33. (03.03 LC)
Technologies are having a negative impact on businesses. (2 points)
O
True
False

I need help smh

Answers

Answer 1

Answer:

False

Explanation:

Technology enhances the smooth run of businesses around the world at large. take an example of your transport systems, communication systems and even to advertisment of company products/services


Related Questions

Discussion Topic

Discuss how the color scheme of a web page can relate to its content. Suggest
ways in which web designers can use color to make a statement about the
subject of a web page, a brand, or the website itself.

Answers

Answer:

Colors represent different meanings to us, not only artistically but also in how we feel. Colors like red and pink for example could be used on a dating site since those colors typically adhere to those characteristics in our modern society. Thus, choose the colors that fit the theme and the goal of the page.

write a statement that assigns finalresult with the sum of num1 and num2, divided by 3. ex: if num1 is 4 and num2 is 5, finalresult is 3. java

Answers

The question states that we have to write a code in java, that adds two numbers num1 and num2 and then divide the sum by 3. Store the result of the calculation in the variable named finalresult.

This program can be coded in any programming languages such as C, C++, C#, and Java. But as given in the question, it is required to write it in Java programming language. Java is a high level programming language that is used to develop applications and programs.

The code is given below what is required in the question.

public class MyClass {

   public static void main(String args[]) {

  int num1;// declared variable num1

  int num2;//declared variable num2

     float finalresult;//declared variable finalresult which store the result

 

    num1 = 4;//assigned value to num1

     num2 = 5;//assigned value to num2

 

     finalresult = (num1 + num2)/3;/* calculation performed and result stored in variable finalresult*/

     System.out.println("Sum of " +num1+" and " + num2+ " is  " + finalresult);//output display

}

}

You can learn more about how to sum numbers in java at

https://brainly.com/question/24412452

#SPJ4

the < > selector with code { font-weight: bold; } will cause all heading 1 text to be displayed with the bold font-weight attribute.

Answers

h1{ font-weight: bold; } will cause all heading 1 text to be displayed with the bold font-weight attribute.

If you're looking to add a little bit of style to your website, the h1{ font-weight: bold; } CSS property is a great way to do it. This property will cause all heading 1 text to be displayed with the bold font-weight attribute, making it stand out from the rest of your content.

This is a great way to add a bit of visual interest to your site and make it more eye-catching for visitors. Plus, it's a simple CSS property to use, so it's easy to add to your site's stylesheet. So if you're looking for a way to add some pizzazz to your site, h1{ font-weight: bold; } is a great option!

Learn more on heading here:

https://brainly.com/question/15858153

#SPJ4

suppose you found that your model is suffering from high variance. which algorithm do you think could handle this situation and why?

Answers

Handling High Variance

For handling issues of high variance, we should use the bagging algorithm.
The bagging algorithm would split data into sub-groups with a replicated sampling of random data.
Once the algorithm splits the data, we use random data to create rules using a particular training algorithm.
After that, we use polling for combining the predictions of the model.

What kind of animation is used in the powerpuff girls show??

Answers

Calarts? Cartoon I don’t really know but that’s all the information that I have

includes several applets, including system and security, programs, user accounts and ease of access.

Answers

Control panel includes several applets, including system and security, programs, user accounts and ease of access.

What is a software?

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task (function) and proffer solutions to a particular problem.

What is a control panel?

A control panel can be defined as a screen dashboard found in a software which is designed and developed to present end users any combination of applets, check boxes, buttons, submenus, security, and input fields that can be used for configuring applications, user accounts, the hardware, and operating system.

Read more on control panel here: https://brainly.com/question/1445737

#SPJ1

a fileless malicious software can replicate between processes in memory on a local host or over network shares. what other behaviors and techniques would classify malware as fileless rather than a normal virus? (select all that apply.) a.

Answers

Uses lightweight shellcode and Uses low observable characteristic attacks is a Technique that will classify malware as file less rather than a regular virus.

As a computer user, you will usually find several problems related to your computer. One example is using an administrator account to download and install software applications. After the user runs the .exe extension installer file, the user often experiences crashes, slow computer performance, and strange services that run when turning on the computer, this is because the user downloads a Trojan horse malware.

To learn more about Malicious Software please go to link https://brainly.com/question/14309905

#SPJ1

Under the Home tab, controls for aligning text and objects can be found in the
Clipboard group.
Font group
Paragraph group.
Editing group.

Answers

i believe the answer is editing group

Answer:

Paragraph Group

Explanation:

Will Mark Brainliest

Why did Constantine establish a new capital of the Roman Empire in Byzantium?



Byzantium was located on trade routes and could be better protected.


Byzantium was close to Rome, so travel between the two cities was easy.


Byzantium was already a huge city that needed little construction to make it the capital.


Byzantium was located in the middle of Europe and close to the people of the Western Empire.

Answers

Answer:

Byzantium was located on trade routes and could be better protected.

Explanation:

Byzantium became the capital of the Roman Empire in 330, with the established objective of fulfilling a fundamental role in the control of the commercial routes used by Rome to the East: this city was located in the passage of these commercial routes, thus which was fundamental its protection in order to control trade in the area. In this way, it was agreed to name this city as the capital, which gave importance to the eastern region within the Empire, and allowed these trade routes to be better managed and protected by the Roman government.

A                                                                  A

l Marking so other guy can get brainliest l

l                                                                    l

Please please help what kind of device. is this​

Answers

Answer:

uuuummmmm im pretty sure that is some type of tablet

Explanation:

sorry im not much help.........

Answer:

It's a Hard drive. It's on your pc

Explanation:

most widely deployed cellular communications standard, relatively slow data transfer, 2g technology.

Answers

The most widely deployed cellular communications standard GSM, is relatively slow data transfer, with 2g technology.

With its availability in more than 210 countries worldwide, GSM, or Global System for Mobile Communication, was once regarded as the industry standard for communication, notably in Asia and Europe.

The switching system (SS), base station system (BSS), and operation and support system are the three main systems that make up the GSM network (OSS).

A mobile network operator that makes use of the cellular Global System for Mobile communications is known as a GSM carrier. GSM carriers like AT&T and T-Mobile offer service for GSM phones, whereas CDMA carriers can only work with CDMA-compatible phones.

3G, 4G, and 5G have developed from the GSM (2G).

Learn more about communication:

https://brainly.com/question/26152499

#SPJ4

What is the result of the following program? print(“10 + 2”) print(3 + 5) 12 8 10 + 2 3 + 5 12 3 + 5 10 + 2 8

Answers

Answer:

print(“10 + 2”) Will output "10 + 2" without the quotation marks. This is because the text to print is encapsulated in quotation marks, indicating a "string literal." This means, to put it simply, it will always print what you put there even if it's a math equation.

A............
refers to a person who has the knowledge and skills to effectively
use digital technologies to communicate with others, participate in society and create and
consume digital content.
mer

Answers

A digital citizen refers to a person who has the knowledge and skills to effectively use digital technologies to communicate with others, participate in society and create and consume digital content. ... cyberbullying, relationships, etiquette and communication.

slide rule was the first mechanical calculator. true or false​

Answers

Answer:

False. Pascal's calculator was the first mechanical calculator invented by Blaise Pascal in the mid 17th century.

if you are using an administrator account during a software installation and you get prompted by the uac, you should

Answers

All you have to do if you are using an administrator account during a software installation and you get prompted by the UAC is click continue and finish the installation.This is because processes that require an administrator access token cannot be silently installed when UAC is enabled, the user must explicitly give consent by clicking yes or by providing administrator credentials.

Windows Security can be defined as a built-in application available in Windows 10 that provides a user-friendly interface and tools to manage common security features. An example is Microsoft Defender Antivirus, which offers real-time protection for your computer and data against viruses and many other types of malware. With Windows Security, our computers become more secure and the files on the computer.

Learn more about Windows Security here https://brainly.com/question/14262072

#SPJ4

What is machine? Any three example of cpu ? show principle of computer.​

Answers

Answer:

Single Core

Dual Core

Quad Core

Explanation:

_____materials from a source text without properly citing the source is an example of plagiarism.(drivers ed)
A)Reviewing
B)Considering
C)Paraphrasing
DReading

Answers

Answer:

C

Explanation:

Paraphrasing materials from a source text without properly citing the source is an example of plagiarism. (drivers ED)

The correct answer is C)Paraphrasing

The central point of Christian belief is that God, the Father, entered into human history as the
Son, Jesus of Nazareth, and arose as the Holy Spirit.​

Answers

Answer:

The central point of Christian belief is that God, the Father, entered into human history as the Son, Jesus of Nazareth, and arose as the Holy Spirit. Christian Philosophy God is the Creator of the universe.

Explanation:

What level do you have to be to privite messege people

Answers

HEHDBDBJF IM BORED PLZ HELP

The New Slide command on the Ribbon lets you choose _______.
A. transitions
B. Print settings
C. Slide layouts
D. slide dimensions

Answers

Answer:

im probably late but the answer is c.

Explanation:

i took the test! hopes this helps

The New Slide command on the Ribbon lets you choose slide layouts. Hence option C is correct.

What is slide layout?

Slide layout is defined as a layout  contain placeholder boxes for all of the material that appears on a slide, as well as formatting and positioning information. The dotted-line containers on slide layouts known as placeholders are where the titles, body text, tables, charts, SmartArt visuals, pictures, clip art, videos, and audio, among other things, are placed.

Click the "Home" option in the Ribbon to add a new slide in PowerPoint with the "Title and Content" slide arrangement. Afterward, select "New Slide" from the "Slides" button group. Alternatively, you can select the "Home" option in the Ribbon to enter a new slide with a different presentation layout.

Thus, the New Slide command on the Ribbon lets you choose slide layouts. Hence option C is correct.  

To learn more about slide layout, refer to the link below:

https://brainly.com/question/18069723

#SPJ2

eliminating drafts in the birth room and in the nursery will help to prevent heat loss in a newborn through which mechanism?

Answers

The act of eliminating drafts in the birth room and in the nursery will help to prevent heat loss in a newborn through option b. conduction  mechanism.

What is convection in a newborn?

The term Convection as it connote in the birth room is known to be the loss of heat from the newborn's skin to that of their  surrounding air.

Note that Newborns tends to lose a lot of heat by convection and this can be handled by the use of conduction  

Therefore, The act of eliminating drafts in the birth room and in the nursery will help to prevent heat loss in a newborn through option b. conduction  mechanism.

Learn more about Convection  from

https://brainly.com/question/9382711
#SPJ1

a. evaporation

b. conduction

c. convection

d. radiation

declaring a member as in the base class provides access to that member in the derived classes but not to anyone else.

Answers

Declaring a member as protected in the base class provides access to that member in the derived classes but not to anyone else.

Base class and derived classes are concepts of inheritance in the paradigm of Object Oriented Programming. Inheritance is the process in which a new class (called derived class) is created from an existing class (called base class).

When a drive class is created from the base class, it has access to some members of the base class. There are three types of access specifiers to declare members in the base class in order to provide their access in the derived classes.

The first is declaring a member as private. Private members of the base class cannot be accessed by anyone, even not by the derived classes. The second is declaring the base class members as public. Public members can be accessed by anybody including derived classes. The third type is declaring members as protected. Protected members of the base class have accessibility only in derived classes.

Thus, when a member is declared as protected in the base class, it gives access to that member in the derived classes but not to anyone else.

You can learn more about access specifier at

https://brainly.com/question/28289695

#SPJ4

write a function, daysbewteen, which returns an integer representing the numbers of days between two dates.

Answers

Using the knowledge of computational language in python we can write the code as  function, daysbewteen, which returns an integer representing the numbers of days between two dates.

Writting the code:

#include <iostream>

using namespace std;

int daysInMonth(int month, int year)    //function to know the days in a month

{

   //array to store the days of each month for a non-leap year

   int a1[] = {31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31};

   //array to store the days of each month for a leap year

   int a2[] = {31, 29, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31};

   if(((year % 4 == 0) && (year % 100 != 0)) || (year % 400 == 0))  //if the year is a leap year

       return a2[month-1];     //value from a2 array is returned

   else        //else if the year is not a leap year

       return a1[month-1];    //value from a1 array is returned

}

int daysBetween(int y1, int m1, int d1, int y2, int m2, int d2)  //function definition

{

   int days = 0;       //days is initialized to zero

   for(int i = y1; i <= y2; i++)    //for each year from y1 to y2 loop repeats

   {

       if(i == y1)     //if i equals to y1

       {

           days = days + daysInMonth(m1, y1) - d1;  //for m1 days is calculated and subtract d1 from that

           for(int j = m1+1; j <= 12; j++)     //from the months starting m1+1

           {

               days = days + daysInMonth(j, i);  //days in each month is added to days variable

           }

       }

       else if(i == y2)    //if i equals to y2

       {

           days = days + d2;   //d2 is added to days

           for(int j = 1; j < m2; j++)     //we can only check upto m2-1 month

               days = days + daysInMonth(j, i);   //days in each month is added to days

       }

       else        //else

           for(int j = 1; j <= 12; j++)    //for each month in that year

               days = days + daysInMonth(j, i);   //days in that month is added to days

   }

   return days;        //days is returned

}

int main()      //main function

{

   int y1, m1, d1, y2, m2, d2;    //variable declarations

   cin >> y1 >> m1 >> d1 >> y2 >> m2 >> d2;   //reads the input

   cout << daysBetween(y1, m1, d1, y2, m2, d2);   //calls the function and prints returned value

   return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

PLEASE ANSWER CORRECTLY
Which type of loop is best in each situation?


for or while ? : You know ahead of time how many passes you wish to make through a loop.

for or while ? : You do not know ahead of time how many passes you wish to make through a loop.

Answers

Answer:

a

Explanation:

E

Answer:

1:for

2:while

Explanation:

what is networking??????????????????????

Answers

Answer:

the activity or cycle of collaborating with others to trade data and create proficient or social contacts.

Explanation:

<3

Select the correct answer.
Which option should you select to accept a tracked change?
O A.
Accept
Reject
O C. Review
OB.
O D. Delete

Answers

Answer:

Explanation:

Which option should you select to accept a tracked change?

A.  Accept

how can I download music and films at home without breaking the law?
Plz help I will give brainliest ​

Answers

Answer: use a legal music downloader

Explanation: :)

Answer:

Paying for those music and movies.

Explanation:

If you pay for them, you are pretty much an "owner" of those materials and there is no way you can get in trouble. Now, however, you can use services such as Spotify, Netflix, and many more as those companies have bought the rights to stream those at a cheaper price for people.

Hope this helps!

Answer this and I’ll do your work for a week

Answers

Answer:

Explanation:meeeeeeeeeeeeeeeeee

Answer: ok

Explanation:

Easy

an administrator deploys a basic network intrusion detection system (nids) device to identify known attacks. what detection method does this device use?

Answers

When an administrator deploys a basic network intrusion detection system (NIDS) device to identify known attacks, the detection method used by this device is signature-based.

The types of detection methods.

In Computer technology, the detection methods used by an Intrusion Detection System (IDS) include the following;

Statistical anomaly-based detection.Stateful protocol analysis detection.Signature-based detection.

What is a signature-based detection system?

A signature-based detection system can be defined as a type of detection and protection system which is designed and developed to detect a malicious attack such as a worm, virus, trojan, malware etc., by checking and matching them with a repository of specific signatures, patterns or fingerprints.

Read more on signature-based detection here: https://brainly.com/question/7615966

#SPJ1

display campaigns use full automation to optimize and automate nearly all aspects of the campaigns. users only have to provide a few inputs. what can a user input in a display campaign?

Answers

A user can input the following in a display campaign: D. the images they wish to use.

What is a display campaign?

A display campaign can be defined as a form of online advertisement that typically involves the use of banner adverts (ads) alongside other digital visual adverts to advertise their product on social media platforms, software, or websites, to existing customers and  potential customers.

In this context, we can reasonably infer and logically deduce that an end user can input the images he or she wishes to use in a display campaign.

Read more on display and advertisement campaign here: https://brainly.com/question/25710825

#SPJ1

Complete Question:

Display campaigns use full automation to optimize and automate nearly all aspects of the campaigns. users only have to provide a few inputs. What can a user input in a display campaign?

All channels they wish to target

A maximum conversion number

Keyword bids and modifiers

The images they wish to use

Other Questions
M is the midpoint of segment JK. The coordinate of J are (-4, 7) and the coordinates of M are (2, 5). Find the coordinates of K. A car valued at $20,000 depreciates at a rateof 2% during the first 5 years, then at a rateof 2.5% every year after that. What will thecars value be after 10 years?) thorau rejects many thing as inessential or unimportant. list at least three things that were iportant to hi, citing lines from the essay to support your answers What is protected within the nucleus?A. PolysaccharidesB. DNAC. Prokaryotic cells We dump 8.8 million tons of plastic into oceans By: Seth Borenstein, Associated Press December 16, 2021 Each year about 8.8 million tons of plastic ends up in the world oceans. The quantity is much higher than previous estimates, according to a new study. It tracked marine debris from its source. That's the equivalent of five grocery bags full of plastic debris dotting each foot of coastline around the world. So says the study's lead author, Jenna Jambeck. She is an environment engineering professor at the University of Georgia. At the current rate, Jambeck projects that by 2025, the total accumulated plastic trash in the oceans will reach around 170 million tons. That's based on population trends and continued waste management disposal problems. But there may be some early signs of change, she said. More than half of the plastic waste that flows into the oceans comes from just five countries. They are China, Indonesia, the Philippines, Vietnam and Sri Lanka. The U.S. is ranked No. 20. Europe and the U.S. are not mismanaging their collected waste. The plastic trash coming from those countries is due to litter, researchers said. China is responsible for 2.4 million tons of plastic that makes its way into the ocean. That's nearly 28 percent of the world total. The U.S. contributes 77,000 tons. That is less than 1 percent, according to the study published in the journal Science. This is mostly because developed countries have systems to trap and collect plastic waste, Jambeck said. "We need to wake up and see our waste," Jambeck said. "I think the problem in some ways has sort of snuck up around us." The amount of plastics estimated to be going into the water is equal to how much tuna is fished per year. So "we are taking out tuna and putting in plastic, said study co-author, Kara Lavendar Law. Nancy Wallace is head of the marine debris program for the National Oceanic and Atmospheric Administration. She said plastic waste in the water is eaten by sea life. It also collects ocean toxins. And, there's a clean-up cost and it affects tourism. Jambeck used World Bank statistics on 192 countries' waste streams to track and estimate plastic pollution from the source. She examined how much waste is generated and the percentage that reaches the oceans. Jambeck's estimates were for 2010 and ranged between 5 and 14 million tons of plastic. The middle scenario estimate is 8.8 million tons. Previous estimates were less than 1 million tons, based on samples. Scientists know that much can be hidden in the bottom of the ocean and in places researchers don't get to. Last year Andrs Czar of the University of Cadiz in Spain estimated the waste at about 35,000 tons. Cozar said his team acknowledged that "99 percent of the ocean's plastic is missing." 1. a. Underline any unfamiliar words b. Use context clues to help find the meaning. c. Think of two possible substitutions (synonyms) for at least two unfamiliar words Accumulated synonom:gatgherrange synonom:sortd. Confirm your definition by checking a dictionary or thesaurus 2. Copy down three facts from the article. 3. Write 3+ thoughts in the margin to show your thinking while you read. (6 points) 3. Write a 5 - 7 sentence paragraph summary of the article. (10 points) 4. Critical thinking challenge: Why do some countries contribute more trash to the oceans than others? Your friend and your cousin discuss measuring with a ruler. Your friend says that you must always line up objects at the zero on a ruler. Your cousin says it does not matter. Who is correct, and why?friend; A measurement always starts with a value of zero.friend; A ruler does not match numbers one to one unless the measurement starts at zero.cousin; you can choose any number for the start of the object and any number for the end.cousin; The distance is the absolute value of the difference of the numbers lined up with the beginning and the end of the object. Please help with work/explanation thank you Solve x in terms of yY=6x Keith has a credit card balance of $732. he cannot pay the whole amount due, so he pays the minimum of $75. after the minimum amount has been deducted from the $732 balance, he is charged 1.2% (or .012) fee. what will his balance be next month if he doesn't make any additional charges? if necessary, round your answer to 2 decimal places. If america's founding fathers were able to spring back to life right now, what would they think of the state of american democracy? would they be pleased? alarmed? saddened? angered? explain. What method can be used to write the equation of a line in slope-intercept form given two points? Find the slope using the formula m = StartFraction y 2 minus y 1 Over x 2 minus x 1 EndFraction, and then substitute one point and the slope into the equation y = m x + b to find the y-intercept. Find the slope using the formula m = StartFraction x 2 minus x 1 Over y 2 minus y 1 EndFraction, and then substitute one point and the slope into the equation y = m x + b to find the y-intercept. Find the y-intercept using the formula m = StartFraction y 2 minus y 1 Over x 2 minus x 1 EndFraction, and then substitute one point and the y-intercept into the equation y = m x + b to find the slope. Find the y-intercept using the formula m = StartFraction x 2 minus x 1 Over y 2 minus y 1 EndFraction, and then substitute one point and the y-intercept into the equation y = m x + b to find the slop If someone leave a 20% tip and the meal is 35$how much was the tip Hydrogen is a gas and oxygen is a gas. How is it that when they chemically combine to form a compound, water, the properties are different? brenda says her assets are definitely greater than her liabilities. which explains whether brenda is correct?brenda is correct because she has five assets and only three liabilities.brenda is correct because all the items should be in the assets column of the balance sheet.brenda is not correct because the total value of her assets could be less than the liabilities.brenda is not Which sentence most clearly contains understatement?A. We hit a bit of a snag driving here when the bridge we were oncollapsed.B. "Look out!" the stagecoach driver shouted as bandits descendedon us.OC. No other country can cmpare to the power, size, and grandeur ofPalau.D. Pellets of rain popped against the tin roof as the heavens aboveopened up. did the intellectual and sicual culture of the british colonial america did noot greatly diverge from the intellectual and social life of england Which pattern below shows an arithmetic sequence with a third term of 8 and a constant difference of 5? Which text best completes the sentence? whchi of the following european nations is least like to share the characteristics stannard uses in descriibing colubmus here are four lengths of wood