How would you describe your experiences with social media, either for yourself or for people you know? Good, bad, or in the middle? Why?

Answers

Answer 1

Answer: I would say it’s both good and bad. Firstly, it’s good because you’re able to communicate with people from all over the world, whether it’s a friend or family member. But on the other hand it’s bad too, because there are manny dangers of being online, such as having your personal information stolen, or being cyber-bullied. So while it is good for communication purposes, it does have it’s downsides.


Related Questions

Which of these is NOT an area that the documentary experts envisioned interaction design moving into?

a.
Internet of Things

b.
E-commerce

c.
Medical

d.
Social change

Answers

Social change is not an area that the documentary experts envisioned interaction design moving into.

Interaction design is a field that focuses on creating meaningful and engaging experiences for users when they interact with digital products, systems, or services.

Over the years, interaction design has expanded its reach into various domains and industries, exploring new ways to improve user experiences and address specific needs.

The areas where interaction design has been envisioned to have a significant impact include:

Internet of Things

E-commerce

Medical

Social change while interaction design can contribute to social change indirectly by designing user experiences that support social causes or platforms for social activism, it is not typically considered as a primary domain for interaction design

To learn more on Interaction design click:

https://brainly.com/question/14530735

#SPJ4

WILL GIVE BRAINLIEST!! 20 POINTS!!!

You want to create a CSS rule to apply a certain font to a division called “memory.” Which line of HTML should be used before the text that you want to apply the rule to?

A. memory id="div#1"

B. div id="memory"

C. memory id="div"

D. div="memory"

Answers

The answer to this question is B

Answer:

Im pretty sure its b, hope this helps

i need help. match the commands to the task it helps to complete

i need help. match the commands to the task it helps to complete

Answers

Answer is
1:4
2:3
3:2
4:1

Please identify the problem and make the adjustments as needed. Deprecation expense if $20,000 for previous year Equipment repair On July 1,2022,one of our server/equipment broke down.The cost of $11,500 in repairs is included in repairs and maintenance expenses.The repair company claims the repairs will increase the server's service capacity, increase the cycle time by 1o%,and increase capacity by 5% to 10%. The programmer staff really did see a difference in the performance of the server after the repairs.The server is expected to last another five years beyond the date of repair. AirSoft uses the straight-line method for amortization purposes and pro-rates for the number of months the asset was owned in the year.

Answers

The problem in this scenario is to determine how to account for the \($11,500\) in repairs to the server/equipment that broke down. We need to consider the impact of the repairs on the server's service capacity, cycle time, and capacity.

First, let's calculate the increase in service capacity. The repair company claims that the repairs will increase the server's service capacity by 5% to 10%. Let's assume a conservative estimate of 5% increase. To calculate this, we take 5% of the original service capacity. If the original service capacity was x, the new service capacity would be\(x + 0.05x = 1.05x\).

Next, let's calculate the increase in cycle time. The repair company claims that the repairs will increase the cycle time by 10%. To calculate this, we take 10% of the original cycle time. If the original cycle time was y, the new cycle time would be\(y + 0.1y = 1.1y\).
To know more about scenario visit:

https://brainly.com/question/32720595

#SPJ11

your office has been sharing an inkjet printer connected to a pc with very limited resources. they ask you to upgrade the printer, so you decide to get a laser printer that has a built-in nic (network interface card). what type of printing will you set up

Answers

To utilize the new laser printer with a built-in NIC, you would set up network printing.

What is network printing?

Network printing refers to the ability to print to a printer from multiple devices on a network without the need for a direct physical connection to the printer.

Network printing allows multiple devices on the network to access and print to the printer without the need for a direct physical connection to the printer. This setup would be more efficient and convenient than the previous configuration, as it would eliminate the need for the PC to act as a print server and allow all devices on the network to print to the printer directly.

Learn more about network printing on:

https://brainly.com/question/29351223

#SPJ1

Recommend a minimum of 3 relevant tips for people using computers at home, work or school or on their SmartPhone. (or manufacturing related tools)

Answers

The three relevant tips for individuals using computers at home, work, school, or on their smartphones are ensure regular data backup, practice strong cybersecurity habits, and maintain good ergonomics.

1)Ensure Regular Data Backup: It is crucial to regularly back up important data to prevent loss in case of hardware failure, accidental deletion, or malware attacks.

Utilize external hard drives, cloud storage solutions, or backup software to create redundant copies of essential files.

Automated backup systems can simplify this process and provide peace of mind.

2)Practice Strong Cybersecurity Habits: Protecting personal information and devices from cyber threats is essential.

Use strong, unique passwords for each online account, enable two-factor authentication when available, and regularly update software and operating systems to patch security vulnerabilities.

Be cautious while clicking on email attachments, downloading files, or visiting suspicious websites.

Utilize reputable antivirus and anti-malware software to protect against potential threats.

3)Maintain Good Ergonomics: Spending extended periods in front of a computer or smartphone can strain the body.

Practice good ergonomics by ensuring proper posture, positioning the monitor at eye level, using an ergonomic keyboard and mouse, and taking regular breaks to stretch and rest your eyes.

Adjust chair height, desk setup, and screen brightness to reduce the risk of musculoskeletal problems and eye strain.

For more questions on computers

https://brainly.com/question/24540334

#SPJ8

the declaration of a friend function cannot be placed within the private part of the class. (True or False)

Answers

A friend function cannot have its declaration in the class's private area. The statement is untrue.

Where do you in C++ declare a friend function?No class can declare itself to be a friend of a function. Use the buddy keyword in a class definition to give a non-member function or other class access to the class's private and protected members. It is possible to declare a type parameter as a friend in a template definition. friend function syntax: class class name friend data type function name(arguments/s);; The word "friend" comes before the function in the declaration above. The friend function can be defined anywhere in the program just like any other C++ function. As seen in the example below, a friend keyword is used to declare a function inside of a class. class className........... buddy returnType functionName(arg list); The friend function is declared inside the class whose members are to have access to secret and protected data, as was already mentioned.

To learn more about friend function, refer to:

https://brainly.com/question/15073021

problems in this exercise refer to the following sequence of instructions, and assume that it is executed on a five-stage pipelined datapath: add x15, x12, x11 ld x13, 4(x15) ld x12, 0(x2) or x13, x15, x13 sd x13, 0(x15)

Answers

The provided sequence of instructions demonstrates the execution of a five-stage pipelined datapath, which enhances processor throughput by overlapping instruction execution stages.

The given sequence of instructions is executed on a five-stage pipelined datapath. Let's break down the sequence step by step:

1. Instruction: add x15, x12, x11
  - This instruction adds the values in registers x12 and x11 and stores the result in register x15.

2. Instruction: ld x13, 4(x15)
  - This instruction loads the value from memory at the address stored in register x15 plus an offset of 4. The loaded value is stored in register x13.

3. Instruction: ld x12, 0(x2)
  - This instruction loads the value from memory at the address stored in register x2 plus an offset of 0. The loaded value is stored in register x12.

4. Instruction: or x13, x15, x13
  - This instruction performs a bitwise OR operation between the values in registers x15 and x13, and stores the result in register x13.

5. Instruction: sd x13, 0(x15)
  - This instruction stores the value in register x13 into memory at the address stored in register x15 plus an offset of 0.

In a pipelined datapath, instructions are divided into different stages, and multiple instructions can be in different stages simultaneously. This allows for better performance by overlapping the execution of instructions.

For example, in the first stage (instruction fetch), the next instruction is fetched from memory. In the second stage (instruction decode and register fetch), the operands are decoded and values are fetched from the registers. In the third stage (execution), the operation is performed. In the fourth stage (memory access), memory operations are performed. In the fifth stage (write back), the result is written back to the register.

In this case, each instruction goes through these stages one by one, and the subsequent instructions start their execution while the previous instructions are still in the pipeline. This pipelining technique helps to improve the overall throughput of the processor.

Learn more about pipelined datapath: brainly.com/question/31559033

#SPJ11

What is the output of this program? age = 4 if age > 5: print("more") else: print("less") Output:

Answers

Answer:

less

Explanation:

The program is age = 4 if age > 5: print("more") else: print("less"). The age is less than 5, so the output will be less.

What is a program?

"The program can also be expressed as a binary code, but expressing it in a higher programming language makes it easier for people to grasp."

The only language that the computer understands is binary, which is just a version of 0 and 1, but the user cannot understand binary. It will translate into highly understandable language for the user.

Programming that is designed using an object-oriented approach does so in order to achieve the desired goal.

Data input is required for programs. The program uses (processes) this data, and as a result, data (or information) is output.

Therefore, the output will be less.

To learn more about the output of the program, refer to the below link:

https://brainly.com/question/18079696

#SPJ5

for different initializations of k, the k-nn algorithm will give the same prediction results. true or false

Answers

False. Different initializations may generate rather different clustering results (some could be far from optimal)  for k and k-nn algorithms.

Why do you use the term algorithm?

An algorithm is a method used to carry out a computation or solve a problem. Algorithms perform as a precise set of commands that carry out preset activities consecutively in either hardware equipment or software-based routines.

What three algorithms are examples?

Common examples of algorithms include the recipe for baking a cake, the method we use to solve a long division challenge, doing laundry, and the operation of a search engine.

To know more about the algorithm visit:

https://brainly.com/question/22984934

#SPJ4

Select the correct answer.
Which of the following is a scientific language used to create data science applications?
A. C
B. Java
C.FORTRAN
D. Swift
E. Python

I REALLY NEED HELP ASAP!!!!

Answers

The option of scientific language used to create data science applications is Python.

What is Python?

Computer programming is known to be the act or process that people often use to write code that are meant to instructs how a computer, application or software program needs to run.

Note that Python is the  most commonly used data science programming language. It is regarded as an open-source, very easy to learn and use language.

Learn more about Python from

https://brainly.com/question/12684788

Answer:

FORTRAN

Explanation:

Plato/edmentum

what process prepares a hard drive for use by an operating system?

Answers

Answer: The answer is the Boot as the boot sequence prepares 1 the either floppy or another storage device by starting it up and reading it 2 Bios 3 the operating system to be used by the user 4 internet so the booting of the machine.

Explanation:

State the meaning of (1) plaintext (in) encryption (iii) decryption

Answers

(1) Plain text is a term that refers to text that has not been encrypted or coded. Plain text is plain, simple, and straightforward. It can be interpreted and read by anybody.

Plaintext is the data that is going to be encoded, while ciphertext is the data that has already been encoded (encrypted).Encryption is the process of converting plain text into a coded language (ciphertext) so that it can only be read by authorized people. In cryptography, encryption is the procedure of encoding information so that it becomes unreadable to anybody except the intended recipient.

(iii) Decryption is the process of converting encrypted or coded information (ciphertext) back into readable text (plaintext). In cryptography, decryption is the process of converting ciphertext into plaintext, which is the original message or data. When an encrypted message is received, it must be decrypted in order to be read by the receiver.

To know more about coded visit:

https://brainly.com/question/31228987

#SPJ11


Can Anyone see what's wrong in this
this is not working why ?
you can see in picture its not working why ?
please help me
can u see what the problem

Can Anyone see what's wrong in this this is not working why ?you can see in picture its not working why

Answers

do you mean the highlighted part, "<img scr = "https : // images. app. goo. gl?"

Write an assembly language program which will multiply x by y. The final answer should be stored into memory location A000H.
You may assume that memory location B000H is holding the value of x, and memory location B001H is holding the value of y.
Your program design must include a loop. You may assume that your program will begin execution at line 0000H.

Answers

This program multiplies the values of x and y using a loop and stores the result in memory location A000H.


Here is an assembly language program to multiply x by y and store the result in memory location A000H:

0000H: MOV AX, B000H ; move the value of x from memory location B000H to register AX
0003H: MOV BX, B001H ; move the value of y from memory location B001H to register BX
0006H: MOV CX, 0000H ; initialize CX to zero
0009H: CMP BX, 0000H ; compare BX to zero
000CH: JE 0016H ; if BX is zero, jump to 0016H
000FH: ADD CX, AX ; add the value of AX to CX
0012H: DEC BX ; decrement BX by one
0013H: JMP 0009H ; jump back to 0009H
0016H: MOV A000H, CX ; move the value of CX to memory location A000H


The program begins by moving the value of x from memory location B000H to register AX, and the value of y from memory location B001H to register BX. It then initializes register CX to zero, which will hold the result of the multiplication.

The program then enters a loop that will execute until the value of BX is zero. In each iteration of the loop, the program adds the value of AX to the current value of CX using the ADD instruction. It then decrements the value of BX by one using the DEC instruction, and jumps back to the beginning of the loop using the JMP instruction.

When the value of BX becomes zero, the program jumps to the MOV instruction at 0016H, which moves the value of CX to memory location A000H.

Know more about the memory location

https://brainly.com/question/12996770

#SPJ11

How many times can a simulation be repeated?

Answers

Answer:

Explanation:

A general idea is that you should repeat the simulation until the results converge. An easy but illustrative example of this is that we want to see if the R function rbinom is accurate in simulating a coin toss with a given probability. We will simulate one coin toss 10000 times, and plot the percentage of heads against the number of coin tosses:

set.seed(1)

n <- 10000

result <- NULL

percent <- NULL

for (i in 1:n) {

 result[i] <- rbinom(1,1,0.5)

 percent[i] <- sum(result)/i

}

plot(seq(1:10000),percent, type="l")

abline(0.5, 0, lty=2)

What is the purpose of a Post Mortem Review? (5 points)

Answers

Answer:

The interpretation of the discussion is characterized throughout the explanation portion below.

Explanation:

A post-mortem investigation, as well widely recognized as the autopsy, has become a post-mortem assessment of that same body. This same goal of some kind of post-mortem should be to investigate what happened. Post-mortems have been performed by pathologists (Physicians specializing in considering the mechanisms as well as tends to cause including its illness).

your company plans to replace several computers that run windows 8.1 with new devices that run windows 10. you plan to migrate user profiles to windows 10 by using the user state migration tool (usmt). which usmt command should you run on the windows 8.1 computers?

Answers

To migrate user profiles from Windows 8.1 to Windows 10 using the User State Migration Tool (USMT), you should run the **ScanState** command on the Windows 8.1 computers.

The ScanState command is used to collect user profiles and their associated settings, files, and data. It creates a compressed migration store containing the user profiles and data that can be restored on the new Windows 10 devices using the LoadState command.

By running the ScanState command on the Windows 8.1 computers, you can capture the necessary user profiles and their settings, ensuring a smooth transition to the new Windows 10 devices. Once the migration store is created, you can then use the LoadState command on the Windows 10 devices to restore the user profiles and data.

It's important to note that the USMT is a command-line tool provided by Microsoft, specifically designed for user profile migration during operating system upgrades or system deployments. It helps streamline the process of transferring user data and settings to new devices or updated operating systems, ensuring a consistent user experience.

Learn more about Windows here

https://brainly.com/question/29892306

#SPJ11

use humorous and monster in a sentence.

Answers

Answer: Here are a few...

1) The monstrous elephant trampled through the jungle crushing everything in its path.

2) Because it was so monstrous, the maid often got lost in the massive home she cleaned.

3) Monstrous amounts of foods are needed to feed the hundreds of refugees who showed up at the soup kitchen.

Explanation:

I hope this helps :D

Do you have any sprites for Friday Night Funkin?

I am making mods and any sprites you have are fine. They just need to follow the idle rule and be appropriate :)

Answers

Answer:

id.k t

Explanation:

Im on Edge 2021 and i did an assignment that says, "Processing." The assignment won't give me a grade and says it is overdue. what can i do to fix this?

Answers

Answer:

you could send a email to your teacher to fix the problem

Explanation:

Cardinality Sorting The binary cardinality of a number is the total number of 1 's it contains in its binary representation. For example, the decimal integer
20 10

corresponds to the binary number
10100 2

There are 21 's in the binary representation so its binary cardinality is
2.
Given an array of decimal integers, sort it ascending first by binary cardinality, then by decimal value. Return the resulting array. Example
n=4
nums
=[1,2,3,4]
-
1 10

→1 2

, so 1 's binary cardinality is
1.
-
2 10

→10 2

, so 2 s binary cardinality is
1.
-
310→11 2

, so 3 s binary cardinality is 2 . -
410→100 2

, so 4 s binary cardinality is 1 . The sorted elements with binary cardinality of 1 are
[1,2,4]
. The array to retum is
[1,2,4,3]
. Function Description Complete the function cardinalitysort in the editor below. cardinalitysort has the following parameter(s): int nums[n]: an array of decimal integi[s Returns int[n] : the integer array nums sorted first by ascending binary cardinality, then by decimal value Constralnts -
1≤n≤10 5
-
1≤
nums
[0≤10 6
Sample Case 0 Sample inputo STDIN Function
5→
nums [] size
n=5
31→
nums
=[31,15,7,3,2]
15 7 3 Sample Output 0 2 3 7 15 31 Explanation 0 -
31 10

→11111 2

so its binary cardinality is 5 . -
1510→1111 2

:4
-
7 10

→111 2

:3
3 10

→11 2

:2
-
210→10 2

:1
Sort the array by ascending binary cardinality and then by ascending decimal value: nums sorted
=[2,3,7,15,31]
.

Answers

Using the knowledge in computational language in C++ it is possible to write a code that array of decimal integers, sort it ascending first by binary cardinality, then by decimal value

Writting the code;

#include <iostream>

using namespace std;

int n = 0;

// Define cardinalitySort function

int *cardinalitySort(int nums[]){

   // To store number of set bits in each number present in given array nums

   int temp[n];

   int index = 0;

   /*Run a for loop to take each numbers from nums[i]*/

   for(int i = 0; i < n; i++){

       int count = 0;

       int number = nums[i];

       // Run a while loop to count number of set bits in each number

       while(number > 0) {

           count = count + (number & 1);

           number = number >> 1;

       }

       // Store set bit count in temp array

       temp[index++] = count;

   }

   

   /*To sort nums array based upon the cardinality*/

   for(int i = 0; i < n; i++){

       for(int j = 0; j < n-i-1; j++){

           if(temp[j] > temp[j+1]){

               int tmp = nums[j];

               nums[j] = nums[j+1];

               nums[j+1] = tmp;

           }

       }

   }

   // Return resulting array

   return nums;

   

}

// main function

int main(){

   n = 4;

   // Create an array nums with 4 numbers

   int nums[] = {1, 2, 3, 4};

   int *res = cardinalitySort(nums);

   // Print resulting array after calling cardinalitySort

   for(int i = 0; i < n; i++){

       cout << res[i] << " ";

   }

   cout << endl;

   return 0;

}

public class CardinalitySortDemo {

// Define cardinalitySort function

public static int[] cardinalitySort(int nums[]){

    // To store number of set bits in each number present in given array nums

 int n = nums.length;

    int temp[] = new int[n];

    int index = 0;

    /*Run a for loop to take each numbers from nums[i]*/

    for(int i = 0; i < n; i++){

        int count = 0;

        int number = nums[i];

        // Run a while loop to count number of set bits in each number

        while(number > 0) {

            count = count + (number & 1);

            number = number >> 1;

        }

        // Store set bit count in temp array

        temp[index++] = count;

    }

   

    /*To sort nums array based upon the cardinality*/

    for(int i = 0; i < n; i++){

        for(int j = 0; j < n-i-1; j++){

            if(temp[j] > temp[j+1]){

                int tmp = nums[j];

                nums[j] = nums[j+1];

                nums[j+1] = tmp;

            }

        }

    }

    // Return resulting array

    return nums;

   

}

public static void main(String[] args) {

 

 int n = 4;

    // Create an array nums with 4 numbers

    int nums[] = {1, 2, 3, 4};

    int res[] = cardinalitySort(nums);

    // Print resulting array after calling cardinalitySort

    for(int i = 0; i < res.length; i++){

        System.out.print(res[i] + " ");

    }

}

}

See more about C++ at brainly.com/question/15872044

#SPJ1

Cardinality Sorting The binary cardinality of a number is the total number of 1 's it contains in its

_____is located on the motherboard and is used to store the data and programs currently in use.

Answers

The component located on the motherboard that is used to store the data and programs currently in use is called the Random Access Memory (RAM).

RAM is a type of computer memory that provides fast and temporary storage for data that the CPU (Central Processing Unit) needs to access quickly.

Here is a step-by-step explanation of how RAM works:

1. When you open a program or file, the necessary data is loaded from the hard drive into the RAM.
2. The CPU can then access the data in RAM much faster than it can access data from the hard drive.
3. As you work on your computer, the CPU continuously retrieves and updates data in the RAM.
4. RAM is volatile memory, meaning that it loses its contents when the computer is powered off or restarted.
5. The amount of RAM in a computer affects its performance. More RAM allows for smoother multitasking and faster program execution.

To summarize, RAM is a crucial component of a computer that temporarily stores data and programs in use, providing fast access for the CPU. It is important to have an adequate amount of RAM to ensure optimal performance.

To know more about Random Access Memory (RAM), visit:

https://brainly.com/question/33435661

#SPJ11

explain input device​

Answers

Answer: ......wlc;)

Explanation: Any information or data sent to a computer for processing is considered input. Input or user input is sent to a computer using an input device. The picture is an illustration of the difference between input and output. The input example (top) shows data being sent from a keyboard to a computer

Answer:

An input Device are used to enter information such as letters, numbers sounds or pictures into a computer.

A construction firm intends to use technology to enhance their architectural designs architecture.Which of the following technologies should they use?
A) MIDI software
B) vector graphics software
C) sampling software
D) CAD software

Answers

A construction firm that intends to use technology to enhance their architectural designs should use CAD software.

What is CAD software?

Computer-aided design (CAD) software is a software program used by architects, engineers, drafters, artists, and others to create precise drawings or technical illustrations. It enables them to quickly and accurately create and modify digital prototypes of their products, speeding up the design process and reducing errors.

CAD is used by a variety of professionals, including architects, industrial designers, engineers, and others, to create three-dimensional (3D) models of their designs. These digital representations can then be evaluated, modified, and simulated to ensure that the final product is safe, functional, and visually appealing.

In conclusion, a construction firm that wants to use technology to improve its architectural designs should use CAD software.

Learn more about CAD software here: https://brainly.com/question/18995936

#SPJ11

NOTE ABOUT ERROR DETAILS :"configparser.missingsectionheadererror: file contains no section headers."

Answers

The Error message you are seeing - configparser.MissingSectionHeaderError: File contains no section headers - is due to the fact that the configparser module expects an INI file to have at least one section header.

The configparser module is used to read and write configuration files, especially those that follow the INI file format. It provides a simple way to work with configuration files that make it simple to define a set of default parameters and then customize those parameters as needed.The configparser library works by defining a section header in square brackets and then specifying key/value pairs beneath it. Consider the following sample INI file:```

```To avoid this error in your code, make sure you define a section header in your INI file. It is also possible to disable the error by creating a SafeConfigParser object instead of a ConfigParser object. This object will not raise an error if a file contains no section headers, but it will treat all keys as if they belong to a section called DEFAULT.

To know more about message visit:

https://brainly.com/question/28267760

#SPJ11

How many conditions are needed in a while loop that should run until a user guesses the correct number or until they have made five guesses?
Group of answer choices

0

1

2

3

Answers

[] Hello! []

Answer:

2

Explanation:

MS Coding 1 A ED

---------------------------------------------------------------------------------------

I hope this helpedBrainilest appreciated!

Under the uniform commercial code's (ucc's) ________ requirement, a person cannot qualify as a holder in due course (hdc) if she has notice that the instrument is overdue.

Answers

Under the Uniform Commercial Code's (UCC's) Overdue Instrument requirement, a person cannot qualify as a holder in due course (HDC) if she has notice that the instrument is overdue.

The UCC is a comprehensive set of laws governing commercial transactions in the United States.

An HDC is granted certain rights and protections under the UCC.

The Overdue Instrument requirement is designed to protect parties who acquire negotiable instruments without knowledge of any issues or defects associated with the instrument. By disqualifying individuals who have notice of an instrument being overdue, the UCC aims to prevent the transfer of potentially problematic or defaulted instruments while maintaining the stability and credibility of negotiable instruments in commercial transactions.

Learn more about UCC:

https://brainly.com/question/13471656

#SPJ11

which of the following is a critical security function that should be addressed by the senior management of an organization? group of answer choices sharing the private key with all systems connected to the network reducing internal systems auditing creating is security software programs establishing the security policy avoiding the use of perimeter firewalls

Answers

The following critical security function that should be addressed by the senior management of an organization is establishing the security policy.

This policy should outline the rules for all systems and users, including specifying which measures are required for data protection, who is responsible for implementing the measures, and what methods will be used to enforce the policy.

Additionally, the policy should also cover topics such as the use of perimeter firewalls, reducing internal systems auditing, sharing the private key with all systems connected to the network, and creating security software programs.

Critical security is used to refer to the security of the most important data and applications within an organization. A security policy is a set of rules and procedures that an organization follows to protect its data and applications. Security policies define who has access to the data and applications, what actions are allowed, and what actions are not allowed. They also define how the data and applications are protected from unauthorized access, theft, and damage.


Learn more about critical security functions at https://brainly.com/question/30906421

#SPJ11

Why is it important for an app developer to work closely with the client and end users to understand what their users want and need?

Answers

if the app developer doesn't meet the clients needs within the app the client may be dissatisfied, and not use the app. The client could also spread the word that this app developer dosen't listen to their customers and this could jeopardize future clients wanting to work with the app developer.

Other Questions
Which part of the Robot provides motion to the manipulator and end-effectors? A) Controller B) Sensor C) Actuator D) None of the above Determine whether the given equation is an absolute value function or not. 1. h(x) 17x - 81 = -1 2.-22 + 1x - 7: = lyl B. Solve for the zeros of the following functions. Show your complete solutions. 1. h(x) = /10 xl - 10 2. y = 7x +11+1 My question is 9 + 12n Yousefs professor tells him that his theory about dating is not strong because it is not falsifiable. What does the professor mean by this? It seems like every American generation deals with questions about immigration:Who should be allowed into the country? How many? How open or closed should our borders be? etc. etc.What connections can you make between immigration issues of the late 1800s and today? What's similar, what's different? an investment provides you with $1,000 after six years and $2,000 after nine years. what is the present value of these cash flows if you require a 4% rate of return (discount the cash flows at that rate)? an investment provides you with $1,000 after six years and $2,000 after nine years. what is the present value of these cash flows if you require a 4% rate of return (discount the cash flows at that rate)? $1,754.21 $1,888.76 $2,035.44 $2,195.48 $2,370.31 Which of these statements about the chart is MOST correct?A) Each Amendment is linked to the "Civil Rights Movement."B) Each Amendment was ratified despite opposition from the President of the UnitedStates.O two of the Amendments were created to overturn previous amendments to theConstitutionD) Two of the Amendments were direct results of either recent or ongoing militaryconflicts. On a bicycle, Colleen rides for 2 hours and is 20 miles from her house. After riding for 11 hours, she is 101 miles away. What is Colleen's average rate over the last 9 hours of her trip Convert =/3 to a Cartesian equation.y = x/2y = 3x/2y = 3x 2. TAKING NOTESIn a chart like the one shown, listsome of the changes that the warbrought about for each group.Changes Brought Aboutby the WarAfrican AmericansWomenImmigrantsExplain how each group benefitedfrom or was disadvantaged bythese changes Define neuron and nervecell Please help me! No links, cheaters, or rude comments please! the number of atoms in 2.0 moles of B is Donald is writing a chemical name from a chemical formula. He has just identified that there are five atoms of oxygen bonded with two atoms of phosphorus.What is the chemical name of Donald's compound? A point S( 8,-2) is reflected across the origin, Find the order pair of its image.A. ( -8 , 2)B. ( -8, -2)C. (2, 8)D. ( 2,- 8) Rent expenses will in the statement of profit or loss and other comprehensive income.Select one:A.be disclosed as revenueB.not be disclosed in the statement of profit or loss and other comprehensive incomeC.be disclosed as other incomeD.be disclosed as distribution, administrative and other expensesE.be disclosed as finance costs Which is an example of a beneficial mutation? ANSWER AND ILL GIVE BRAINLY POINTS !!!!!! HELP ASAP ! How is the chief justice of the state supreme court selected? The oldest member is named chief justice.The governor appoints the chief justice.The citizens vote to select the chief justice.The supreme court judges vote to select the chief justice. what type of root is found in monocut plants A 1250 kg car is stopped at a traffic light. A 3550 kg truck moving at 8.33 m/s strikes the car from behind, causing the bumpers to lock together. A) What is the momentum of the car-truck system before the collision? B) What is the momentum of the car-truck system after the collision? C) How fast do the car and truck move after the collision?(Do NOT put any links or reproductions, I just need help with this.)