- Are you interested in modern technology? Why/why not?​

Answers

Answer 1

Answer:

yes

Explanation:

cause it is very intrested

LIKE sitting in the house and turning on your car and alexa all the stuff


Related Questions

How do I open a letter doc in my documents in my documents folder?

Answers

Double click the letter doc, it s hold open automatically

Matching parentheses. An math expression may have a number of parentheses like (, ), [, ], { and }. Each openning parenthesis (, or [, or { must be macthed by a corresponding closing parenthsis ), or ] or }. For example, 12 { 34 / [ 6 * ( 55 - 10 ) / ( 100 20 ) ] } has matched pairs of parentheses, while 12 { 34 / ( 6 * ) ] } does not. Write a function to check whether an input math expression has matched parentheses. The header of the function is given as follows:
bool match( const char exp [ ], const int s);
The input math express is store in the char array exp, and the size of exp is s. It returns true if all parentheses are matched or false otherwise.

Answers

C++ Code

#include
using namespace std;

bool match(const char exp[],const int s)
{
// declare a character array to perform stack operations
char stack[s];

// declare top and initialize to -1 and flag to 0
int top=-1,i,flag=0;

// visit all characters in the expression string
for(i=0;i {
// if the character is [ or ( or { then push it into stack
if(exp[i]=='[' || exp[i]=='(' || exp[i]=='{')
{
top++;
stack[top]=exp[i];
}
// if the character is ] or ) or } then check conditions
else if(exp[i]==']' || exp[i]==')' || exp[i]=='}')
{
// check stack is empty or not
if(top!=-1)
{
// check all possible failure conditions
if(exp[i]==')' && (stack[top] == '{' || stack[top]=='['))
{
flag = 1;
break;
}
else if(exp[i]==']' && (stack[top] == '{' || stack[top]=='('))
{
flag = 1;
break;
}
else if(exp[i]=='}' && (stack[top] == '(' || stack[top]=='['))
{
flag = 1;
break;
}
top--;
}
else
{
flag=1;
break;
}
}
}
// after visiting all characters of expression string check if stack is not empty and flag is 1. if any one of the condition is true return false. otherwise return true

if(top>=0 || flag==1)
return false;
else
return true;
}

int main()
{

// declare character array to store expression
char exp[10000];
cout<<"Enter an Expression"<
// read expression from user
cin.getline(exp, 10000);
int s=0;

// find the length of the expression string
for(int i=0;exp[i]!='\0';i++)
{
s++;
}

// call the match function
bool status = match(exp,s);

// print the result based on value returned by match() function
if(status == 1)
cout<<"true"< else
cout<<"false"<
}


Sample Input/Output is attached

Write a Boolean expression that tests if the value stored in the variable num1 is equal to the value stored in the variable num2.

Answers

Answer:

num1 = int(input("Enter value: "))

num2 = int(input("Enter value: "))

if num1 == num2:

   print("Equals.")

else:

   print("Unequal.")

Explanation:

The Boolean expression that tests if the value stored in the variable num1 is equal to the value stored in the variable num2 can be found in explanation.

What is boolean expression?

A logical statement that could be either true or false is referred to as a Boolean expression.

As long as both parts of the expression have the same basic data type, Boolean expressions can compare data of any type. Data can be tested to see if it is the same as, greater than, or less than other data.

A Boolean expression is a type of expression used in programming languages that produces a Boolean value when evaluated. A Boolean value can only be true or false.

The boolean expression for the given scenario can be:

num1 = int(input("Enter value: "))

num2 = int(input("Enter value: "))

if num1 == num2:

  print("Equals.")

else:

  print("Unequal.")

Thus, above mentioned is the program for the given code.

For more details regarding boolean expression, visit:

https://brainly.com/question/13265286

#SPJ5

I wake up the computer and remind it what to do ​

Answers

Answer:

what's the question or answer you want or is it a joke?

Explanation:

what is operating system?​

Answers

The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.

_____ are extremely _____ data structure’s, used all the time, and there are so many _____ that can handle them to do useful things.
A _____ can be thought of as an array of arrays
•versatile
•functions
•arrays
•matrix

Answers

Answer:

arrays are extremely versatile  data structure’s, used all the time, and there are so many functions that can handle them to do useful things.

A matrix can be thought of as an array of arrays

Answer:

Arrays are extremely versatile data structure's, used all the time, and there are so many functions that can handle them to do useful things.

A matrix can be thought of as an array of arrays.

Happy Holidays

Explanation:

Write a program to repeatedly read integers from the standard input until it reads "-1" and exits. For each number before "-1," if it is positive and odd, do the following:

Answers

Answer:

#include <stdio.h>  

int main() {  

int p=0, n=0, z=0, inp=0;  

printf("How do I write a C program to read numbers until -1 "  

 "is encountered and also count the number of positive, negative, "  

 "zeroes encountered by users using a while loop?\n\n\n");  

printf("Enter an integer  (-1 to quit): ");  

scanf("%d",&inp);  

while(inp != -1) {  

 if(inp > 0) p++;  

 else if(inp < 0) n++;  

 else z++;  

 printf("\nEnter next integer (-1 to quit): ");  

 scanf("%d",&inp);  

}  

n++; /* -1 is also a -ve number */  

printf("You have entered ...\n");  

printf("\t\tPositive numbers: %d\n",p);  

printf("\t\tNegative numbers: %d\n",n);  

printf("\t\t          Zeroes: %d\n",z);  

}

Explanation:

I really need help with this question! Please help!

Answers

Answer:

(C) Emma goes to sleep late and does not set an alarm.

Explanation:

Decomposing a problem is setting a back drop inference as to (WHY?) something happens . So Emma woke up late , the only reasonable (WHY?) in this question would be (C)

write down the application areas of an ICT?​

Answers

Answer:

These are internet, telephone, mobile phone, TV, radio and office automation systems such as word-processing, fax, audio conferencing, video conferencing, computer conferencing, multimedia, etc, through the use of networks of satellite and fiber optics..

Explanation:

hope its help

An input statement is used to interact with the user of a program.
True False

Answers

Answer:

True.

Explanation:

An input statement asks a user a question, where the user has to input a value for the program to move forward. This means that yes, the program does interact with the user.

Brainliest if correct. 3. You are researching ways to boost employee morale for a proposal. How can you
avoid copyright issues when you find materials from outside sources? (1 point)

Answers

To avoid copyright you can give credit to the original author. For example if I copy information that said “all humans are meant to be extinct by 2073” from notarealwebsite.com I shout credit them for this.

write a short paragraph (three to four sentences) that explains how it works for computers and internet communications in relation to cybersecurity.

Answers

Answer:

Public and private keys form the basis for public key cryptography, also known as asymmetric cryptography. In public key cryptography, every public key corresponds to only one private key. Together, they are used to encrypt and decrypt messages. If you encode a message using a person’s public key, they can decode it using their matching private key.

Explanation:

Change up the wording.

Write a python program to calculate the sum of three numbers and as well require the user to input the numbers.​

Answers

Answer:

numbers = []

for i in range(3):

 numbers.append(eval(input("Enter number: ")))

print('Sum is:', sum(numbers))

Explanation:

You want to use a loop to prevent repeating your code.

Answer:

numbers = []

for i in range(3):

numbers.append(eval(input("Enter number: ")))

print('Sum is:', sum(numbers))

how to download film​

Answers

Which film are you talking about?
what film are you trying to download from

What type of databases is not limited by the data’s physical location?

Answers

A distributed database is not limited by the data's physical location.

Consider the following declaration:
String s = "cat";
Which of the following statements assigns the number of characters in s to k?

A. int k = s.length;
B. int k = s.length();
C. int k = s.size;
D. int k = s.size();

Consider the following declarations:
String s1 = "apple";
String s2 = "apple";
What is the result of s1.compareTo(s2)?

A. true
B. false
C. 0
D. 1

Consider the following declarations:
String s1 = "apple";
String s2 = "APPLE";
Which of the following expressions is true?

A. s1.equals(s2) && s1.equalsIgnoreCase(s2)
B. !s1.equals(s2) && s1.equalsIgnoreCase(s2)
C. s1.equals(s2) && !s1.equalsIgnoreCase(s2)
D. !s1.equals(s2) && !s1.equalsIgnoreCase(s2)

Answers

Answer:

B, C, B

Explanation:

According to my understanding of these questions, these are in Java.

For the first one, there is a built in function called .length() for a string, so it's answer B.

For the second one, this should come out as C, 0 since compareTo compares the ascii values of the characters.

The third one's answer should be B. s1.equals(s2) for characters that are caps and not caps comes out with false, so ! would negate it. s1.equalsIgnoreCase(s2) would come out as true, ignoring the cases of APPLE.

Your job is to protect your company's information assets. What security objectives
should you address?
1) Assets, liabilities, and threats
2) Common vulnerabilities and exposures
3) Confidentiality, integrity and availability
4) Risks, threats and vulnerabilities

Answers

Answer:3

Explanation: The CIA Triangle is the basis of all Security related needs.

challenge encountered ​

Answers

Answer:

What challenge?

Explanation:

Please hurry, it's a test! 30 POINTS. :)
What computing and payment model does cloud computing follow?

Cloud computing allows users to_____ computing resources and follows the ______
payment model.

1. Buy, Own, Rent, Sell
2. pay-as-you-go, pay-anytime-anywhere, pay-once-use-multiple-times

Answers

1 own
2 pay anytime anywhere

Which type of transaction cannot be tagged at this time within Quickbooks online

Answers

you can't tag general journal entries or transfers. You also can't tag things like customers or items.

The type of transaction cannot be tagged at this time within Quickbooks online is "Invoice Delayed Credit". The correct option is 4.

What is Invoice Delayed Credit?

A delayed credit is a non-posting transaction that you can add to a client's invoice at a later time.

Reimbursing a customer's money involves posting a transaction known as a refund. The use of credit notes to reduce an outstanding customer amount follows from this. Delayed Credits are only permitted on invoices.

In QuickBooks Online, "Invoice Delayed Credit" transaction types cannot currently be tagged.

To aid with organization and tracking, QuickBooks Online users can assign labels or categories to bank deposits, purchase orders, journal entries, and other transactions.

The transaction type "Invoice Delayed Credit" cannot be labeled in QuickBooks Online, nevertheless. Instead, you can change the amount owed by applying a credit memo to an invoice.

Thus, the correct option is 4.

For more details regarding Invoice, visit:

https://brainly.com/question/28566570

#SPJ6

Which type of transaction cannot be tagged at this time within QuickBooks Online?

Bank deposit O Purchase order O Journal entry O Invoice Delayed credit

Which of the following is an example of power redundancy?
UPS
Backup server
RAID
Fault tolerance

Answers

The correct answer is UPS

explain the use of mail merge feature.
pls help​

Answers

Mail Merge is a handy feature that incorporates data from both Microsoft Word and Microsoft Excel and allows you to create multiple documents at once, such as letters, saving you the time and effort of retyping the same letter over and over.

list 3 things needed in order to complete mail merge process.



pls help me!​

Answers

There are three documents that are involved in the mail merge process:

1- the main document
2- the data source
3- the merged document.

please write an Introduction on intrusion detection system and prevention system
PLEASE

Answers

Answer:

An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It is a software application that scans a network or a system for harmful activity or policy breaching. Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system integrates outputs from multiple sources and uses alarm filtering techniques to differentiate malicious activity from false alarms.

Which type of research source lets a technical writer observe how a product works?

Answers

Answer:

Research to Support Your Technical Communication

As a buyer for a clothing retailer, for example, you might need to conduct research to help you determine whether a new line of products would be successful in your store. As a civil engineer, you might need to perform research to determine whether to replace your company's current surveying equipment with 3D-equipped stations. And as a pharmacist, you might need to research whether a prescribed medication might have a harmful interaction with another medication a patient is already taking

Explanation:

Hope it helps

Please mark as brainliest

Consider that a man is watching a picture of a Black Horse. He receives an external stimulus from input channel. Man gains some information about the picture from external environment and stores it in the memory. Once the initial information is gained, it is compared with the memory and then stores it. Finally upon perceiving and storing the information in memory Man says that the picture contains Black horse.
Based on the information-processing model, cognition is conceptualized as a series of processing stages where perceptual, cognitive, motor processors are organized in relation to one another.
You are required to identify and elaborate that which cognitive processes i.e. Perceptual system, Cognitive system, and motor system are involved when man interacts with the picture and also that which input channel is responsible in taking information to the brain.

Answers

The first Cognitive Process that was in play according to the excerpt is Perceptual System. It is also called Perceptual Representation and Intelligence.

This function of the brain is responsible for the sensory input which may be auditory (sounds), visual (pictures), and kinesthetic (emotions or feelings).

So the Perceptual Cognitive system (visual) relays the input (image of the horse to his brain, then it is stored.

This next stage is handled by the memory.  Memory (a crucial process for learning) is a cognitive function that enables us to code, store, and recover information from the past.

Notice that the man perceived the information, and as the input interacts with the memory, he is able to say that the image or picture contains a black horse because there is a recall function.

Learn more about cognitive functions in the link below:

https://brainly.com/question/7272441

When using wildcards and the matching case option, which of the following would not be found by entering on in the Find dialog box?
1. den
2. down
3.Dayton
4. documentation

Answers

There are different types of Wildcard. The option that would not be found by entering on in the Find dialog box is called  Dayton.

Wildcard  is commonly known wild character or wildcard character. It is known as a symbol that is often used in place of or to stand for one or more characters.

Some wildcards are;

The asterisk (*)The question mark (?) Percent ( % )

Wildcards are said to be universally used. Dayton cannot be found because it is not a wildcard but a name of a person.

Learn more about Wildcard  from

https://brainly.com/question/7380462

Apart from using secure networks, how else can Dhruv keep his deliverables safe in the office and on the go? Select all that apply.

Answers

It should be noted that data can be secured when working in the following way:

Establishing a cyber security policy.Using two-factor authentication.Keeping passwords strong.Using secure internet connections.

Your information is incomplete. Therefore, an overview relating to the topic will be given. It should be noted that as telecommuting becomes a standard practice, the challenge regarding data security increases.

Employers should educate their employees about data security. The workers should know that data security is a priority and that all the internet connections are secure.

Learn more about data security on:

https://brainly.com/question/10091405


Which statement, if any, about Boolean is false?
a. They are all true.
b. Boolean is one of the four data types.
c. All expressions in python have a Boolean value.
c. The Boolean values are True and False.

Answers

Answer:

A.

Explanation:

In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____.

Answers

CRUD is an acronym in database management system (DBMS) that stands for Create, Read, Update, and Delete.

CRUD is an acronym in database management system (DBMS) that stands for Create, Read, Update, and Delete. It is the four basic functions of persistent storage.

CRUD operations are foundation operations every database developer and administrator needs to understand.

Find out more on CRUD at: https://brainly.com/question/651396

Other Questions
By coincidence, Norma's Obedience School trained the same number of dogs and cats last week. The school teaches dogs in groups of 6 and cats in groups of 5. What is the smallest number of cats the school could have had? In a scale drawing, 3 millimeters represents 17 meters. Exactly how many millimeters represents 55 meters? The word auditory means: Why should you pay your full credit card balance by the due date every month? Is this right for the second one What is interpersonal Which law states that energy cannot be created or destroyed, but can change from one form to another?- the law of conservation of energy- the law of conservation of matter- the law of gravity - the law of motionanswer - (the law of conservation of energy) There are two pasrts to the testYou have to take the ........ first A part-time handyman made $8798.04 last year. If he claimed himself as anexemption for $3650 and had a $5700 standard deduction, what was histaxable income last year? Need urgent help please!! 1.Which is the independent variable 2.Which is the dependent variable. Sabriana hiked along a trail that was 9.66 miles long she hated 4.2 miles every hour how many hours did it take Sabriana to finish hiking the trail Graph the solution to this inequality on the number line. 1/3x3 Which of the following is a correct interpretation of the expression 3+(-7)Thanks Write a paragraph on Importance of your interests as children with the reference of the chapter the invention of vita wonk.WHO EVER WILL ANSWER THIS PROPERLY I WILL MARK THEM BRAINLIEST N VERIFIED ANSWER Simplify.4x + 2(x + 5) + 1A) 6x + 6B) 4x + 8C) 6x + 11D) 5x + 8 please help me ill give brainlist! Eva spent $11.61 downloading songs, and each song cost $1.29. Four students wrote and solved equations to find s, the number of songs that she downloaded. Which student wrote and solved the equation correctly?Sebas work:1 dollar and 29 cents = 11 dollars and 61 cents. S = 10.Aris work:1 dollar and 29 cents = 11 dollars and 61 cents. S = 9.Ericks work:StartFraction s Over 1 dollar and 29 cents EndFraction = 11 dollars and 61 cents. S = 14.98.Daniels work:StartFraction s Over 1 dollar and 29 cents EndFraction = 11 dollars and 61 cents. S = 9. How do u solve this Write the missing numbers to find 15411 As for Bilbo Baggins, even while he was making his speech, he had been fingering the golden ring in his pocket: his magic ring that he had kept secret for so many years. As he stepped down he slipped it on his finger, and he was never seen by any hobbit in Hobbiton again. "The Fellowship of the Ring, J. R. R. Tolkien Which elements in the passage are common elements of fantasy literature? Check all that apply. A magical object a powerful speech a mythical or imaginary creature a made-up setting a character who keeps secrets.