Means having a current knowledge and understanding of computer mobile devices the web and related technologies

Answers

Answer 1

Answer:

"Digital literacy" would be the appropriate solution.

Explanation:

Capable of navigating and understanding, evaluating as well as communicating on several digital channels, is determined as a Digital literacy.Throughout the same way, as media literacy requires the capability to recognize as well as appropriately construct publicity, digital literacy encompasses even ethical including socially responsible abilities.

Related Questions

Write a c++ to read seven days in an array and print it

Answers

Explanation:

Photosynthesis, the process by which green plants and certain other organisms transform light energy into chemical energy. During photosynthesis in green plants, light energy is captured and used to convert water, carbon dioxide, and minerals into oxygen and energy-rich organic compounds.

combination of star topology and star topology can consider as hybrid?​

Answers

Answer:

no

Explanation:

A hybrid topology is a type of network topology that uses two or more differing network topologies. These topologies can include a mix of bus topology, mesh topology, ring topology, star topology, and tree topology.

In the recursive function findMatch(), the first call is findMatch(array, 0, 4, key) . What are the remaining function calls to find the character 'e'?
public class FindMatch {
public static int findMatch(char array[], int low, int high, char key) {
if (high >= low) {
int mid = low + (high - low) / 2;
if (array[mid] == key) {
return mid;
}
if (array[mid] > key) {
return findMatch(array, low, mid, key);
}
else {
return findMatch(array, mid + 1, high, key);
}
}
return -1;
}
public static void main(String args[]){
char array[] = {'a','b','c','d','e'};
char key = 'e';
int result = findMatch(array, 0, 4, key);
if (result == -1) {
System.out.println("Element not found!");
}
else {
System.out.println("Element found at index: " + result);
}
}
}
a. (array, 2, 4, key) and (array, 3, 4, key)
b. (array, 2, 4, key), (array, 3, 4, key) and (array, 4, 4, key)
c. (array, 3, 4, key)
d. (array, 3, 4, key) and (array, 4, 4, key)

Answers

Answer:

The answer is "Option D".

Explanation:

In the given question "(array, 3, 4, key) and (array, 4, 4, key)", the element 'e' to also be searched is concentrated mostly on the right-hand side of the array since it is in the last place. This same middle value is 2 but findMatch(array, mid + 1 high, key) is labeled twice to move the center pointer to its last position, that is, so move that search item's 'e.'

What is output? public class MathRecursive { public static void myMathFunction(int a, int r, int counter) { int val; val = a*r; System.out.print(val+" "); if (counter > 4) { System.out.print("End"); } else { myMathFunction(val, r, counter + 1); } } public static void main (String [] args) { int mainNum1 = 1; int mainNum2 = 2; int ctr = 0; myMathFunction(mainNum1, mainNum2, ctr); } }
a) 2 4 8 16 32 End
b) 2 2 2 2 2
c) 2 4 8 16 32 64 End
d) 2 4 8 16 32

Answers

Answer:

The output of the program is:

2 4 8 16 32 64 End

Explanation:

See attachment for proper presentation of the program

The program uses recursion to determine its operations and outputs.

The function is defined as: myMathFunction(int a, int r, int counter)

It initially gets the following as its input from the main method

a= 1; r = 2; counter = 0

Its operation goes thus:

val = a*r; 1 * 2 = 2

Print val; Prints 2

if (counter > 4) { System.out.print("End"); } : Not true

else { myMathFunction(val, r, counter + 1); }: True

The value of counter is incremented by 1 and the function gets the following values:

a= 2; r = 2; counter = 1

val = a*r; 2 * 2 = 4

Print val; Prints 4

else { myMathFunction(val, r, counter + 1); }: True

The value of counter is incremented by 1 and the function gets the following values:

a= 4; r = 2; counter = 2

val = a*r; 4 * 2 = 8

Print val; Prints 8

else { myMathFunction(val, r, counter + 1); }: True

The value of counter is incremented by 1 and the function gets the following values:

a= 8; r = 2; counter = 3

val = a*r; 8 * 2 = 16

Print val; Prints 16

else { myMathFunction(val, r, counter + 1); }: True

The value of counter is incremented by 1 and the function gets the following values:

a= 16; r = 2; counter = 4

val = a*r; 16 * 2 = 32

Print val; Prints 32

else { myMathFunction(val, r, counter + 1); }: True

The value of counter is incremented by 1 and the function gets the following values:

a= 32; r = 2; counter = 5

val = a*r; 32 * 2 = 64

Print val; Prints 64

if (counter > 4) { System.out.print("End"); } : True

This prints "End"

So; the output of the program is:

2 4 8 16 32 64 End

Ten output devices you know

Answers

Monitor
Printer
Headphones
Computer Speakers
Projector
GPS
Sound Card
Video Card
Braille Reader
Speech-Generating Device

What is digital marketing?

Answers

Answer:

Digital marketing is the component of marketing that utilizes internet and online based digital technologies such as desktop computers, mobile phones and other digital media and platforms to promote products and services.

Explanation:

If you want to continue working on your web page the next day, what should you do?

a. Create a copy of the file and make changes in that new copy

b. Start over from scratch with a new file

c. Once a file has been saved, you cannot change it

d. Reopen the file in your text editor to

Answers

Answer:

d. Reopen the file in your text editor

Answer:

eeeeeeeee

Explanation:

An A record contains what

Answers

Answer:

IP address

Explanation:

An A record is actually an address record, which means it maps a fully qualified domain name (FQDN) to an IP address.

Answer:

IP adress. the person above me is correct

A list is sorted in ascending order if it is empty or each item except the last one is less than or equal to its successor.

a. True
b. False

Answers

The answer is true not false

Write a Python code that takes two sequences CATCGTCCT and CACCGACCG and prints the point mutations found when aligning the two sequences. Tip: you simply need to write a for loop to go over the length of the sequences, pick a letter from each position,and, compare the two sequences position by position for matches and report the mismatches.

Answers

Answer:

Following are the code to the given question:

def match_sequence(s1,s2):#Defining a method match_sequence that accepts two parameters

for l in range(len(s1)):#defining a loop that checks range of s1 value

if(s1[l] != s2[l]): # use if block to match each sequences

print('The sequence does not match at index: ',l+1)#print value with message

s1 = 'CATCGTCCT'#defining a string varible s1

s2 = 'CACCGACCG'#defining a string varible s1

match_sequence(s1,s2)#calling a method that prints its values

Output:

The sequence does not match at index: 3

The sequence does not match at index: 6

The sequence does not match at index: 9

Explanation:

In this code, a method "match_sequence" is declared that takes two string variable "s1 and s2" in its parameters, and inside the method, a loop is declared that checks the range of s1 value and use if block to match each sequence and use a print method that prints it values.

Outside the method, two string variables are declared that holds a string value that passes into the "match_sequence" method and calls it.

Define a class Complex to represent complex numbers. All complex numbers are of the form x + yi, where x and y are real numbers, real numbers being all those numbers which are positive, negative, or zero.

Answers

Answer:

The program in C++ is as follows:

#include<bits/stdc++.h>

using namespace std;

class Complex {

public:

 int rl, im;

Complex(){ }

Complex(int Real, int Imaginary){

 rl = Real;  im = Imaginary;

}

};

int main(){

   int real, imag;

   cout<<"Real: ";    cin>>real;

   cout<<"Imaginary: ";    cin>>imag;

Complex ComplexNum(real, imag);

cout<<"Result : "<< ComplexNum.rl<<" + "<<ComplexNum.im<<"i"<<endl;

}

Explanation:

See attachment for explanation

Write a C++ function for the following:
Suppose that Account class has a method called withdraw, which will be inherited by Checking and Savings class. The withdraw method will perform according to account type. So, the late bind is needed. Declare the withdraw method in Account class. The method should take a double input as withdraw amount and output true if the withdraw successfully and false if the withdraw unsuccessfully.

Answers

Solution :

class Account

[tex]$ \{ $[/tex]

public:

[tex]$\text{Account}()$[/tex];

double [tex]$\text{getBalance}$[/tex]();

void [tex]$\text{setBalance}$[/tex]();

[tex]$\text{bool withdraw}$[/tex](double bal);

[tex]$\text{private}:$[/tex]

double [tex]$\text{balance}$[/tex];

}:

[tex]$\text{Account}()$[/tex] {}

double [tex]$\text{getBalance}$[/tex]()

[tex]$ \{ $[/tex]

[tex]$\text{return balance}$[/tex];

}

void [tex]$\text{setBalance}$[/tex](double [tex]$\text{balance}$[/tex])

[tex]$ \{ $[/tex]

this.[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex];

}

[tex]$\text{boolean}$[/tex] withdraw([tex]$\text{double bal}$[/tex])

[tex]$ \{ $[/tex]

if([tex]$\text{balance}$[/tex] >= bal)

[tex]$ \{ $[/tex]

[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex] - bal;

[tex]$\text{return}$[/tex] true;

}

[tex]$\text{return}$[/tex] false;

}

}

The following Mic1 microcode excerpt shows support for a possible 7 bit opcode, 8 bit integer argument machine instruction (organized like the INSP instruction). This part of the microcode will be reached after the instruction opcode has been parsed and identified by earlier parts of the microcode and while the IR contains the complete instruction from memory (as usual for the IR).

100:a := band(smask, ir);
101:a := a + (-1); if n goto 0;
102:ac := lshift(ac); if n goto 104;
103:goto 101;
104:ac := ac + 1; goto 101;
If this possible instruction had a masm assembly pneumonic of XXXX , and was used in an assembly program as shown below:

.
.
LODD abc:
XXXX 7
HALT
.
.
abc: "lost"

What would the 16 bit content of the AC look like when we hit the HALT instruction?

a. 1 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1
b. 0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0
c. 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1 1
d. 0 0 1 1 0 1 1 1 1 0 1 1 0 1 1 0

Answers

Answer:

The answer is "Option A".

Explanation:

In the first 2 signatures in a string, the "ol" with both the "l" throughout the low byte environment is included, and so the initial bit layout becomes: Number of [tex]0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0[/tex] Its high 7 bits are moved to the lower 7 having come until the correct circular change of 7 is done:

[tex]0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0 \ \ \ to \ \ 1 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1[/tex]

Imagine that you are helping to build a store management system for a fast food restaurant. Given the following lists, write a program that asks the user for a product name. Next, find out if the restaurant sells that item and report the status to the user. Allow the user to continue to inquire about product names until they elect to quit the program.

Answers

Answer:

The program in python is as follows:

def checkstatus(food,foodlists):

   if food in foodlists:

       return "Available"

   else:

       return "Not Available"

foodlists = ["Burger","Spaghetti","Potato","Lasagna","Chicken"]

for i in range(len(foodlists)):

   foodlists[i] = foodlists[i]. lower()

food = input("Food (Q to quit): ").lower()

while food != "q":

   print("Status: ",checkstatus(food,foodlists))

   food = input("Food (Q to quit): ").lower()

Explanation:

The program uses function.

The function is defines here. It accepts as input, a food item and a food list

def checkstatus(food,foodlists):

This check if the food is in the food lists

   if food in foodlists:

Returns available, if true

       return "Available"

Returns Not available, if otherwise

   else:

       return "Not Available"

The main begins here.

The food list is not given in the question. So, I assumed the following list

foodlists = ["Burger","Spaghetti","Potato","Lasagna","Chicken"]

This converts all items of the food list to lowercase

for i in range(len(foodlists)):

   foodlists[i] = foodlists[i]. lower()

Prompt the user for food. When user inputs Q or q, the program exits

food = input("Food (Q to quit): ").lower()

This is repeated until the user quits

while food != "q":

Check and print the status of the food

   print("Status: ",checkstatus(food,foodlists))

Prompt the user for another food

   food = input("Food (Q to quit): ").lower()

Simon has a folder that's just a little too large for his thumb drive. How can he make the folder smaller without deleting the contents? *

Answers

Answer:

Try zipping the folder.

Explanation:

This reduces the size of the content but doesn't make you delete anything.

What is the meaning of integreted progam and it examples​

Answers

Answer:

Integrated software is a collection of software designed to work similar programs. A good example of integrated software package is Microsoft Office, which contains programs used in an office environment (Excel, Outlook, and Word).

You will write code to manipulate strings using pointers but without using the string handling functions in string.h. Do not include string.h in your code. You will not get any points unless you use pointers throughout both parts.
You will read in two strings from a file cp4in_1.txt at a time (there will be 2n strings, and you will read them until EOF) and then do the following. You alternately take characters from the two strings and string them together and create a new string which you will store in a new string variable. You may assume that each string is no more than 20 characters long (not including the null terminator), but can be far less. You must use pointers. You may store each string in an array, but are not allowed to treat the string as a character array in the sense that you may not have statements like c[i] = a[i], but rather *c *a is allowed. You will not get any points unless you use pointers.
Example:
Input file output file
ABCDE APBQCRDSETFG
PQRSTFG arrow abcdefghijklmnopgrstuvwxyz
acegikmoqsuwyz
bdfhjlnprtvx

Answers

Solution :

#include [tex]$< \text{stdio.h} >$[/tex]

#include [tex]$< \text{stdlib.h} >$[/tex]

int [tex]$\text{main}()$[/tex]

{

[tex]$\text{FILE}$[/tex] *fp;

[tex]$\text{fp}$[/tex]=fopen("cp4in_1.txt","r");

char ch;

//while(1)

//{

while(!feof(fp))

{

char *[tex]$\text{s1}$[/tex],*[tex]$\text{s2}$[/tex],*[tex]$\text{s3}$[/tex];

[tex]$\text{s1}$[/tex] = (char*) [tex]$\text{malloc}$[/tex]([tex]$20$[/tex] * [tex]$\text{sizeof}$[/tex](char));

[tex]$\text{s2}$[/tex] = (char*) [tex]$\text{malloc}$[/tex]([tex]$20$[/tex] * [tex]$\text{sizeof}$[/tex](char));

[tex]$\text{s3}$[/tex] = (char*) [tex]$\text{malloc}$[/tex]([tex]$40$[/tex] * [tex]$\text{sizeof}$[/tex](char));

[tex]$\text{int i}$[/tex]=0,j=0,x,y;

while(1)

{

ch=getc(fp);

if(ch=='\n')

break;

*(s1+i)=ch;

i++;

}

while(1)

{

ch=getc(fp);

if(ch=='\n')

break;

*(s2+j)=ch;

j++;

}

for(x=0;x<i;x++)

{

*(s3+x)=*(s1+x);

}

for(y=0;y<j;x++,y++)

{

*(s3+x)=*(s2+y);

}

for(x=0;x<i+j;x++)

{

printf("%c",*(s3+x));

}

printf("\n");

getc(fp);

}

}

(The Person, Student, Employee, Faculty, and Staff classes) Design a class named Person and its two subclasses named Student and Employee. Make Faculty and Staff subclasses of Employee. A person has a name, address, phone number, and email address.A student has a class status (freshman, sophomore, junior, or senior). Define the status as a constant. An employee has

Answers

Answer:

Explanation:

The following code is written in Java and creates all the classes as requested with their variables, and methods. Each extending to the Person class if needed. Due to technical difficulties I have attached the code as a txt file below, as well as a picture with the test output of calling the Staff class.

Recall the binary search algorithm.1. Using the algorithm/algorithmic environment, give pseudocode using a for loop.AnswerMy algorithm for binary search using a for loop is given in Algorithm 1.Algorithm 1BinarySearchFor(A)[[XXX TODO:pseudocode here]]2. Using the algorithm/algorithmic environment, give pseudocode using a while loop.Answer[[XXX TODO:your answer here]]3. Using the algorithm/algorithmic environment, give pseudocode using recursion.Answer[[XXX TODO:your answer here]]4. What is the loop invariant of your second algorithm

Answers

Answer:

Following are the Pseudo Code to the given question:

Explanation:

Following are the pseudo-code by using the For loop:

Defines the A function (node, element)

The node is larger than 0.

if another value of the node equals its element

Loop Break

That element if node. value becomes lower than that

Node is node equivalent.

right

Using other nodes is node equivalent.

 left

Node Return

If the node is vacant

print the Tree is empty

Following are the pseudo-code by using the while loop:

Defines the function A(node,element)

While this node is not zero.

if the value of the node equals the element

Loop Break

The element if node. value is lower than

Node is node equivalent.

right

Using other nodes is equivalent to an a.left node

Node Return

If the node is vacant

print Tree is empty

following are the Pseudo-code for recursion:

Set the function A (node, key)

If no root is the same as the root or no root.

return the root.

If the root value is lower than that of the quest for key return (root. right, key)

Return your lookup (root.left,key)

 

Which statement is correct?
Flat files use foreign keys to uniquely identify tables.

Flat files use foreign keys to secure data.

A foreign key is a primary key in another table.

A foreign key uniquely identifies a record in a table.

Answers

Answer:

A foreign key is a primary key in another table.

Explanation:

define the term hardwar

Answers

Answer:

tools, machinery, and other durable equipment.

Explanation:hardware in a computer are the keyboard, the monitor, the mouse and the central processing unit.

Answer: tools, machinery, and other durable equipment.

Explanation: the machines, wiring, and other physical components of a computer or other electronic system.

tools, implements, and other items used in home life and activities such as gardening. Computer hardware includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is the set of instructions that can be stored and run by hardware.

How can the adoption of a data platform simplify data governance for an organization?

Answers

Answer:

by implementing models that predict compliance with data protection and data privacy policies.

Explanation:

A data platform is an IT system that helps an organization to organize, control and coordinate a large volume of data with the aim of making organizational systems faster and optimizing the decision-making process with effective strategic solutions for organizational success .

A database can simplify data governance for an organization by the fact that data is available to users determined by the organization itself, which increases the security and control of business-critical data.

Discusstheimportanceofbackingupdatainorganizations,pointingoutthebenefits
ofcloudbackupoption​

Answers

Addition helps kids master the relationships between numbers and understand how quantities relate to one another. Even when kindergartners can't reliably answer addition problems or manipulate large numbers, basic addition skills give them a framework for mastering math in elementary schoo

web analytics can tell you many things about your online performance, but what can analytics tools not tell you​

Answers

Answer:

The answer is below

Explanation:

While web analytics such as Góogle analysts is known to help online marketers to map out a clear strategy and thereby improve their outreach, there are still some specific things the current web analytics can not do for the user. For example:

1. Web Analytics can’t accurately track leads

2. Web Analytics can’t track lead quality

3. Web Analytics can’t track the full customer journey

4. Web Analytics can’t highlight the true impact of payment.

Look at the code below and use the following comments to indicate the scope of the static variables or functions. Place the comment below the relevant line.

Module scope
Class scope
Function scope

#include
2
3 static const int MAX_SIZE=10;
4
5 // Return the max value
6 static double max(double d1)
7 {
8 static double lastMax = 0;
9 lastMax = (d1 > lastMax) ? d1 : lastMax;
10 return lastMax;
11 }
12
13 // Singleton class only one instance allowed
14 class Singleton
15 {
16 public:
17 static Singleton& getSingleton() { return theOne; }
18 // Returns the Singleton
19

Answers

Answer:

Explanation:

#include

static const int MAX_SIZE=10; //Class scope

// Return the max value

static double max(double d1) //Function scope

{

static double lastMax = 0;  //Function scope

lastMax = (d1 > lastMax) ? d1 : lastMax; //Function scope

return lastMax; //Module Scope

}

// Singleton class only one instance allowed

class Singleton  

{

public:

static Singleton& getSingleton()  //Function scope

{

return theOne; //Module Scope

}

// Returns the Singleton

Write a program that demonstrates how various exceptions are caught with catch(Exception exception). This time define classes ExceptionA (which inherits from class Exception) and ExceptionB (which inherits from class ExceptionA). In your program, create try blocks that throw exceptions of types ExceptionA, ExceptionB, NullPointerException and IOException. All exceptions should be caught with catch blocks specifying type Exception.

Answers

Answer:

Sorry mate I tried but I got it wrong!

Explanation:

Sorry again

In Word, when you conduct a merge a customized letter, envelope, label is created for each record in the data source. True or False.

Answers

i cant be taking these pills when im in thethey say i be cappin a lot

4 reasons why users attach speakers
to their computers​

Answers

Answer: we connected speakers with computers for listening voices or sound because the computer has not their own speaker. the purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.

Explanation: Hope this helps!

help asapp!!!!!! give the technical name means (write the name in one word) . the feature of virus which copies itself..​

Answers

Answer:

if a computer is made out of many copies it can cause a virus with a definition of a tro Jan by a virus

Explanation:

what follows is a brief history of the computer virus and what the future holds for this once when a computer is made multiple copies of it's so several reducing malicious intent here but animal and prevade fit the definition of a Trojan buy viruses worms and Trojans paint the name Malwar as an umbrella term

Ling has configured a delegate for her calendar and would like to ensure that the delegate is aware of their permissions. Which option should she configure?

Delegate can see my private Items
Tasks > Editor
Inbox > None
Automatically send a message to delegate summarizing these permissions

Answers

Answer:

Tasks>Editor (B)

Explanation:

I just did the test

Answer:

Tasks > Editor

Explanation:

Did the test

Other Questions
find the area of the shaded part Who are Thorntons dogs? How do they react to Buck? From the call of the wild Identify the relation that is also a function. A. {(5, 6), (4, 5), (5, 8), (4, 0)} B. {(3, 1), (3, 1), (3, 0), (0, 2)} C. {(2, 1), (1, 2), (1, 4), (3, 2)} D. {(6, 4), (6, 4), (10, 5), (10, 5)} 29*9It's too short. Write at least 20 characters to get a great answer. Between 12:00 PM and 1:00 PM, cars arrive at a local bank's drive-thru at the rate of cars per hour ( car per minute). The formula below from probability can be used to determine the probability that a car will arrive within t minutes of 12:00 PM. Use this information to answer the questions given below in parts (a)(e). How does the author introduce the theme of unrequited, or unanswered, love? the /, er by opening the play with Duke Orsino's attempt to drown his love in music by shocking the reader with Olivia's refusal of Duke Orsino's affections by hinting at tragedy when Curio mentions the hunt by showing that Duke Orsino surrounds himself with flowers 2 SEE ANSWERS Reduce the fraction to its simplest form24/42 hurry please I have no clue lol NO LINKS!!1. What is the difference between a misdemeanor and a felony?2. What can you do to help change our government?3. Name two important political parties.4. What should we do before signing a contract? 5. What kinds of case are heard in federal courts?6. For what reason are primary elections held?7. Why is a secret ballot important? 8. What is absentee voting?9. What is one difference civil and criminal courts?10. Name two contracts many people sign.11. How can a lawyer usually help a person? How objects on Earth are affected by gravitational force. Write a function that takes number between 1 and 7 as a parameter and prints out the corresponding number as a string. For example, if the parameter is 1, your function should print out one. If the parameter is 2, your function should print out two, etc. If the parameter is not between 1 and 7, the function should print an appropriate error message. In your file, you should include a main() that allows the user to enter a number and calls your function to demonstrate that it works. Given the following information: P(A) = 0.62 P(B) = 0.25 P(A and B) = 0.12 P(B given A) = 0.19 What is the probability of A or B? Round your answer to the nearest hundredth as needed. P(A or B) =| Use the diagram and proportional reasoning tocomplete each statement.The circumference of the entire circle is vt in.The sector is of the circle.The arc length is ut in14.13120 hii please help ill give brainliest 10In Bowling, it is considered a foul if what part of your bodycrosses the foul line?handhead arm foot In circle Q with the measure of minor arc PR = 48 , find mPSR. TIME RUNNING OUT HELPOf which of the following does McCandless declare himself a fan, which is surprising considering his tastes and beliefs?A.Ronald ReaganB.Jack LondonC.TolstoyD.Everett ReussE.Harvard Law School Where can page numbers appear? Check all that apply.in the headerinside tablesin the footerat the bottom of columnsat the top of columns The word-skipping technique lets you figure out: O A. a vague definition for a word. O B. the main idea of a passage. O C. where the context clues are located. O D. the inferences made in the passage. Please help me as soon as possible.