FILL IN THE BLANK Technology in those cases is often called a ______ innovation because companies can falter if they fail to respond with effective innovations of their own.

Answers

Answer 1

Technology in those cases is often called a disruptive innovation because businesses may suffer if they don't produce successful inventions of their own in response.

What is disruptive innovation ?Disruptive innovation, according to business theory, is innovation that establishes a new market and value network or enters a market from the bottom and eventually supplants long-established market-leading companies, goods, and alliances.Disruptive innovation opens up a completely new market with enormous potential and provides a more accessible, yet still inexpensive, solution to a larger client base. Disruptive technologies are innovations that have a substantial impact on how consumers, markets, and businesses operate.Even breakthrough innovations don't always cause disruption. For instance, because early automobiles were expensive luxury items that did not disrupt the market for horse-drawn vehicles, they were not disruptive innovations when they were introduced in the late 19th century. Up until the 1908 release of the less expensive Ford Model T, the transportation business virtually remained unaffected. Because it revolutionised the transportation industry, unlike the first thirty years of automobiles, the mass-produced automobile was a disruptive innovation.

To learn more about disruptive innovation refer :

https://brainly.com/question/15703392

#SPJ4


Related Questions

What should you do to avoid cheating in online classes, even if your behavior was unintentional?

Answers

Answer:

answer in picture below for edge 2022

Explanation:

posting because i couldnt find good answers for myself

What should you do to avoid cheating in online classes, even if your behavior was unintentional?

Use do while loop to find square root of odd number 1 to 200​

Answers

Here's an example of using a do-while loop in Python to find the square root of odd numbers from 1 to 200:

```
import math

i = 1

# loop through odd numbers from 1 to 200
while i <= 200:
# check if number is odd
if i % 2 != 0:
# find square root using math.sqrt() function
sqrt_i = math.sqrt(i)
print("The square root of", i, "is", sqrt_i)
i += 1
```

This code uses a while loop to iterate through the odd numbers from 1 to 200. It checks if each number is odd using the modulus operator `%`. If the number is odd, it calculates the square root using the `math.sqrt()` function and prints the result. The loop then continues to the next odd number until it reaches 200.

Which core business etiquette is missing in Jane

Answers

Answer:

As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:

Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.

Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.

Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.

Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.

Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.

It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.

True or False: The following two statements will always yield the same value when a and b are Strings:

1) a.equals(b);
2) a==b;

Select one:
True
False

Answers

Answer:

a. Contains: trueb. Contains: falsec. Contains: nullClear my choiceQuestion 20 Answer saved Marked out of 1.00True or False: A Set is used to store objects in a particular order.Select one:TrueFalseQuestion 21 Answer saved Marked out of

With ____ editing, you drag a selected item to a new location and drop it there. a. drag and drop b. cut and copy c. move and copy d. place and format

Answers

Answer:

a. drag and drop

Explanation:

Option A answers the question.

The operation as described in the question is a sequence of drag operation immediately followed by a drop operation.

And this operation can be achieved with the help of a pointing device (specifically, the mouse)

Morever, reading through the question, you'll find the answer as shown below:

"........ you drag ........ and drop ....."

how do you copy from a file to another document

Answers

Answer:

you highlight it then double tap and click copy or after it is highlighted press ctrl and c together then to paste you double tap and click paste or you can press ctrl v

Explanation:

Answer: yes

Explanation:

Open File Explorer by pressing Windows+E and navigate to the file you want to copy. Highlight the files you want to copy, and then click “Copy” in the File menu or press Ctrl+C on the keyboard to add them to the clipboard. If you’d rather move items instead, highlight the files you want to move.

Can someone help me with this

Can someone help me with this

Answers

I’m not sure but I think it belongings.

Assistive technology has gained currency in the 21st century since it facilitates the inclusion agenda in the country.Give four reasons to justify your point.​

Answers

Answer:

Assistive technology has gained currency in the 21st century because it provides various benefits that support inclusion. These include:

Increased accessibility: Assistive technology can make it easier for individuals with disabilities to access and interact with technology and digital content. This can increase their independence and enable them to participate more fully in society.Improved communication: Assistive technology can facilitate communication for individuals with speech or hearing impairments, enabling them to express themselves and connect with others.Enhanced learning opportunities: Assistive technology can provide students with disabilities with access to educational materials and resources, enabling them to learn and succeed in school.Greater employment opportunities: Assistive technology can provide individuals with disabilities with the tools they need to perform job tasks and participate in the workforce, increasing their opportunities for employment and economic independence.

Explanation:

Assistive technology refers to tools, devices, and software that are designed to support individuals with disabilities. In recent years, assistive technology has become increasingly important in promoting inclusion and accessibility for people with disabilities. The four reasons mentioned above provide a brief overview of the key benefits that assistive technology can offer, including increased accessibility, improved communication, enhanced learning opportunities, and greater employment opportunities. These benefits can help individuals with disabilities to participate more fully in society, achieve greater independence, and improve their quality of life.

Which layer of.the IOS architecture. Is responsible for graphic animation

Answers

Answer:

Media Layer

Explanation :

Architecture of IOS has below layers.

Core OS Layer: Core Services Layer Media Layer:  

Among above layers, Medial layer Enables Graphics, Audio & Video technology and Core Animation.

Explain the IT vendor selection and management processes

Answers

Answer:

The vendor management process includes a number of different activities, such as: Selecting vendors. The vendor selection process includes researching and sourcing suitable vendors and seeking quotes via requests for quotation (RFQs) and requests for proposal (RFPs), as well as shortlisting and selecting vendors. hope it helps

Which element of a digital camera captures an image

Which element of a digital camera captures an image

Answers

Answer:

The lens

Explanation:

Answer:

Pixel

Explanation:

The pixel of a digital camera captures an image

All digital images are made up of pixels – cameras capture images on their sensors in pixels

which one is exit controllefd loop ?
1.while loop
2. for loop
3. do loop
4. none

Answers

Answer:

2 is the ans

Explanation:

bye bye, gonna go to studyy

What is the difference between a ROM chip and a RAM chip?
A. A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure.
B. A ROM chip is volatile and will wipe its data in the case of a power failure. A RAM chip is non-volatile and will keep its data in the case of a power failure.
C. A ROM chip stores temporary data. A RAM chip stores permanent data.
D. A ROM chip stores permanent data. A RAM chip stores temporary data.

Answers

Answer:

A: A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure.

Explanation:

ROM chips were widely used at the time of the old consoles, because with it you had an extremely fast and non-volatile memory, but this technology is very expensive and started to use CDs in the Consoles, while the RAM memory is a memory of execution random (RAM = RANDOM ACESS MEMORY).

Julia has recorded a new song. Which input device would she have used?
O A.
OB.
O C.
D.
keyboard
projector
sound card
microphone

Answers

Answer: Microphone

Explanation:

Expert Explanation:

Input devices are a piece of equipment used to provide data and control signals to an information processing system

Easy Explanation:

We use input devices for devices like microphones, but based on your choices, it is best to choose a microphone.

Please mark brainliest if this helped!

In this c++ assignment, add an undo feature to a list of strings.


Here's a working class called Stringlist that implements a simple string list as a dynamic array. Stringlist_test.cpp has tests for all the methods in Stringlist.


Stringlist has one unimplemented method:

// Undoes the last operation that modified the list. Returns true if a

// change was undone, false otherwise.

//

bool undo()

{

cout << "Stringlist::undo: not yet implemented\n";

return false;

}

Your job is to implement undo, thus making Stringlist an undoable list.


Your implementation must follow these rules:


Do not delete any methods, or change the signatures of any methods, in Stringlist. You can change the implementation of existing methods if necessary. But they should still work the same way: your finished version of Stringlist with undo implement must still pass all the tests in Stringlist_test.cpp.

You can add other helper methods (public or private), functions, and classes/structs to Stringlist.h if you need them.

You must implement undo() using a private stack that is accessible only inside the Stringlist class. Implement the stack yourself as a linked list. Do not use arrays, vectors, or any other data structure for your stack.

Do not use any other #includes or #pragmas in Stringlist.h other than the ones already there.

When it's done, you'll be able to write code like this:


#include "Stringlist.h"

#include


using namespace std;


int main() {

Stringlist lst;

cout << lst << endl; // {}


lst.insert_back("one");

lst.insert_back("two");

lst.insert_back("three");

cout << lst << endl; // {"one", "two", "three"}


lst.undo();

cout << lst << endl; // {"one", "two"}


lst.undo();

cout << lst << endl; // {"one"}


lst.undo();

cout << lst << endl; // {}

}


Designing the Undo Stack


As mentioned above, you must implement undo() using at least one private stack implemented as a linked list inside the Stringlist class. You can modify Stringlist only as described at the start of this assignment.


examples of how specific methods should work.


Undoing insert_before


In code:


// lst == {"dog", "cat", "tree"}


lst.insert_before(3, "hat");

// lst == {"dog", "cat", "tree", "hat"}


lst.undo();

// lst == {"dog", "cat", "tree"}


lst.insert_before(1, "shoe");

// lst == {"dog", "shoe", "cat", "tree"}


lst.undo();

// lst == {"dog", "cat", "tree"}

Undoing set


For set, suppose that lst is {"yellow", "green", "red", "orange"}, and so lst.get(2) returns "red". If you call lst.set(2, "cow"), then you should push the operation set location 2 to "red" onto the undo stack, and then over-write location 2 with "cow".


In code:


// lst == {"yellow", "green", "red", "orange"}


lst.set(2, "cow");

// lst == {"yellow", "green", "cow", "orange"}


lst.undo();

// lst == {"yellow", "green", "red", "orange"}

Undoing remove_at


For remove_at

In code:


// lst == {"dog", "cat", "tree"}


lst.remove_at(1);

// lst == {"dog", "tree"}


lst.undo();

// lst == {"dog", "cat", "tree"}

Undoing operator=


For operator=,

In code:


// lst1 == {"dog", "cat", "tree"}

// lst2 == {"yellow", "green", "red", "orange"}


lst1 = lst2;

// lst1 == {"yellow", "green", "red", "orange"}

// lst2 == {"yellow", "green", "red", "orange"}


lst1.undo();

// lst1 == {"dog", "cat", "tree"}

// lst2 == {"yellow", "green", "red", "orange"}

As this shows, when you undo operator=, the entire list of strings is restored in one call to undo().


Important notes:


If lst1 and lst2 are different objects, then when lst2 is assigned to lst1 just the underlying string array of lst2 is copied to lst1. The lst1 undo stack is updated so that it can undo the assignment. The undo stack of lst2 is not copied, and lst2 is not modified in any away.


Self-assignment is when you assign a list to itself, e.g. lst1 = lst1;. In this case, nothing happens to lst1. Both its string data and undo stack are left as-is.


Undoing remove_all


For remove_all,

In code:


// lst == {"dog", "cat", "tree"}


lst.remove_all();

// lst == {}


lst.undo();

// lst == {"dog", "cat", "tree"}

Note that it should work the same way when lst is empty:


// lst == {}


lst.remove_all();

// lst == {}


lst.undo();

// lst == {}

Undoing Other Methods


undo() should undoall the other methods in Stringlist that are marked as "undoable" in the source code comments.


As mentioned above, undo() is not undoable. There is no "re-do" feature in this assignment.


Each method in Stringlist.h marked "undoable" should work correctly with undo(). This also includes the correct behaviour for the Stringlist copy constructor (which should not copy the undo stack).

The markers tests should run correctly, including with no memory leaks according to valgrind.

Answers

To implement the undo feature in the Stringlist class, you will need to modify the existing class and add a private stack implemented as a linked list. Here are the steps to follow:

How to write the program code

1. In the Stringlist class in Stringlist.h, add a private struct called `UndoNode` to represent each node in the undo stack. Each node should store the necessary information to undo an operation (e.g., the method name, the arguments, and any other relevant data).

```cpp

private:

   struct UndoNode {

       std::string method;  // The method name

       // Add other necessary data for the specific method being undone

       // ...

       UndoNode* next;  // Pointer to the next node in the stack

       UndoNode(const std::string& m) : method(m), next(nullptr) {}

   };

```

2. Add a private member variable `undoStack` of type `UndoNode*` to the Stringlist class to keep track of the undo stack.

```cpp

private:

   // Other private member variables

   UndoNode* undoStack;

```

3. Modify the undoable methods in the Stringlist class to push the necessary information onto the undo stack before performing the operation. For example, in the `insert_before` method:

```cpp

void insert_before(size_t index, const std::string& str) {

   // Push the operation onto the undo stack

   UndoNode* undoNode = new UndoNode("insert_before");

   // Add necessary data to the undoNode (e.g., index and str)

   // ...

   // Perform the actual operation

   // ...

   // Add the undoNode to the top of the stack

   undoNode->next = undoStack;

   undoStack = undoNode;

}

```

4. Implement the `undo` method to pop the top node from the undo stack and perform the undo operation based on the stored information. You will need to handle each operation individually in the `undo` method.

```cpp

bool undo() {

   if (undoStack == nullptr) {

       std::cout << "Undo stack is empty." << std::endl;

       return false;

   }

   UndoNode* undoNode = undoStack;

   undoStack = undoStack->next;

   // Perform the undo operation based on the stored information in undoNode

   if (undoNode->method == "insert_before") {

       // Undo the insert_before operation

       // ...

   } else if (undoNode->method == "set") {

       // Undo the set operation

       // ...

   }

   // Handle other operations...

   delete undoNode;

   return true;

}

```

Remember to handle memory deallocation appropriately and update other methods marked as "undoable" accordingly.

Read more on Java codes here https://brainly.com/question/25458754

#SPJ1

Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest combination of coins that the user has. For example, 27 cents is 1 quarter, 0 nickel, and 2 pennies. That is 27=1*25+0*5+2*1.
Example program run 1:
Enter number of cents: 185
Pennies: 0
Nickels: 0
Dimes: 1
Quarters: 7
Example program run 2:
Enter number of cents: 67
Pennies: 2
Nickels: 1
Dimes: 1

Answers

Answer:

The program in Python is as follows:

cents = int(input("Cents: "))

qtr = int(cents/25)

cents = cents - qtr * 25

dms = int(cents/10)

cents = cents - dms * 10

nkl = int(cents/5)

pny = cents - nkl * 5

print("Pennies: ",pny)

print("Nickels: ",nkl)

print("Dimes: ",dms)

print("Quarters: ",qtr)

Explanation:

The program in Python is as follows:

cents = int(input("Cents: "))

This calculate the number of quarters

qtr = int(cents/25)

This gets the remaining cents

cents = cents - qtr * 25

This calculates the number of dimes

dms = int(cents/10)

This gets the remaining cents

cents = cents - dms * 10

This calculates the number of nickels

nkl = int(cents/5)

This calculates the number of pennies

pny = cents - nkl * 5

The next 4 lines print the required output

print("Pennies: ",pny)

print("Nickels: ",nkl)

print("Dimes: ",dms)

print("Quarters: ",qtr)

You are given an array of integers. Your task is to create pairs of them, such that every created pair has the same sum. This sum is not specified, but the number of created pairs should be the maximum possible. Each array element may belong to one pair only.

Write a function

class Solution public int
solution (int[] A); }

that, given an array A consisting of N integers, returns the maximum possible number of pairs with the same sum.

Examples:
1. Given A = [1, 9, 8, 100, 2], the function should return 2. The pairs are (A[0]. A[1]) and (A[2], A[4]); the sum of each pair is 10.
2. Given A = [2, 2, 2, 3], the function should return 1. Although, for instance, A[0]+A[1] = A[0]+A[2], the pairs (A[0], A[1]) and (A[0], A[2]) cannot exist at the same time, because they both contain a common element, A[0].

Answers

Complete PYTHON code with explanation:

def solution(nums):

# form a dictionary which will store

# the possible pair's sum as key and the indexs used for the sum

sumAndpair = {}

# for every element in list nums

for i in range(len(nums)):

# iterate on all the element to the right of current element

for j in range(i+1,len(nums)):

# calculate the sum of current 2 elements

sum = nums[i] + nums[j]

# if the sum is already in the dictionay

if sum in sumAndpair:

# check if the current index have already been used

# if yes, then continue to next iteration

# this will make sure that same number have not been used more than once

if i in sumAndpair[sum] or j in sumAndpair[sum]:

continue

# if no, then append the current i and j to the value of current sum

else:

sumAndpair[sum].append(i)

sumAndpair[sum].append(j)

# if the current sum is not in the dictionary

# add the sum as key with a list of index used

else:

sumAndpair[sum] = [i, j]

# copmpute the maximum possible number of pairs with the same sum

# which will be the maximum length value out of all the possible sum

# this maximum length will be divided by 2, since a pair of i, j contrinute to one sum

maxLength = 0

for key, value in sumAndpair.items():

if maxLength

what is the abbreviation of IP address​

Answers

Answer: Internet Protocol Address

Explanation: IP Address is the abbreviation of Internet Protocol Address

Hope this helps

--Wavey

the meaning of the abbreviation of IP address is: Internet Protocol address(IP address)

sorry if that isn't what you meant, but hope this helps

What is the length of the following array: byte[] data = { 12, 34, 9, 0, -62, 88 };a. 1b. 5c. 6d. 12

Answers

Answer:

C: 6

Explanation:

The values are separated by ` ,`  with this it is enough to count all the numbers that are separated by ` , ` making it have 6 elements

Following are the program to calculate the length of the array:

Program Explanation:

Defining a header file.Defining the main method.Defining an integer type array "data" that holds a given value.In the next step, a print method is declared that uses the sizeof method that calculates the length of the array.

OR

In the given array all the element is separated by the "," symbol, and when the user counts the array value that is equal to 6.

Program:

#include <iostream>//header file

using namespace std;

int main()//main method

{

   int data[] = { 12, 34, 9, 0, -62, 88 };//defining an integer array that hold given value

   cout<<sizeof(data)/sizeof(data[0])<<endl;//using print method calculate and print the size of array

   return 0;

}

Output:

Please find the attached file.

Therefore, the final answer is "Option c".

Learn more:

brainly.com/question/4506055

What is the length of the following array: byte[] data = { 12, 34, 9, 0, -62, 88 };a. 1b. 5c. 6d. 12

___________ is a global issue and there is a requirement to find out the interdependencies among the customers and suppliers.

Answers

Answer:

Supply chain disruption is a global issue and there is a requirement to find out the interdependencies among the customers and suppliers.

Explanation:

The context suggests we are discussing some type of challenge involving the relationships between customers, suppliers and a larger supply chain. A "global issue" involving "interdependencies among the customers and suppliers" points to potential supply chain disruption or issues in a supply network.

Since there is a "requirement to find out the interdependencies" between customers and suppliers, this suggests we need to identify and analyze how they are connected and dependent upon each other in order to resolve the broader "global issue." This information could then be used to make changes, build resilience or manage risks in the supply chain.

Hope this helps!

Answer:

Internet is global issues

Read an integer value representing a year. Determines if the year is a leap year. Prompts the user to enter another year or quit.

A year is a leap year if −

1. It is evenly divisible by 100
2. If it is divisible by 100, then it should also be divisible by 400
3. Except this, all other years evenly divisible by 4 are leap years.

sample run:
Enter a year (0 to quit): 2024
2024 is a leap year

Enter a year (0 to quit): 1997
1997 is not a leap year

Enter a year (0 to quit):

Answers

The code to verify if an year is a leap year is developed throughout this answer.

Code to verify if the year is a leap year

We are going to develop a C code, hence first we declare the main function, as follows:

int main(){

return 0;

}

Then, we declare the integer variable to store the year, as follows:

int main(){

int year;

return 0;

}

Then the year is read in a loop, until the year read is different of 0.

int main(){

int year;

do{

printf("Enter a year (0 to quit):\n");

scanf("%d", & year);

}while(year != 0);

return 0;

}

Then conditional clauses are inserted to verify if the year number is an acceptable input (non-negative number), and if it is a leap year.

do{

printf("Enter a year (0 to quit):\n");

scanf("%d", & year);

if(year > 0){

//Calculates the remainder of the division by 4.

if(year % 4 == 0){

//If divisible by 4 but not by 100, it is a leap year.

if(year % 100 != 0){

printf("%d is a leap year\n", year);

}

//If divisible by 100, it is only a leap year if divisible by 400 also

else{

if(year%400 == 0){

printf("%d is a leap year\n", year);

}

else{

printf("%d is not a leap year\n", year);

}

}

}

//If not divisible by 4, then it is a not leap year

else{

printf("%d is not a leap year\n", year);

}

}

}while(year != 0);

return 0;

}

Learn more about leap years at https://brainly.com/question/24224214

#SPJ1

Which method might an attacker use to redirect login via information gained by implementing JavaScript on a webpage the user believes is legitimate

Answers

Answer:

It´s called Cross Site-Scripting/Clickjacking

Explanation:

Cross Site Scripting is a security exploit which allows an attacker to inject malicious client-side code onto a website.

Synchronization barriers are a common paradigm in many parallel applications.

a. True
b. False

Answers

Answer:

I am not sure on this one I am guessing it is True

Explanation:

Explain with examples:
What are the reasons of a successful and unsuccessful software project?

Answers

Answer:

A good starting point is by addressing some of the key reasons software projects fail.

Explanation:

Not Enough Time. ...

Insufficient Budget. ...

Poor Communication. ...

Never Reviewing Project Progress. ...

Inadequate Testing. ...

Testing in the Production Environment. ...

Lack of Quality Assurance. ...

Not Conforming to Industry Standards.

User involvement, management support, reasonable requirements, and accurate projections are some of the most frequent aspects that contribute to software project success.

What is a software project?

A software project is the entire process of developing software, from gathering requirements to testing and maintenance, carried out in accordance with execution techniques over a predetermined amount of time to produce the desired software output.

Some of the most frequent factors that influence the success of software projects are user interaction, management support, fair needs, and realistic estimates.

Application bug or error, environmental conditions, infrastructure or software failure, virus, hacker, network/hardware failure, and operator error are the main causes of software project failure.

According to the study, project success and failure are most heavily influenced by the degree of customer/user interaction, software process management, and estimation and timeline.

Thus, these are the reasons of a successful and unsuccessful software project.

For more details regarding software project, visit:

https://brainly.com/question/3818302

#SPJ2

please answer urgently. See the attached image

please answer urgently. See the attached image

Answers

Based on the information, the tight upper bound for T(h) is O(h).

How to explain the information

The algorithm visits at most x children in line 3, where x is the number of keys in the current node.

T(h) ≤ T(h-1) + x

For a B-Tree of height 0, i.e., a single node, the algorithm just compares the key with the node key and returns. Therefore, T(0) = Θ(1).

We can express T(h) as a sum of terms of the form T(h-i) for i = 1 to h:

T(h) ≤ T(h-1) + x

T(h-1) ≤ T(h-2) + x

T(h-2) ≤ T(h-3) + x

...

T(2) ≤ T(1) + x

T(1) ≤ T(0) + x

Adding all these inequalities, we get:

T(h) ≤ T(0) + xh

Substituting T(0) = Θ(1), we get:

T(h) = O(h)

Therefore, the tight upper bound for T(h) is O(h).

Learn more about upper bound on

https://brainly.com/question/28725724

#SPJ1

directory definition please nedd it real quick

Answers

Answer:

a book listing individuals or organizations alphabetically or thematically with details such as names, addresses, and phone numbers.

please note, my working hours may be different than yours. please don't feel obligated to respond outside of your normal business hours unless necessary.

Answers

A statement "please note, my working hours may be different than yours. please don't feel obligated to respond outside of your normal business hours unless necessary." this means that more benefit to change to flexible work.

What is flexible work?

Individual behavior describes the behaviors, responses, reactions, and ways in which a person behaves when they are in a certain situation. It consists of a variety of reactions to both internal and external stimuli. Individual habits and actions are frequently linked, either because of time restraints, resource accessibility, social connections, or biological inclinations. For instance, drinkers are more likely to smoke than non-drinkers, and physically unfit people are also less likely to make an effort to prepare meals at home.

Learn more about flexible work: https://brainly.com/question/29316477

#SPJ4

Name some areas in which computer are being used​

Answers

Answer:

Computers play a role in every field of life. They are used in homes, business, educational institutions, research organizations, medical field, government offices, entertainment, etc.

Explanation:

Home

Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. They provide communication through electronic mail. They help to avail work from home facility for corporate employees. Computers help the student community to avail online educational support.

Medical Field

Computers are used in hospitals to maintain a database of patients’ history, diagnosis, X-rays, live monitoring of patients, etc. Surgeons nowadays use robotic surgical devices to perform delicate operations, and conduct surgeries remotely. Virtual reality technologies are also used for training purposes. It also helps to monitor the fetus inside the mother’s womb.

Entertainment

Computers help to watch movies online, play games online; act as a virtual entertainer in playing games, listening to music, etc. MIDI instruments greatly help people in the entertainment industry in recording music with artificial instruments. Videos can be fed from computers to full screen televisions. Photo editors are available with fabulous features.

Industry

Computers are used to perform several tasks in industries like managing inventory, designing purpose, creating virtual sample products, interior designing, video conferencing, etc. Online marketing has seen a great revolution in its ability to sell various products to inaccessible corners like interior or rural areas. Stock markets have seen phenomenal participation from different levels of people through the use of computers.

Education

Computers are used in education sector through online classes, online examinations, referring e-books, online tutoring, etc. They help in increased use of audio-visual aids in the education field.

Government

In government sectors, computers are used in data processing, maintaining a database of citizens and supporting a paperless environment. The country’s defense organizations have greatly benefitted from computers in their use for missile development, satellites, rocket launches, etc.

Banking

In the banking sector, computers are used to store details of customers and conduct transactions, such as withdrawal and deposit of money through ATMs. Banks have reduced manual errors and expenses to a great extent through extensive use of computers.

Business

Nowadays, computers are totally integrated into business. The main objective of business is transaction processing, which involves transactions with suppliers, employees or customers. Computers can make these transactions easy and accurate. People can analyze investments, sales, expenses, markets and other aspects of business using computers.

Training

Many organizations use computer-based training to train their employees, to save money and improve performance. Video conferencing through computers allows saving of time and travelling costs by being able to connect people in various locations.

Arts

Computers are extensively used in dance, photography, arts and culture. The fluid movement of dance can be shown live via animation. Photos can be digitized using computers.

Science and Engineering

Computers with high performance are used to stimulate dynamic process in Science and Engineering. Supercomputers have numerous applications in area of Research and Development (R&D). Topographic images can be created through computers. Scientists use computers to plot and analyze data to have a better understanding of earthquakes.

Malaysia..HP,Lenovo,dell

India,Asser,Asus

apple,ibm, Microsoft

Write an expression that will cause the following code to print "I am a teenager" if the value of userAge is less than 20. Zybooks won't let me edit any other line, and UserAge > 20 was marked wrong. It won't accept the ≥ symbol either.

Write an expression that will cause the following code to print "I am a teenager" if the value of userAge

Answers

Answer:

Replace

if userAge > 20

with

userAge > 19

Explanation:

if userAge > 20  checks if age is 21, 22, 23, 24........

The else condition which prints "I am a teenager" checks if age is 20, 19, 18....

Notice that 20 is inclusive of the else condition; this shouldn't be because for userAge to be less than 20, 20 isn't inclusive

To solve this,

Replace if userAge > 20 with userAge > 19

So that, the else

The else condition which prints "I am a teenager" checks if age is 19, 18, 17, 16....

How to use this program

Answers

Answer:

there is no problem

Explanation:

but i hope i can help one day

Other Questions
What order do these go in?Jesus heals the sick, preaches forgiveness, and challenges traditional religious practice.b.Nero blames the fire of Rome on the Christians.c.Persecution of Christians becomes policy in Rome. Christians are killed by gladiators, mauled by lions, and burned alive.d.Peter's shadow has the power to heal people.e.Jesus is crucified by Rome.f.Saul becomes Paul when this Pharisee becomes a Christian apostle. A polar bear in a zoo weighs 3 times more than a baby elephant. Both of them together weigh 700 kilograms. How much does the polar bear weigh? An object is orbiting at a distance of 10,000 km from the center of a planet. The gravitational force between the object and the planet is 10.0 N. What would the gravitational force be if the object were orbiting at a distance of 5,000 km?A. 2.5 NB. 5 NC. 20.0 ND. 40.0 NSHOW WORK PLEASE!! TRUE / FALSE. to transcribe something is to make an identical copy (i.e., if the original is dna, the transcribed copy is also dna). what is hemosiderin? group of answer choices an enzyme that helps in absorption of iron a protein that carries iron in the blood a storage protein for iron another term for ferritin the part of iron that is not used by the body Which examples are part of the biosphere?Choose all that apply:A bird flying through the air.A worm living underground.Heavy rainfall that falls from the sky.A large rock that is part of a mountain. That the Egyptians used a calendar, illustrates that the Egyptians made great advances in what field? Solve the equation 3(x - 4) = 7. What would be the next step in simplifying by the distribution property? 3x - 4 = 7 3x + 12 = 7 3x + 4 = 7 3x - 12 = 7 a 2.3-cm-diameter solenoid is wrapped with 1200 turns per meter. 0.60 cm from the axis, the strength of an induced electric field is 6.0104 v/m . distinguish between electromagnetic radiation that is reflected and electromagnetic radiation that is refracted Marcus and Narcissa Whitman were missionaries that settled in Oregon.Please select the best answer from the choices providedOTOF How Can Euphemism function for unpleasant words .. What is the variable in the expression below?3y? After a traumatic car accident a patient explains that they are unable to see anything nor are they able to hear out of their left ear. however, upon examination, both the eyes and left ear appeared to be functioning perfectly. Provide a possible explanationfor these symptoms.13 Scenario 1A specific department within an organization has a high turnover rate; employees of this departmenthave a shorter average tenure than those of other departments in the company. Skilled workers areleaving and the worker population contains a high percentage of novice workers. Ms Joyce Lynn has noidea what is going on and wants to know more about what is happening. how many times is god mentioned in the constitution Calculate the translational speed of a cylinder when it reaches the foot of an incline 7.20 m high. Assume it starts from rest and rolls without slipping.Express your answer using three significant figures and include the appropriate units. Thank you!! Based on the map provided, industrialization in the eighteenth and nineteenth century had the most significant direct impact on which of the following?a.Rural and farming lifeb.Communication and transportationc.Religious development and spreadd.Legal and bureaucratic institutions In what ways can you see those values working in contemporary U.S. society? In what ways can you see them failing? The mean number of hours that American women who worked outside of the home per week was 34.6 hours with a standard deviation of 13.6 hours. If 37 American women who worked outside of the home are randomly selected, what is the probability their mean hours worked per week is between 32 and 36 hours per week