Social networking is the most popular online activity?
True
False

Answers

Answer 1

Answer:

true

Explanation:

Answer 2
It’s true because I said so

Related Questions

What should you look for in the firefox browser in the bottom right corner of the window that indicates the web site is secure?

Answers

Answer:

it should tell you if you have a anti virus

Is a pencil sharpener and open system or a closed system? Defend your answer.

Answers

Answer:

A second class lever has the load located in the middle and the fulcrum and the effort on opposite ends. Examples of second class levers: a wheelbarrow, hand truck, wrench, nutcracker, and the handle to a pencil sharpener. A third class lever has the effort in the middle with the load and fulcrum on opposite ends.

Prepare a profile on major universities in the country Nepal ​

Answers

Answer:

Formal higher learning in Nepal began with the establishment of Tri-Chandra College in 1918, the first college in the country. Until 1985, Tribhuvan University (TU) was the only university in the country. The second university to be founded was Mahendra Sanskrit University. The inception of this university was soon followed by Kathmandu University in 1990, and Purbanchal and Pokhara Universities in 1995 and 1996, respectively. Many schools and colleges are run privately but none of the universities in Nepal are private.

This list includes all notable universities and colleges/campuses in Nepal. Entries are organised by courses offered, and listed in alphabetical order. Some entries that provide multiple courses may be duplicated in each of the relevant categories.

There are fourteen universities in Nepal. They are: Khwopa University (Proposed)

Agriculture and Forestry University in Chitwan

Far-western University in Kanchanpur

Gandaki University in Tanahun

Kathmandu University in Dhulikhel

Lumbini Bouddha University

Madan Bhandari University of Science and Technology

Manmohan Technical University in Biratnagar

Mid Western University in Birendranagar

Nepal Open University[1][2] in Lalitpur

Nepal Sanskrit University

Pokhara University in Pokhara

Purbanchal University in Biratnagar

Rajarshi Janak University in Janakpurdham

Tribhuvan University in Kirtipur

The university that will be profiled in their case is the Agriculture and Forestry University, Chitwan, Nepal.

The Agriculture and Forestry University, Chitwan, Nepal offers undergraduate, graduate, and PhD programs in agricultural sciences.

The university has several faculties such as the faculty of agriculture and animal sciences, fisheries, and aquaculture.

Learn more about universities on:

https://brainly.com/question/25853486

difine the term pigment​

Answers

Explanation:

pigment is material which give color to skin

Answer:

a substance occurring in plant or animal tissue and producing a characteristic colour, such as chlorophyll in green plants and haemoglobin in red blood. any substance used to impart colour.

Explanation:

How did imperialism lead to WWI? A The debate of the morality of imperialism created tensions around Europe b Native people were conquered and rebelled against Europe c Europe went into an economic depression when imperialism failed d European nations competed and made alliances to control colonies

Answers

Answer:

d. European nations competed and made alliances to control colonies.

Explanation:

The world War I was a period of battle between various countries from 1914 to 1918. It started formally on the 28th of July, 1914 and ended on the 11th of November, 1918.

Imperialism can be defined as a policy, ideology, or advocacy that sought to extend a country's power, dominion, authority and influence over another country through diplomacy, use of military force or colonization (direct territorial acquisition).

This ultimately implies that, imperialism is an advocacy or policy that is typically used to impose or extend a country's power, dominion, authority and influence. It simply means to seek colonies of other nations or countries.

Hence, imperialism led to WW1 because European nations competed and made alliances to control colonies.

In conclusion, there was an eagerness on the part of European Nations to gain colonial territories that were owned by other rival nations.

Richard wants to share his handwritten class notes with Nick via email. In this scenario, which of the following can help Richard convert the notes into digital images so that he can share them via email? a. Bar coding device b. Digital printing software c. Document scanner d. Radio frequency identification tag

Answers

Answer: Document Scanner

Explanation: Cos then he can easily add the paper notes to his computer and email the client.

The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization.

Answers

answer.

I don't know what it is

Complete the code to draw a line 30 steps to the right. Leave a gap of 20 steps. Then draw another line continues 15 more steps to the right.
from turtle import *from turtle import *

forward(30)
____
forward(20)
____
forward(15)

up
down

Answers

Then draw another line continues 15 more steps to the code from turtle import *from turtle import forward.

Thus, Computer code, often known as the source code, is the collection of instructions or set of rules that are expressed in a certain programming language.

It is also the name given to the source code that has been converted into object code, or computer code, through the use of a compiler.

Code is heavily employed for cutting-edge ideas like artificial intelligence and machine learning, in addition to creating computer programs and mobile applications. The next section will discuss some other uses and applications for the word code.

Thus, Then draw another line continues 15 more steps to the code from turtle import *from turtle import forward.

Learn more about Code, refer to the link:

https://brainly.com/question/15301012

#SPJ1

Fill in the missing functions:
average(region): Takes a region of an image and returns the average red, green, and blue values across the region.
setRegion(region,r,g,b): Takes a region of an image and red, green, and blue values, r, g, b. Sets the region so that all points have red values of r, green values of g, and blue values of b.

Answers

The missing functions are average(region) and setRegion(region,r,g,b). The function average(region) takes a region of an image as input and returns the average red, green, and blue values across that region.

This function can be used to find the average color of a specific area of an image. The setRegion(region,r,g,b) function, on the other hand, takes a region of an image and red, green, and blue values (r, g, b) as input. This function sets the region so that all points within the region have red values of r, green values of g, and blue values of b.

This function can be used to change the color of a specific area of an image to a specific RGB value. Both functions are useful in image processing applications where color information needs to be extracted or altered in a specific region of an image.

To know more about average visit:

https://brainly.com/question/31384514

#SPJ11

Complete the code.
import CSV
inFile = open('pets.txt', 'r')
myReader =
reader(inFile)
for item in myReader
print(item)

Answers

The complete Phyton code is given below:

Complete the code.

import CSV

inFile = open('pets.txt', 'r')

myReader =

reader(inFile)

for item in myReader

print(item)
exit()

What is a Phyton Code?

Phyton is a high-level, object-oriented programming language. It is easy to learn its syntax and reduces the cost of program maintenance.

In the code above, the last line exit() was included to complete the code and to signal to the computer that that is the end of the instruction.

Please see the link below for more about Python Program:

https://brainly.com/question/12684788

Answer:

cvs.reader(inFile)

Explanation:

the last digit (lsb) of a signed 2's complement binary number is a 1. can you say whether the number is even or odd?

Answers

If the least significant bit (LSB) of a signed 2's complement binary number is 1, the number is odd; if it is 0, the number is even.

Yes, we can determine whether a signed 2's complement binary number is even or odd based on the value of its least significant bit (LSB).

In 2's complement representation, the LSB represents the least significant value or the "ones" place. If the LSB is 1, it indicates that the number is odd. Conversely, if the LSB is 0, it indicates that the number is even.

If the last digit (LSB) of a signed 2's complement binary number is 1, we can say that the number is odd.

In a signed 2's complement binary representation, the least significant bit (LSB) represents the value of \(2^0\), which is the "ones" place. If the LSB is 1, it signifies that the number is odd because an odd number always has a nonzero value in the ones place.

On the other hand, if the LSB is 0, the number is even because even numbers always have a zero in the ones place. Therefore, by examining the value of the LSB, we can determine the parity of a signed 2's complement binary number, distinguishing between even and odd numbers.

To know more about least significant bit refer here

https://brainly.com/question/28799444#

#SPJ11

If the last digit (lsb) of a signed 2's complement binary number is a 1, then the number is odd. This is because in 2's complement, the rightmost bit (lsb) represents the sign of the number. When it is 1, it means the number is negative.

If the rest of the bits represent an even number, adding a negative number (which is odd) will result in an odd number. Let's say we have a signed 2's complement binary number with a length of 4 bits: 1101. The leftmost bit represents the sign, so this number is negative.

The remaining 3 bits represent the magnitude of the number in binary. Converting 1101 to decimal, we get: -1 * 2^3 + 1 * 2^2 + 0 * 2^1 + 1 * 2^0 = -8 + 4 + 0 + 1 = -3.So, in this case, the number is odd.

Know more about binary number:

https://brainly.com/question/28222245

#SPJ11

https://soap2day.to/ free movies

Answers

Answer:

why is everyone sending links

Case 20-4 Customized Software

Answers

Custom software development is the process of creating, deploying, and maintaining software particularly for a set of users, tasks, or organizations.

Give an illustration of bespoke software.

specialized qualities and skills: A developer creates a bespoke software product specifically to meet the requirements of the commissioning company. For instance, only JPMorgan Chase or one of its specific divisions would use a software a programmer created for the bank.

The definition of "custom software"

Software that has been specially developed for a certain business or user is referred to as software applications (sometimes referred to as bespoke software or tailor-made software).

To know more about software visit:-

brainly.com/question/985406

#SPJ4

Select the appropriate APA guidelines when typing a research paper.

Keep the margins at one inch on all sides of the paper.
Single space.
Choose 10 point or 12 point font.
Do not indent paragraphs.
Include page numbers on all pages.

Answers

Answer:

Keep Margins at one inch on all sides of the paper.

Choose 10 point or 12 point font.

Include page numbers on all pages.

Explanation:

Because I've done it.

Answer:

Keep Margins at one inch on all sides of the paper.

Choose 10 point or 12 point font.

Include page numbers on all pages.

Explanation:

what do you think are the IPO components in an online movie ticket booking system?

Pls answer correctly ASAP​

Answers

Explanation:

Online Movie Ticket Booking System is a website to provide the customers facility to book tickets for a movie online and to gather information about the movies and theaters. Customer needs to register at the site to book tickets to the movie

Advantages of Online Booking Systems

Your business is open around the clock. ...

You can maximize reservations. ...

You get paid quicker. ...

You're not tied to a phone. ...

You can effortlessly up-sell add-ons. ...

It's easy to manage your calendar. ...

You get valuable insight about your business

a(n) is an attack that always maintains a primary focus on remaining in the network, operating undetected, and having multiple ways in and out.

Answers

Advanced Persistent Threats (APT) is an attack that always maintains a primary focus on remaining in the network, operating undetected, and having multiple ways in and out

About Advanced Persistent Threats (APT)

Advanced persistent threat (APT) refers to cyber attacks launched by attackers with substantial means, organization and motivation to carry out sustained attacks against targets.  APT is developed in the sense that it uses stealth and multiple attack methods to compromise targets, which are often high-value corporate or government resources.  These attacks are difficult to detect, remove, and attribute.  Once a target is breached, backdoors are often created to provide the attacker with ongoing access to the compromised system.  

APTs are persistent because an attacker can spend months gathering intelligence about a target and use that intelligence to launch multiple attacks over an extended period of time.  This is threatening because perpetrators are often looking for highly sensitive information, such as the layout of a nuclear power plant or the code to break into a US defense contractor.

Learn more about Advanced Persistent Threats (APT) at https://brainly.com/question/17328761.

#SPJ4

true/false. Cloud computing is the on-demand delivery of compute power, database, storage, applications, and other IT resources through a cloud services platform via the internet with pay-as-you-go pricing.

Answers

The given statement "Cloud computing is the on-demand delivery of compute power, database, storage, applications, and other IT resources through a cloud services platform via the internet with pay-as-you-go pricing." is True because Cloud computing indeed offers on-demand delivery of various IT resources.

Cloud computing is a model for delivering IT resources over the internet on a pay-as-you-go basis. Cloud service providers offer a range of services including compute power, database, storage, applications, and other IT resources that can be accessed by users through the internet. These services are typically provided through a cloud services platform, which is a collection of hardware, software, and networking components that enable users to access cloud resources.

One of the main advantages of cloud computing is the ability to provision and scale resources on-demand, without having to invest in expensive hardware and infrastructure. This allows users to quickly and easily access the resources they need, when they need them, and pay only for what they use.

Learn more about Cloud computing: https://brainly.com/question/19057393

#SPJ11

Which cable between Twisted-Pair-Cable (TPC) and Coaxial-Cable (CC) work for transmitting data to more distances?

Answers

Answer:

TPC is better, according to a website.

Explanation:

why is computer known as a vesatile machine? Explain​

Answers

Explanation:

Computer is known as a versatile machine because it is Capable of doing many things competently.

Answer:

Computer is called versatile machine because it is used in almost all the fields for various purpose.

Like: Speed accuracy, automatic endurance, versatility, storage etc

Which of the following is LEAST likely to be a contributing factor to the digital divide?
A
Some individuals and groups are economically disadvantaged and cannot afford computing devices or Internet connectivity.
B
Some individuals and groups do not have the necessary experience or education to use computing devices or the Internet effectively.
с
Some parents prefer to limit the amount of time their children spend using computing devices or the Internet.
D
Some residents in remote regions of the world do not have access to the infrastructure necessary to support reliable Internet connectivity

Answers

Answer:

The Answer is C

Explanation:

The least likely contributing factor to the digital divide is that: C. some parents prefer to limit the amount of time their children spend using computing devices or the Internet.

What is the digital divide?

Digital divide can be defined as a gap that exist between the group of people who have unrestricted access to digital technology and those who are unable to access it.

Basically, a digital divide is mostly influenced by the fact that some parents are fond of limiting the amount of time their children spend using computing devices or the Internet.

Read more on digital divide here: https://brainly.com/question/7478471

Please help explain Loops question. I will give brainliest.

Please help explain Loops question. I will give brainliest.

Answers

Answer:

And 1 and 2 and 3

Explanation:

It is asked to display the 'and' every time, and the count is equal to 1 plus the previous count starting at zero, so it runs 3 times

write a program that prompts the user to input an integer between 0 and 35. the prompt should say enter an integer between 0 and 35:.

Answers

The C++ code for this answer is provided below:

#include <iostream>

int main() {

int number;

std::cout << "Enter an integer between 0 and 35 \n";

std::cin >> number;

What is meant by program?

A computer program is a series of instructions written in a programming language that can be carried out by a computer. Software is made up of both tangible and intangible components, including computer programs as one example. Source code is the name given to a computer program that can be read by humans.

Therefore,

The C++ code for this answer is provided below:

#include <iostream>

int main() {

int number;

std::cout << "Enter an integer between 0 and 35 \n";

std::cin >> number;

if(number >= 0 && number < 10){

  std::cout << "The ASCII is: " << number << "\n";

}else if(number >= 10 && number <= 35){

  std::cout << "The ASCI is: " << static_cast<char>(number + 55) << "\n";

}else{

  std::cout << "Enter a number between 0 and 35!";

}

}

The explanation of each line in the code is given below:

#include <iostream> //The library for use input and output flow, cout - cin.

int main() { //Start the logic of the program

int number; // Declare a variable which is going to store the input of the user.

std::cout << "Enter an integer between 0 and 35 \n";

/* Show in the console the message to request a number between 0 and 35*/

std::cin >> number;

/* Store the input of the user in the number variable.*/

if(number >= 0 && number < 10){

//If the number is between 0 and 10 print the number.

  std::cout << "The ASCII is: " << number << "\n";

}else if(number >= 10 && number <= 35){

/*If the number is between 10 and 35 convert to ASCII, add 55 to the number because the letters in ASCII representation starts in 65*/

  std::cout << "The ASCI is: " << static_cast<char>(number + 55) << "\n";

}else{

/*If the number is not between 0 and 35 display an error message*/

  std::cout << "Enter a number between 0 and 35!";

}

}

To learn more about program, refer to:

https://brainly.com/question/27359435

#SPJ4

try drawing the bass clef sign by tracing over the dotted lines. then draw five more on your own

try drawing the bass clef sign by tracing over the dotted lines. then draw five more on your own

Answers

Answer:

ok

Explanation:

did it. It was a little difficult to keep my pencil straight.

Compare the OSI Application Layer with the TCP/IP Application Layer. Which statement is true? Both application layers are relevant mainly to programmers, not to network technicians. The OSI application layer involves more things than does the TCP/IP application layer. They are the same layer, only they are viewed through different conventions. The TCP/IP application layer is for the user; it is not important to programmers or network technicians.

Answers

Answer:

They are the same layer, only they are viewed through different conventions.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

On the other hand, the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer comprises of four (4) main layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

This ultimately implies that, the Open Systems Interconnection (OSI) Application Layer and the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer are the same layer, only they are made up of different number of layers and as such are viewed through different conventions.

Answer:

c

Explanation:

write a basic program to calculate the sum and product of any two numbers​

Answers

Answer:

to calculate sum

Start

accept num1

accept num2

sum = num1 +num2

end

evaluate:15+5*(8-5)/14

Answers

Answer:

225/14

Explanation:

By BODMAS

15 + 5 × (8-5) ÷ 14

= 15 + 5 × 3 ÷ 14

= 15 + 5 × 3/14

= 15 + 15/14

= 210/14 + 15/14

= (210 + 15)/14

= 225/14

You find a list of websites that relate to your chosen topic and click on the first one. You ask yourself the three questions presented in this lesson to see if this site is reliable: 1) Who wrote it? There isn't an author listed anywhere that you can find. 2) What type of site is it? The site name ends in . 3) How current is the information? You see the site was updated yesterday. Is this website reliable and worth examining further? True or False?

Answers

Answer:

False

Explanation:

Information reliability is essential in production. sourcing information from a reliable source is base on several criteria. They are; the author of the resource file, the type of media platform holding the information, the frequent revision of the information, additional support or collaboration to publish public information, etc.

A government website ( with the site-address ending with a '.gov' ) which is concurrently revised by the institute, gives a piece genuine and reliable information, whereas a commercial website with no author and just recently revised or published, would be judged as an unreliable source of information

differences between ancient means of communication and modern means of communication​

Answers

Answer:

The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging

Answer:

The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging.

The only real difference is the speed of it. Other than that, only the delivery methods have changed. Communication itself is the same, as far as I can see.

Explanation:

You are in a group of five people whose small airplane crashed and
now you are stranded on a deserted tropical island for 24 hours. The
safety island is 3 miles away and can not be reached by walking.
Limited supplies from the plane have washed ashore(a flashlight, 2
bottles of water, a sheet, the tail of the plane, a bottle of perfume,
a ball of string, and a knife). Flora(plants/vegetation) and
fauna(animals) exist on the island.
1. You must use all of the supplies
2. Think of the "what if" issues: ex. How will your group
protect themselves from the animals? How can you reach
the safety island? How will your group eat? The sea
contains salt water, etc.

Answers

First and foremost, it's important to prioritize survival and safety in this situation.

What are the necessary steps?

Here are some steps that the group could take using the available supplies:

Using the knife and ball of string, construct a shelter that can protect the group from the elements and provide a place to sleep. The sheet can be used as a roof or to create walls, and the tail of the plane can be used for support.

With the flashlight and knife, explore the island to find a fresh water source. If one is not found, the group can ration the two bottles of water until they can be rescued.

Use the knife and ball of string to create weapons and tools for protection and gathering food. The perfume can be used as a deterrent for some animals.

If there is no source of fresh water on the island, the group can use the ball of string and sheet to create a solar still to purify salt water from the sea.

Finally, the group can work together to come up with a plan to safely make their way to the safety island. This may involve using the tail of the plane as a makeshift raft, or building a larger boat using materials found on the island.

To protect themselves from animals, the group can create weapons and tools using the knife and ball of string.

Learn more about word problem on;

https://brainly.com/question/21405634

#SPJ1

PLEASE ANSWER ASAP!!
Where does each box go?

suppose cell C5 contains the formula =B$6+C1 that you copy to the cells B8, C10, D6, and E5. match each formula what it will be when copied to its respective cell

(a) =A$6+B4
(b) =B$6+C6
(c) =C$6+D2
(d) =D$6+E1​

PLEASE ANSWER ASAP!! Where does each box go? suppose cell C5 contains the formula =B$6+C1 that you copy

Answers

Answer:

I think A belongs to the second one

Other Questions
A firm decided to increase output at a constant rate from its current level from 50000 to 60000 during the next 5 years. Calculate the interest required to achieve this growth, compounded annually. O i=4.0% O i=4.7% O i=0.37% O i=3.7% Give an example on how each branch of government can "check" the power of another branch. Current Attempt in ProgressAn analysis of the transactions made by Sunland & Co., a certified public accounting firm, for the month of August is shown as follows.The expenses were $600 for rent, $4,100 for salaries and wages, and $510 for utilities.Accounts.Owner'sCash+ Receivable + SuppliesAccountsEquipment Payable + CapitalOwner'sDrawings + Revenu+1.+$15.300+$15,3002.-2,900+$6,000+$3,100-800+$800Pod+4,900+$3,000+$7,90-1,300-1,300-2,200-600+350-350-4,100+510(b)Determine how much owner's equity increased for the month.Net increase in owner's equity$3.4.5.6.7.8.9.10.-$2.200 Which word BEST describes Hummingbird?es =)A)adventurousB)distractedLazyDsneaky What are the vebs ending for present tence AR, ER, and IR REGULARLY verbs? Match the subject with its appropriate verb ending what is it please?*mmm,mmjjjjjjn Um if you good at math please help me and i will give you brainliest The molar mass of a substance is 92.010g. The substance is 30.4% nitrogen and 69.9% oxygen. What is the empirical formula and the molecular formula of the substance What is a characteristic of healthy living during retirement? continuing with 60 hours or more working each week at a job living in a house that has 15 rooms to maintain moving from a cold climate to a warm climate to be outside more spending time inside the house watching television 8 hours a day since you are made mostly of water, you are very efficient at absorbing microwave photons. if you were in intergalactic space, how many cmb photons would you absorb per second? (the assumption that you are spherical will be useful.) what is the rate, in watts, at which you would absorb radiative energy from the cmb? is register an input device? The table below shows the incomplete values as y varies directly asx. Calculate the missing values.y =10 20_x =5_ 2 Christina wants to buy some miniature goldfish. She reads that a 9-gallon aquarium is theright size for 3 miniature goldfish. The graph represents this relationship.Which points show equivalent ratios that would also be on the graph? Select all that apply.A. (6,18)B. (6,12)C. (4,10)D. (1,3) Define the terms of bacterial arrangements below.a.Strepto-b. Diplo-C.Staphylo-d. Tetrads-e.Sarcinae- Loading a patient into a helicopter while the engine is running and the rotors are in motion is known as a?Slow loadFast loadHot loadCold load The line segment OA is congruent to which line segment?A.) OBB.)PBC.)OPD.)PM on september 1, the company acquired five acres of land with a building that will be used as a warehouse. tristar paid $250,000 in cash for the property. according to appraisals, the land had a fair value of $178,200 and the building had a fair value of $91,800. on september 1, tristar signed a $55,000 noninterest-bearing note to purchase equipment. the $55,000 payment is due on september 1, 2022. assume that 10% is a reasonable interest rate. on september 15, a truck was donated to the corporation. similar trucks were selling for $4,000. on september 18, the company paid its lawyer $5,000 for organizing the corporation. on october 10, tristar purchased maintenance equipment for cash. the purchase price was $30,000 and $1,250 in freight charges also were paid. on december 2, tristar acquired various items of office equipment. the company was short of cash and could not pay the $7,000 normal cash price. the supplier agreed to accept 200 shares of the company's no-par common stock in exchange for the equipment. the fair value of the stock is not readily determinable. on december 10, the company acquired a tract of land at a cost of $35,000. it paid $5,000 down and signed a 12% note with both principal and interest due in one year. twelve percent is an appropriate rate of interest for this note. Graph the linear system and tell how many solutions it has. If there is exactly one solution, estimate the solution and check it algebraically. suppose you are long 100 contracts on amzn 1-year 25-delta strangle (25-delta call 25-delta put). how much will your option position increase in value if amzn stock price goes down by $1 (use negative number if value decreases; a contratct is 100 shares). a 4kg ball started rolling from rest on top of a 4m high ramp. what is the velocity of the ball at the bottom of the ramp?