Answer:
<!DOCTYPE html>
Explanation:
Now i could be wrong but this is what we go with in html5 witch is what web browser uses. I sent a photo you could use to help from the W3C website
what is mass communication
Hey there!
When you see the word “mass communication” think of an article written on the newspaper or a person interaction on a social media platform. You’re talking to a variety of LARGE groups but not physically there in their appearance, right? (This is an EXAMPLE.... NOT an ANSWER)
Here’s SOME examples
- Political debate campaigns
- Journalism (you could find some in articles / newspapers passages)
- Social Media Platforms
- A company PROMOTING their brand as a COMMERCIAL on the television/radio
Without further a do... let’s answer your question….......
Basically “mass communication”
is the undertaking of media coordination which produce and carries out messages with HUGE crowds/public audiences and by what the message process striven by their audience ☑️
Good luck on your assignment and enjoy your day!
~LoveYourselfFirst:)
Write the definition of a function named count that reads all the strings remaining to be read in standard input and returns their count (that is, how many there are) So if the input was:
hooligan sausage economy
ruin palatial
the function would return 5 because there are 5 strings there.
Answer:
The function written in C++
int str(string word) {
int count = 1;
for(int i =0; i<word.length();i++) {
if(word[i] == ' ') {
count++;
}
}
return count;
}
Explanation:
This line defines the function
int str(string word) {
This line initializes count to 1
int count = 1;
This line iterates through the input string
for(int i =0; i<word.length();i++) {
This line checks for blank space
if(word[i] == ' ') {
Variable count is incremented to indicate a word count
count++;
}
}
return count;
}
See attachment for full program
Explain the difference between storage devices and virtual storage
Answer:
Storage devices tend to be built in/physical pieces of storage such as an SD Card or Hard Drive. Virtual storage is more-so like Cloud storage, where the files are hosted elsewhere.
Explanation:
Examine trends in emergence of computer from 1936-1985 and its relevance to education industry in Nigeria
Answer:
The emergence of computers from 1936-1985 witnessed several remarkable trends that had considerable relevance to the education industry in Nigeria. Below are some of the significant trends and their relevance to the education sector in Nigeria:
1) The First Generation Computers (1936-1950s): The first computers were large, bulky, and crude devices that used vacuum tubes, magnetic drums, and punched cards for data processing. The early computers were mainly used for government and military purposes, such as code-breaking, ballistic calculations, and scientific research. The relevance of first-generation computers to the education industry in Nigeria was limited, as they were too expensive and complex for widespread adoption in schools.
2) The Second Generation Computers (1950s-1960s): In the 1950s, computers became smaller, faster, and more reliable, thanks to the invention of transistors. Second-generation computers used magnetic core memory and high-level programming languages such as COBOL and FORTRAN. These advancements made computers more accessible to businesses and government agencies, enabling them to streamline their operations and increase efficiency. However, the education industry in Nigeria still had limited access to computers due to cost and technological barriers.
3) The Third Generation Computers (1960s-1970s): The Third Generation Computers witnessed several improvements in technology, such as the development of the integrated circuit, which led to the creation of miniaturized and affordable computers. These computers were faster, more reliable, and had increased data storage capacity. They were also equipped with graphical user interfaces and interactive software, making them more user-friendly. This generation of computers became more relevant to the education industry in Nigeria, as they were affordable enough to be used in schools for teaching and learning.
4) The Fourth Generation Computers (1970s-1980s): Fourth-generation computers were faster, cheaper, and more efficient than their predecessors. The introduction of microprocessors made it possible to design computers that were small enough to fit on a desktop. This development led to the development of personal computers, which revolutionized the way people worked and communicated. Personal computers had enormous relevance to the education industry in Nigeria, as they enabled students and teachers to access information and learn new skills more easily.
In conclusion, the trends in the emergence of computers from 1936-1985 had considerable relevance to the education industry in Nigeria. Despite the technological and cost barriers that limited access to computers in the early years, the advancement of computer technology over time made it possible for computers to become an integral part of teaching and learning in Nigeria.
Use the drop-down menus to match each description to the correct term.
cassette tapes, VCR tapes, and landline telephones
music recorded on a CD or MP3 file
a series of zeros and ones that represent the recording of your voice
audio reproduction where a copy of a copy will sound exactly the same as the original
IM GIVING BRAINLIEST
A special type of goal that acts as a stepping stone for other goals is called
a) an inner-term goal
b) a mid-term goal
c) a part-term goal
b) a short-term goal
Answer:
The special type of goal that qcts as a stepping stone for other goals is a short-term goal
Which term refers to a contract specifically negotiated for the construction of an asset or a combination of assets that are closely interrelated or interdependent in terms of their design, technology and function or their ultimate purpose or use (GAAP)
A. Fixed price contract
B.Construction contact
C. Cost plus contract
D.None of these
I’m not accepting links or files.
Will mark brainliest for best explanation :)
Answer:
B. Construction contact
Explanation:
It is a contract specifically negotiated for the construction of an asset or a combination of assets that are closely interrelated or interdependent in terms of their design, technology and function or their ultimate purpose or use.
Please have a great day <3
Because of inability to manage those risk. How does this explain the team vulnerability with 5 points and each references
The team is vulnerable due to a lack of risk assessment. Without risk understanding, they could be caught off guard by events. (PMI, 2020) Ineffective risk strategies leave teams vulnerable to potential impacts.
What is the inability?Inadequate contingency planning can hinder response and recovery from materialized risks. Vulnerability due to lack of contingency planning.
Poor Communication and Collaboration: Ineffective communication and collaboration within the team can make it difficult to address risks collectively.
Learn more about inability from
https://brainly.com/question/30845825
#SPJ1
Assume that x and y are boolean vairables and have been properly initialized
(x && y ) && !(x || y)
Name some areas in which computer are being used
Answer:
Computers play a role in every field of life. They are used in homes, business, educational institutions, research organizations, medical field, government offices, entertainment, etc.
Explanation:
Home
Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. They provide communication through electronic mail. They help to avail work from home facility for corporate employees. Computers help the student community to avail online educational support.
Medical Field
Computers are used in hospitals to maintain a database of patients’ history, diagnosis, X-rays, live monitoring of patients, etc. Surgeons nowadays use robotic surgical devices to perform delicate operations, and conduct surgeries remotely. Virtual reality technologies are also used for training purposes. It also helps to monitor the fetus inside the mother’s womb.
Entertainment
Computers help to watch movies online, play games online; act as a virtual entertainer in playing games, listening to music, etc. MIDI instruments greatly help people in the entertainment industry in recording music with artificial instruments. Videos can be fed from computers to full screen televisions. Photo editors are available with fabulous features.
Industry
Computers are used to perform several tasks in industries like managing inventory, designing purpose, creating virtual sample products, interior designing, video conferencing, etc. Online marketing has seen a great revolution in its ability to sell various products to inaccessible corners like interior or rural areas. Stock markets have seen phenomenal participation from different levels of people through the use of computers.
Education
Computers are used in education sector through online classes, online examinations, referring e-books, online tutoring, etc. They help in increased use of audio-visual aids in the education field.
Government
In government sectors, computers are used in data processing, maintaining a database of citizens and supporting a paperless environment. The country’s defense organizations have greatly benefitted from computers in their use for missile development, satellites, rocket launches, etc.
Banking
In the banking sector, computers are used to store details of customers and conduct transactions, such as withdrawal and deposit of money through ATMs. Banks have reduced manual errors and expenses to a great extent through extensive use of computers.
Business
Nowadays, computers are totally integrated into business. The main objective of business is transaction processing, which involves transactions with suppliers, employees or customers. Computers can make these transactions easy and accurate. People can analyze investments, sales, expenses, markets and other aspects of business using computers.
Training
Many organizations use computer-based training to train their employees, to save money and improve performance. Video conferencing through computers allows saving of time and travelling costs by being able to connect people in various locations.
Arts
Computers are extensively used in dance, photography, arts and culture. The fluid movement of dance can be shown live via animation. Photos can be digitized using computers.
Science and Engineering
Computers with high performance are used to stimulate dynamic process in Science and Engineering. Supercomputers have numerous applications in area of Research and Development (R&D). Topographic images can be created through computers. Scientists use computers to plot and analyze data to have a better understanding of earthquakes.
Malaysia..HP,Lenovo,dell
India,Asser,Asus
apple,ibm, Microsoft
what is the name for a framework and corresponding functions required to enable incident response and incident handling within an organization?
To enable incident response and incident handling inside an organization, incident management is necessary.
What is incident response?Incident response is defined as a methodical strategy for dealing with and managing the fallout from a security breach or cyberattack, often known as an IT event, computer incident, or security incident. Plan, Team, and Tools are the three elements of incident response.
The incident management method is used by DevOps and IT Operations teams to respond to an unplanned occurrence or service outage and get the service back up and running. This merely outlines the steps required to reduce damage and restore functioning.
Thus, to enable incident response and incident handling inside an organization, incident management is necessary.
To learn more about incident response, refer to the link below:
https://brainly.com/question/28198261
#SPJ1
Perfrom traceroute of an ip address in Australia
How to perform a typical traceroute on an IP address using CMD command is given below:
The StepsIn case you're striving to perform a traceroute operation on an IP address, either using Windows or Mac computer systems, the following guidelines will provide assistance.
Windows users may select the Windows key and R simultaneously, enter "cmd," hit Enter. In comparison, users operating with the Mac OS should navigate through Finder by visiting Applications -> Utilities and double-clicking Terminal.
To get started with the procedure, insert the word "traceroute," and proceed by entering the specific IP address that you desire to locate. Even if searching for information on 203.0.113.1, simply input "traceroute 203.0.113.1." At this stage, submit and wait until the validation is done.
This method ascertains the path taken by packets across the network. It indicates the number of jumps made, along with their response time at every stage. One aspect to bear in mind is some routers/firewalls may block access thereby leading to incomplete outcomes.
Read more about Ip addresses here:
https://brainly.com/question/14219853
#SPJ1
Which of the following parts apply when delivering an indirect bad news message? Select all that apply.
Question 2 options:
Opening with a buffer statement
Being direct with news
Explaining the situation
Inserting stories and important anecdotes
Keeping details to a minimum
Providing alternatives
The parts that apply when delivering an indirect bad news message are:
Opening with a buffer statement
Explaining the situation
Keeping details to a minimum
Providing alternatives.
When delivering an indirect bad news message, the following parts apply:
Opening with a buffer statement: Start the message with a neutral or positive statement that prepares the recipient for the upcoming news. This helps soften the impact and reduces defensiveness.Explaining the situation: Provide a clear and concise explanation of the circumstances or reasons behind the bad news. This helps the recipient understand the context and rationale.Keeping details to a minimum: While it is important to provide necessary information, it is also crucial to avoid overwhelming the recipient with excessive details. Focus on the key points to maintain clarity and avoid confusion.Providing alternatives: Offer alternative solutions or options to mitigate the impact of the bad news. This shows empathy and provides the recipient with potential avenues for resolution or improvement.The parts that do not apply in delivering an indirect bad news message are:
Being direct with news: Indirect bad news messages typically involve delivering the news subtly rather than being direct.Inserting stories and important anecdotes: Including stories or anecdotes may not be suitable for an indirect bad news message as it can distract from the main message and dilute its impact.Therefore, the applicable parts for delivering an indirect bad news message are opening with a buffer statement, explaining the situation, keeping details to a minimum, and providing alternatives.
For more such question on bad news message
https://brainly.com/question/22473511
#SPJ8
A Python file that contains variables and functions and can be used in other programs is called a
Answer:
module
Explanation:
class - something that can be used to create objects
documentation - provides information on the program and how to use it
dictionary - a set of keys and terms that match with keys
What is the best way to describe eNotes?
A.it is a tool students can use to take notes during an online lesson
B.it provides access to an extensive back up system on the nternet
C.It allows students to clip a portion from a webpage for later use.
D.It is a tool for storing images and recordings in one location.
Answer:
A.it is a tool students can use to take notes during an online lesson
Explanation:
ENotes is a tool used to take notes, particularly targeted towards online learners. Note-taking generally help students to possess a far better understanding of what they learn. It also helps the scholars to enhance their writing skills. There are many sophisticated and straightforward note-taking tools available on the market.Answer:
(A) It is a tool students can use to take notes during an online lesson.
Explanation:
In Coral Code Language - A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-life of about 6 hours in humans. Given the caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 18 hours.
Ex: If the input is 100, the output is:
After 6 hours: 50.0 mg
After 12 hours: 25.0 mg
After 18 hours: 12.5 mg
Note: A cup of coffee has about 100 mg. A soda has about 40 mg. An "energy" drink (a misnomer) has between 100 mg and 200 mg.
To calculate the caffeine level after 6, 12, and 18 hours using the half-life of 6 hours, you can use the formula:
Caffeine level = Initial caffeine amount * (0.5 ^ (time elapsed / half-life))
Here's the Coral Code to calculate the caffeine level:
function calculateCaffeineLevel(initialCaffeineAmount) {
const halfLife = 6; // Half-life of caffeine in hours
const levelAfter6Hours = initialCaffeineAmount * Math.pow(0.5, 6 / halfLife);
const levelAfter12Hours = initialCaffeineAmount * Math.pow(0.5, 12 / halfLife);
const levelAfter18Hours = initialCaffeineAmount * Math.pow(0.5, 18/ halfLife);
return {
'After 6 hours': levelAfter6Hours.toFixed(1),
'After 12 hours': levelAfter12Hours.toFixed(1),
'After 18 hours': levelAfter18Hours.toFixed(1)
};
}
// Example usage:
const initialCaffeineAmount = 100;
const caffeineLevels = calculateCaffeineLevel(initialCaffeineAmount);
console.log('After 6 hours:', caffeineLevels['After 6 hours'], 'mg');
console.log('After 12 hours:', caffeineLevels['After 12 hours'], 'mg');
console.log('After 18 hours:', caffeineLevels['After 18 hours'], 'mg');
When you run this code with an initial caffeine amount of 100 mg, it will output the caffeine levels after 6, 12, and 18 hours:
After 6 hours: 50.0 mg
After 12 hours: 25.0 mg
After 18 hours: 12.5 mg
You can replace the initialCaffeineAmount variable with any other value to calculate the caffeine levels for different initial amounts.
for similar questions on Coral Code Language.
https://brainly.com/question/31161819
#SPJ8
Ava is paraphrasing an article about cardiovascular disease. She has read the passage carefully and is confident that she understands it. What is her next step?
Reorder the sentences to the order you think makes more sense.
Identify the main points of what you have read.
Select a few key words to change to your own words.
Skim the original information to get a sense of what it is about.
Answer:
a
Explanation:
Answer:
ye it a
Explanation:
What characteristics are common among operating systems
The characteristics are common among operating systems are User Interface,Memory Management,File System,Process Management,Device Management,Security and Networking.
Operating systems share several common characteristics regardless of their specific implementation or purpose. These characteristics are fundamental to their functionality and enable them to manage computer hardware and software effectively.
1. User Interface: Operating systems provide a user interface that allows users to interact with the computer system. This can be in the form of a command line interface (CLI) or a graphical user interface (GUI).
2. Memory Management: Operating systems handle memory allocation and deallocation to ensure efficient utilization of system resources. They manage virtual memory, cache, and provide memory protection to prevent unauthorized access.
3. File System: Operating systems organize and manage files and directories on storage devices. They provide methods for file creation, deletion, and manipulation, as well as file access control and security.
4. Process Management: Operating systems handle the execution and scheduling of processes or tasks. They allocate system resources, such as CPU time and memory, and ensure fair and efficient utilization among different processes.
5. Device Management: Operating systems control and manage peripheral devices such as printers, keyboards, and network interfaces. They provide device drivers and protocols for communication between the hardware and software.
6. Security: Operating systems implement security measures to protect the system and user data from unauthorized access, viruses, and other threats.
This includes user authentication, access control mechanisms, and encryption.
7. Networking: Operating systems facilitate network communication by providing networking protocols and services. They enable applications to connect and exchange data over local and wide-area networks.
These characteristics form the foundation of operating systems and enable them to provide a stable and efficient environment for users and applications to run on a computer system.
For more such questions characteristics,click on
https://brainly.com/question/30995425
#SPJ8
12. In cell A14, use the INDEX function and structured references to display the value in the first row and first column of the AcademicGroups table.
Answer:index(E3:H12,1)
Explanation:
Answer: =INDEX(AcademicGroups,1,1)
Explanation:
Use the INDEX function (fx) button and you will be provided two different arguments to choose from.
Select the argument: array,row,num,column,num
In the Array section, click the up-arrow and then highlight the range A2:G12 (this is the AcademicsGroups table).
In the Row_num section, enter the number 1
In the Column_num section, enter the number 1
Press OK
Hopefully the logic behind this, after seeing it, makes sense.
uncaught error: hydration failed because the initial ui does not match what was rendered on the server how to debug
When utilising React with Server Side Rendering (SSR) or any other kind of pre-generated HTML, this is a typical mistake.
Hydration mismatch may result from invalid HTML, such as div inside p. A hydration mismatch frequently results from CSS-in-JS libraries that are not configured for pre-rendering (SSR/SSG). This often means that the application must adhere to the library's Next.js example.
By adding event handlers to the HTML components, client-side JavaScript transforms a static HTML web page—delivered either through static hosting or server-side rendering—into a dynamic web page in web development.
When the content converted as HTML in Node.js and the content rendered in the browser differ, this is known as a hydration mismatch. Hydration imbalances should be avoided because they can lead to performance problems and defects.
Know more about HTML here:
https://brainly.com/question/15093505
#SPJ4
What are the core steps to add revisions or features to a project?(1 point)
Responses
Evaluate feasibility of the goals, create a list of functionality requirements, and develop the requirements of the feature.
Evaluate feasibility of the goals, develop programming solutions, and evaluate how well the solutions address the goals.
understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature.
Communicate with the client, create a sprint backlog, develop the project, and evaluate how well the solution fits the requirements.
The core steps to add revisions or features to a project are ""Understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature." (Option C)
How is this so?
The core steps to add revisions or features to a project include understanding the goals,evaluating the impact on the project, creating a list of functionality requirements,and developing the requirements of the feature.
These steps ensure that the goals are clear, the impact is assessed, and the necessary functionality is identified and implemented effectively.
Learn more about project management at:
https://brainly.com/question/16927451
#SPJ1
What are the main components of a desktop PC and briefly describe their purposes.
Answer:
8 Standard Computer Components and What They Do
Explanation:
Motherboard. The motherboard is an important computer component because it’s what everything else connects to!
Power Supply. True to its name, the power supply powers all other components of the machine.
Central Processing Unit (CPU)
Random-access Memory (RAM)
Hard Disk Drive / Solid State Drive.
Video Card.
Optical Drives.
Answer:
For main requirement you'll need
A CPU ( Central Processing Unit)
A GPU (Graphics Processing Unit)
Motherboard for your components to work and transfer data
PSU (Power Supply Unit) for your components to turn on
A RAM (Random Access Memory)
For others you need
Cooler it can be by air, an AIO (All in one water cooler) or an water cooler but water might have a chance of risk to cause shortage for you pc components of it's not secure
Fans for excessive heat and for airflow
A case to keep your components safe and secure
Monitor to see what's going on
Keyboard, mouse, headset, mic, cam
Which of the following activities is permissible for IT professionals in the conduct of computer access and authorizations?
viewing explicit content on a company computer
posting updates to social media networks during slow periods at work
using another company’s copyrighted images for the company’s website
using the company’s e-mail software to send work-related e-mails
Answer:
D
Explanation:
Answer: A, B, C, D
Explanation:
plz help me with this I will mark as brainlest
In order to keep PCs from a home connected to each other
Why is wind power a never ending source of power?
Answer:
"Wind is caused by the heating of the atmosphere which is caused by the sun. Since we have the sun we have wind, since we will never lose the sun, we will never lose the wind which means it is a never-ending source of power." It's also the reason why wind power is a form of solar energy, along with that wind power does not contribute to the heating of the Earth's surface like burning fossil fuels. Very healthy for the environment of the planet.
Hope this helps.
SmartArt is a Microsoft Office tool for creating what?
Answer:
Visual Representation Of Your Information
Explanation:
Create a SmartArt graphic to quickly and easily make a visual representation of your information. You can choose from among many different layouts, to effectively communicate your message or ideas. SmartArt graphics can be created in Excel, Outlook, PowerPoint, and Word, and they can be used throughout Office.
SOMEONE PLS HELP?!?!!
Answer:
B. To continuously check the state of a condition.
Explanation:
The purpose of an infinite loop with an "if" statement is to constantly check if that condition is true or false. Once it meets the conditions of the "if" statement, the "if" statement will execute whatever code is inside of it.
Example:
//This pseudocode will print "i is even!" every time i is an even number
int i = 0;
while (1 != 0) //always evaluates to true, meaning it loops forever
i = i + 1; // i gets incrementally bigger with each loop
if ( i % 2 == 0) //if i is even....
say ("i is even!"); //print this statement
In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
what are the different cpu sockets?
Answer:
Intel Is Somethings mainley LGA 1151, 1155, 1125 Etc.
On the other hand there are AMD sockets mainley in past gens there are am2 am3 now its am4 and so on hope this helped!
Explanation:
How might your experience with the internet be different today if, instead of military and scientific communities, the internet had its origin somewhere else (such as the business community or young people’s desire to socialize, etc.)?