer:

1. home

2. font

3. the arrow at the bottom right

4. all text

Explanation:

It is important to create a strong password because it will

let someone steal your personal information
allow your friends to easily guess it
keep your private information safe and secure
give your computer a virus

Answers

Keeps your private information safe and secure...
PLP 2021

What does the Address Resolution Protocol do?​

Answers

Answer: It is used to map MAC addresses to IP addresses.

Explanation: <3

what is the program used to send and receive emails​

Answers

The program used to send and receive emails is called an email client.

A piece of software known as an email client is an application that, when used in conjunction with an email server, enables users to send and receive electronic mail.

This functionality is only available to users who have access to both the email client and the email server. Clients for sending and receiving email include a variety of programmes such as Apple Mail, Microsoft Outlook, and Mozilla Thunderbird, amongst others.

Learn more about e-mail client, here:

https://brainly.com/question/13086477

#SPJ1

>>> phrase = "abcdefgh"

>>> phrase[3:6]

Answers

Answer:

Following are the correct code to this question:

phrase = "abcdefgh"#defining a variable phrase that holds a string value

print(phrase[3:6])#use print method for slicing and print its value

Output:

def

Explanation:

In the above code, a variable "phrase" is defined that holds a string value, and use a print method, inside the method, the variable is used as a list and use slicing.

It is a characteristic that enables you to access the series parts like strings, tuples, and lists. It also uses for modifying or removing objects in series, in the above slicing it starts from 3 and ends when it equal to the 6th letter, that's why it will print "def".

What does ATM mean on lego mario mean I know that this is not school related but I trying to help my brother ​

Answers

Answer:

I HAVE NO IDEA-

Explanation:

match the cell reference to its definition

Answers

Answer:

which cell reference:-|

Answer:

absolute reference: the cell remains constant when copied or moved.

mixed reference: the cell has a combination of two other types of cell references.

relative reference: the cell changed based on the position of rows and columns.

Write a program that prompts a user to enter the number of elements to store in an array. Then prompt the user to enter all the numbers stored in the array.
The program should then cycle through the array to see if any numbers are divisible by 5. If any number is divisible by 5 print out which ones are and identify them in the output.

Answers

Answer:

Here's an example of a program that does what you've described:

# Get the number of elements in the array

n = int(input("Enter the number of elements to store in the array: "))

# Initialize the array

arr = []

# Get the elements of the array from the user

print("Enter the elements of the array:")

for i in range(n):

   arr.append(int(input()))

# Print out which numbers are divisible by 5

print("The following numbers are divisible by 5:")

for i, x in enumerate(arr):

   if x % 5 == 0:

       print(f"{i}: {x}")

This program will first prompt the user to enter the number of elements in the array. It then initializes an empty array and prompts the user to enter each element of the array. Finally, it loops through the array and prints out the index and value of any element that is divisible by 5.

Explanation:

In reinforcement learning, an episode:

Answers

In reinforcement learning, an episode refers to a sequence of interactions between an agent and its environment. It represents a complete task or a single run of the learning process.

The reinforcement learning

During an episode, the agent takes actions in the environment based on its current state. The environment then transitions to a new state, and the agent receives a reward signal that indicates how well it performed in that state. The agent's objective is to learn a policy or a strategy that maximizes the cumulative reward it receives over multiple episodes.

The concept of episodes is particularly relevant in episodic tasks, where each episode has a clear start and end point.

Read more on reinforcement learning here:https://brainly.com/question/21328677

#SPJ1

In terms of Pseudo-Code: Which of the following statements is NOT correct

Question 10 options:

A set of instruction that have to use a specific syntax

No strict set of standard notations

Is not a programming language

Easy to understand, and clear

Answers

A pseudocode is simply a false code that is used as a prototype for an actual program

The incorrect statement is option (a)

Take for instance, the following pseudocode to add two numbers

input a

input b

c = a + b

display c

Using the above pseudocode as a guide, we have the following observations

It is clear and can be easily understoodThere is no standard notation; I can decide to replace "input" with "accept", and the pseudocode will still have the same meaning

From the definition of pseudocode, I stated that it is a prototype for an actual program.

This means that, it is not a programming language

From the above explanation, we can conclude that the correct option is (a).

This is so, because a pseudocode does not have a syntax

Read more about pseudocodes at:

https://brainly.com/question/18875548

Statistics are often calculated with varying amounts of input data. Write a program that takes any number of non-negative integers as input, and outpu

Answers

Answer:

Explanation:

The following program is written in Java and is a function that asks the user for an input and keeps doing so until a negative value is entered, in which case it calculates the average and max values and prints it to the screen.

public static void average () {

                       int num;

                       int sum = 0;

                       Scanner in = new Scanner(System.in);

                       System.out.println("Enter Number");

                       num = in.nextInt();

                       int count = 0;

                       int max = 0;

                       while(num >= 0)

                       {

                               sum+=num;

                               System.out.println("Enter Number");

                               num = in.nextInt();

                               count++;

                               if(num>=max){

                                       max = num;

                               }

                       }

               System.out.println(sum/count);

               System.out.println(max);

               }

Answer:hi

Explanation:

Without an app, the emergency response team would radio information back to the hospital. What are some benefits of using an app to send information in a situation like this

Answers

Theres a lot of benefits, it just depends on the situation. For example, say that person whos calling is in a trafficing situation, or kidnapping.  it would give the dispacter more information than what the person could say. Or if you just got into a car accident, say all you had to do was press one button and then it sends the dispacher all of your information. Social security number, phone number, id, location, emergency contacts and more.  

Input a list of employee names and salaries and store them in parallel arrays. End the input with a sentinel value. The salaries should be floating point numbers Salaries should be input in even hundreds. For example, a salary of 36,510 should be input as 36.5 and a salary of 69,030 should be entered as 69.0. Find the average of all the salaries of the employees. Then find the names and salaries of any employee who's salary is within 5,000 of the average. So if the average is 30,000 and an employee earns 33,000, his/her name would be found. Display the following using proper labels. Save your file using the naming format LASTNAME_FIRSTNAME_M08 FE. Turn in your file by clicking on the Start Here button in the upper right corner of your screen. 1.Display the names and salaries of all the employees. 2. Display the average of all the salaries 3. Display all employees that are within 5,000 range of the average.

Answers

Using the knowledge in computational language in JAVA it is possible to write the code being Input a list of employee names and salaries and store them in parallel arrays

Writting the code in JAVA:

BEGIN

DECLARE

employeeNames[100] As String

employeeSalaries[100] as float

name as String

salary, totalSalary as float

averageSalary as float

count as integer

x as integer

rangeMin, rangeMax as float

INITIALIZE

count = 0;

totalSalary =0

DISPLAY “Enter employee name. (Enter * to quit.)”

READ name

//Read Employee data

WHILE name != “*” AND count < 100

employeeNames [count] = name

DISPLAY“Enter salary for “ + name + “.”

READ salary

employeeSalaries[count] = salary

totalSalary = totalSalary + salary

count = count + 1

DISPLAY “Enter employee name. (Enter * to quit.)”

READ name

END WHILE

//Calculate average salary with mix , max range

averageSalary = totalSalary / count

rangeMin = averageSalary - 5

rangeMax = averageSalary + 5

DISPLAY “The following employees have a salary within $5,000 of the mean salary of “ + averageSalary + “.”

For (x = 0; x < count; x++)

IF (employeeSalaries[x] >= rangeMin OR employeeSalaries[x] <= rangeMax )

DISPLAY employeeNames[x] + “\t” + employeeSalaries[x]

END IF

END FOR

END

See more about JAVA at brainly.com/question/12978370

#SPJ1

Input a list of employee names and salaries and store them in parallel arrays. End the input with a sentinel

Write a program named IntegerExpressions that asks the user for three integers.
The program must then output results based on the following calculations:

firstResult = The sum of firstInt and secondInt divided by thirdInt

secondResult = The product of secondInt and thirdInt divided by the sum of secondInt and firstInt

thirdResult = The product of firstInt and thirdInt mod by the secondInt


Note:

firstInt, secondInt, and thirdInt represent the three integers entered by the user.

firstResult, secondResult, and thirdResult represent the results of the calculations.

n mod m means the remainder obtained when n is divided by m.


The prompt to the user to enter the integers must be:

Enter firstInt:
Enter secondInt:
Enter thirdInt:



The output must be in the format:

First Result = firstResult
Second Result = secondResult
Third Result = thirdResult



Please make sure to end each line of output with a newline.

Please note that your class should be named IntegerExpressions.

My code:

import java.util.Scanner;
public class IntegerExpressions {
public static void main(String[] args) {
Scanner = new Scanner(System.in);

int userInput = scnr.next();
int firstInt;
int secondInt;
int thirdInt;

firstInt = userInput;
secondInt = userInput;
thirdInt = userInput;

int firstResult = (firstInt + secondInt)/ thirdInt;
int secondResult; (secondInt * thirdInt)/(secondInt + firstInt);
int thirdResult; firstInt * thirdInt % secondInt;

System.out.println("First Result = " + firstResult);
System.out.println("Second Result = " + secondResult);
System.out.println("Third Result = " + thirdResult);

}

}

Error Messages:
IntegerExpressions.java:16: error: not a statement
int secondResult; (secondInt * thirdInt)/(secondInt + firstInt);
^
IntegerExpressions.java:17: error: not a statement
int thirdResult; firstInt * thirdInt%secondInt);
^
IntegerExpressions.java:17: error: ';' expected
int thirdResult; firstInt * thirdInt%secondInt);
^
3 errors


I have no clue where I'm going wrong please help.

Answers

Answer:

its the first result and reread the second result

Explanation:

Charley discovered that someone accessed his home network without permission. What is one reason below that could have made this possible? a. He had strong password
b. He used two-factor authentication c. He used different passwords for every account
d. His anti-virus software was outdated

Answers

The one reason below that could have made this possible is that: He used two-factor authentication

What are the two factors used in two-factor authentication?

The user is known to be given two factors of authentication: The password which is seen as  the knowledge factor, and the YubiKey which is seen as the possession factor.

A study has revealed that two-factor authentication are no longer safe and are prone to being breached into with no form of intervention from the user. The network invader can be called "Man-in-the-Middle".

So, the Two-Factor authentication is shown to no longer be as safe as it used to be.

Hence, The one reason below that could have made this possible is that: He used two-factor authentication

Learn more about two-factor authentication from

https://brainly.com/question/14330595

#SPJ1

the c library provides functions for converting a string representation of a number to a numeric data type and vice versa. T/F

Answers

The C++ library provides functions for converting a string representation of a number to a numeric data type and vice- versa is True.

Which of the following is a function that converts a C-string to an integer and returns the integer value?

A character string is transformed into an integer value using the atoi() method. A string of characters known as the input string can be used to represent a numeric value of the chosen return type. At the first character that it cannot identify as a component of a number, the function stops reading the input string.

Before performing the operation, the compiler tries to uniformly type the operands when they are of different types. In some circumstances, you must also include type conversion instructions in your software.

The result of a type conversion is the value of an expression in a new type, which may either be void (in which case the expression's value is ignored).

To learn more about Numeric data refer to:

https://brainly.com/question/29323914

#SPJ4

how to match this things
1.we will cross bridge when we get to it ------- proactive,not reactive
2.privacy not displayed after collection of data---privacy embeeded into deisgn
3.we will have preticked check box on share my personal data with 3rd party-----visiboty and transparency
4.in acall recording privacy ntoice not shown to participants who were not part of invite but joined----privay by default

Answers

"We will cross the bridge when we get to it" - proactive, not reactive."Privacy not displayed after collection of data" - privacy embedded into design."We will have a pre-ticked checkbox on 'Share my personal data with 3rd party'" - visibility and transparency."In a call recording, privacy notice not shown to participants who were not part of the invite but joined" - privacy by default.

What is proactivity?

A proactive organization anticipates and responds to possible obstacles and opportunities.

This requires a clear vision of where you want to go as well as a strategy. Proactive organizations are forward-thinking and always looking for new ways to innovate and improve.

Learn more about privacy  at:

https://brainly.com/question/27034337

#SPJ1

Creating a company culture for security design document

Answers

Use strict access control methods: Limit access to cardholder data to those who "need to know." Identify and authenticate system access. Limit physical access to cardholder information.

Networks should be monitored and tested on a regular basis. Maintain a policy for information security.

What is a healthy security culture?

Security culture refers to a set of practises employed by activists, most notably contemporary anarchists, to avoid or mitigate the effects of police surveillance and harassment, as well as state control.

Your security policies, as well as how your security team communicates, enables, and enforces those policies, are frequently the most important drivers of your security culture. You will have a strong security culture if you have relatively simple, common sense policies communicated by an engaging and supportive security team.

What topics can be discussed, in what context, and with whom is governed by security culture. It forbids speaking with law enforcement, and certain media and locations are identified as security risks; the Internet, telephone and mail, people's homes and vehicles, and community meeting places are all assumed to have covert listening devices.

To learn more about security culture refer :

https://brainly.com/question/14293154

#SPJ1

answer for brainliest Today, trending current events are often present on websites. Which of the following early developments in audiovisual technology is most closely related to this? soundtracks newsreels microphones televisions

Answers

Maybe it is the telephone
Other Questions
Secondary consumers are: (a) Herbivores; (b) Producers; (c) Carnivores; (d) None of these based on the information in the passage, which description of an enzymesubstrate covalent intermediate is most likely correct? the substrate is covalently attached to: This overall message put forth in this passage is best described asA. persuasiveB. informativeC. scientificD. fictional This triangle can only have one altitude.A.TrueB. FalseC.It can have fourHelp please. InstructionWhich are examples of Information Support and Services workplaces? Check all that applyO an outdoor areaw an officea vehicleA server room discuss about programming language make use of both interperter and complier? Explain why cetane number is a major property of diesel fuel but not for gasoline. Explain why octane number is a major property of gasoline but not for diesel fuel. if you are a scientific or a inventor what do you want to discover or to invent relate to electrogmagnetism buying and selling products are examples of question 5 options: operating activities. investing activities. financing activities. delivering activities. What are 5 major characteristics of the American economy?. Mike and Jasmine have a combined age of 30. Mike is 3 years younger than twice Jasmine's age. How old is Mike? A. 11 years oldB. 19 years oldC. 16 years oldD. 13 years old Gcmf and factor form of 5x-10x i need help with my spanish homework please, ill give brainliest :) What Does 'HML' Mean? Your teacher asks the class to evaluate the expression (3). Your classmate gives an incorrect answer of 81. Evaluate the expression. Then find the likely error. **PLEASE FIND THE ERROR I DON'T NEED THE ANSWER I KNOW ITS 27** Use the distributive property to expand (simplify): 11(12x - 10xy) Rock that forms from particles put down by water or wind is_____? sedimentary, igneous, basaltic, metamorphic. A rectangular tube is 10 meters long. with width of 50 mm and a height of 25 mm. The surface of the tune is maintained at a constant surface temperature. Liquid water enters the tube at 20C with a mass flow rate of 0.01 kg/s. Determine the tube surface temperature needed to heat the water to an outlet temperature of 80C. PLEASE HELP WILL GIVE BRAINLIESTWho can receive money from the Workers Compensation Fund ?A.)Employees who have been sexually harassed while on the job.B.)Employees who are laid off from their job.C.)Employees who have been fired from their job.D.)Employees who have been injured while on the job. Find the sum and write the answer as a decimal. 6/5 + 10.35