A potential danger of social media is that

Answers

Answer 1
It can cause users to want to live up to standards that they see on social media platforms and want to change their appearances because of things and people that they see on the platforms.
Answer 2

Answer: information can be viewed my strangers

Explanation:

Apex


Related Questions

HOW TO BE A EXPRET PLAYING AMONG US

Answers

Answer:

Just keep playing

Explanation:

That’s so how

Answer:

If inposter look afk and they will think you are afk and vote everyone else out

(;

These question can have multiple answers and check carefully.

These question can have multiple answers and check carefully.

Answers

The option which isn't part of the central processing unit is D. Input/Output device.

Computing is the A. a set of technical and mathematical means and techniques that's used to mechanize and automate the processes of computing and information process.

What is the central processing unit?

It should be noted that the central processing unit is the part of the computer which is used to retrieve and execute instructions.

It should be noted that there are three parts of the central processing unit and they are the arithmetic and logical unit, the memory unit and the contol unit.

Learn more about CPU on:

brainly.com/question/26991245

#SPJ1

Is there anyone to awnser Tech questions​

Answers

Answer:

yes

Explanation:

yes please i know the answer

irving is running cable underground beside his driveway to power a light at his entrance .what type of cable is he most likely using?
A.MC
B.NNC
C.UFD
D.UF

Answers

Based on the given information, Irving is running cable underground beside his driveway to power a light at his entrance. The most likely type of cable he would use in this scenario is "D. UF" cable.

Why is the cable Irving is using a UF cable and its importance

UF stands for "Underground Feeder" cable, which is specifically designed for underground installations.

It is commonly used for outdoor applications, such as running power to lights, pumps, or other outdoor fixtures. UF cable is moisture-resistant and has insulation suitable for direct burial without the need for additional conduit or piping.

Read more about cables here:

https://brainly.com/question/13151594

#SPJ1

Code a complete Java program to load and process a 1-dimensional array.

Create clear comments as you code to tell me what you are doing.
Import the Java libraries that you will need.
Create a single dimensional array that will hold 15 wages.
In the main, load an array with all of the records from a .txt file named Salary txt. The file has 15 records in it.
Sort the array in ascending order.
Write a method named increaseWages(). This method will add $500 to each of the 15 wages. In other words, you are giving each person a raise of $500.
Pass the array to the method from the main().
Increase the wage amounts in the array (as described above), in the method. In other words, in the end the array should hold the NEW, higher wages.
Output each new wage (use the console for this)
Calculate a total of the new wages in the method
Output the total of the new wages in the method (use a dialog box for this)
Return the array with the new wages to the main().
There is NO user interaction in this program.

Answers

Answer:

Here you go.Consider giving brainliest if it helped.

Explanation:

import java.io.*;//include this header for the file operation

import java.util.*;//to perform java utilities

import javax.swing.JOptionPane;//needed fro dialog box

class Driver{

  public static void main(String args[]){

      int wages[]=new int[15];//array to hold the wages

      int index=0;

      try{

          //use try catch for the file operation

          File file=new File("wages.txt");

          Scanner sc=new Scanner(file);//pass the file object to the scanner to ready values

          while(sc.hasNext()){

              String data=sc.nextLine();//reads a wage as a string

              String w=data.substring(1);//remove the dollar from the string data

              wages[index++]=Integer.parseInt(w);//convert the wage to int and store it in the array

          }

          sc.close();//close the scanner

      }catch(FileNotFoundException e){

          System.out.println("Error Occurrred While Reading File");

      }

     

      //sort the array using in built sort function

      Arrays.sort(wages);

      //print the wages

      System.out.println("Wages of 15 person in ascending order:");

      for(int i=0;i<wages.length;i++){

          System.out.print("$"+wages[i]+" ");

      }

      //call the increases wages method

      wages=increaseWages(wages);//this method return the updated wages array

     

  }

 

  //since we can call only static methods from main hence increaseWages is also static

  public static int[] increaseWages(int wages[]){

      //increase the wages

      for(int i=0;i<wages.length;i++){

          wages[i]+=500;

      }

     

      //print the new wages

      int sum=0;

      System.out.println("\n\nNew wages of 15 person in ascending order:");

      for(int i=0;i<wages.length;i++){

          sum+=wages[i];//sums up the new wages

          System.out.print("$"+wages[i]+" ");

      }

     

      //display the summation of the new wages in a dialog box

      JOptionPane.showMessageDialog(null,"Total of new wages: "+sum);

      return wages;

  }

}

Do anyone know how to code like I need someone do a code for me?

Answers

Answer:

yeah i can depends on what exactly it is but probably

Write a program named Twitter that accepts a user’s message and determines whether it is short enough for a social networking service that does not accept messages of more than 140 characters.

If the message is more than 140 characters, output The message is too long. Otherwise output The message is okay.

Answers

Explanation:

It's a very easy one, Liev:

using System;

class Twitter

{

static void Main()

{

Console.WriteLine("Enter your message");

Console.WriteLine();

string message = Console.ReadLine();

Console.WriteLine();

if (message.Length <= 140)

{

Console.WriteLine("Yes, it's short enough for Twitter");

}

else

{

Console.WriteLine("Sorry, it's too long for Twitter");

}

Console.ReadKey();

}

}

If you added the formula =SUM(B1:B5) to a spreadsheet, what would it do?
O A. Multiply the contents of cells B1, B2, B3, B4, and B5.
B. Subtract the content of cell B5 from that of cell B1.
C. Add together the contents of cells B1, B2, B3, B4, and B5.
D. Divide the content of cell B5 by that of cell B1.


If you dont know it dont just say an answer i really need this question its my finials

Answers

Answer:

C

Explanation:

Since you put "Sum" it will add

Choose all items that represent common website
design flaws.
menu at the top of the page
distracting background
short page-load times
too many or confusing fonts
poor navigation
dead hyperlinks

Answers

Isn’t it basically all of them haha?

Answer:

2,4,5,6

Explanation:

just answered it

true/false. to keep typed text within a shape such as a rectangle, one would use the input answer type tool. to keep typed text around the edges of a shape, one would use the type on a input answer tool.

Answers

You can choose a specific item from a group with only one click utilizing the group selection tool. You can choose a single anchor point or a group of them by using the Direct Selection tool.

What tool is used to move on a path or a form while selecting a certain portion of an object?

You have the flexibility to move or alter items thanks to the Path Selection tool's rapid selection of paths. Adjust tool settings using the Options bar.

What tool enables you to choose a component, such as an anchor point, from a shape?

Utilizing the Path Selection and Direct Selection Tools Use the Path Selection tool to choose a whole path. Make use of the Direct Selection tool to pick out individual paths.

To know more about group selection tool visit :-

https://brainly.com/question/29832130

#SPJ4

In computer science, what does the word security mean?
A. The methods used to collaborate with others by dividing up the
work
B. The methods used to protect the information stored by a piece of
software
C. The methods used to understand how videoconferencing tools
work
D. The methods used to make work more efficient and less time-
consuming

Answers

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

What type of function does a project management tool have that a task management tool does not?

Question 16 options:

file sharing


progress tracking


commenting


budgeting

Answers

The type of function that a project management tool have that a task management tool does not is commenting.

What purposes does a project management tool serve?

Project management tools are a a make up of software made to assist project teams in project planning, project tracking, and project management in order to meet project goals within a given time frame.

Note that the process of overseeing a task throughout its life cycle is known as task management. Planning, testing, tracking, and reporting are all part of it. Both individuals and groups of people can work together and exchange knowledge to attain common goals with the aid of task management.

Learn more about project management from

https://brainly.com/question/27995740
#SPJ1

To help insure that an HTML document renders well in many web browsers it is important to included which at top of file

Answers

Answer:

<!DOCTYPE html>

Explanation:

This tells the browseer that the code is HTML5 format

Write a program that prompts an SPC grad to enter her hourly pay rate and weekday (M-F) hours worked, and weekend hours worked last week. All three values might not be integers.
Understanding that "time and a half applies to weekday hours in excess of forty, and that
"double time" applies to any weekend hours, calculate and print the grad's regular pay, overtime pay, weekend pay, and total pay for the week. Outputs should display currency format with S signs, two decimals, and commas for thousands. Write a program using python

Answers

Below is a Python program that does what you've described:

python

# Prompt the user to enter pay rate and hours worked

pay_rate = float(input("Enter your hourly pay rate: "))

weekday_hours = float(input("Enter the number of weekday hours worked: "))

weekend_hours = float(input("Enter the number of weekend hours worked: "))

# Calculate regular pay

if weekday_hours <= 40:

   regular_pay = pay_rate * weekday_hours

else:

   regular_pay = pay_rate * 40

# Calculate overtime pay

if weekday_hours > 40:

   overtime_hours = weekday_hours - 40

   overtime_pay = pay_rate * 1.5 * overtime_hours

else:

   overtime_pay = 0

# Calculate weekend pay

weekend_pay = pay_rate * 2 * weekend_hours

# Calculate total pay

total_pay = regular_pay + overtime_pay + weekend_pay

# Display results

print(f"Regular pay: S{regular_pay:,.2f}")

print(f"Overtime pay: S{overtime_pay:,.2f}")

print(f"Weekend pay: S{weekend_pay:,.2f}")

print(f"Total pay: S{total_pay:,.2f}")

What is the program  about?

The way that the code above works is that:

The program prompts the user to enter their pay rate and the number of weekday and weekend hours worked.The program calculates the regular pay, which is the pay rate times the number of weekday hours worked, unless the number of weekday hours worked is greater than 40, in which case only the first 40 hours are paid at the regular rate.

Therefore,  program calculates the overtime pay, which is time and a half (1.5 times the pay rate) for each weekday hour worked in excess of 40.

Learn more about python from

https://brainly.com/question/26497128

#SPJ1

Which part of the Result block should you evaluate to determine the needs met rating for that result

Answers

To know the "Needs Met" rating for a specific result in the Result block, you should evaluate the metadata section of that result.

What is the  Result block

The assessment of the metadata section is necessary to determine the rating of "Needs Met" for a particular outcome listed in the Result block.

The metadata includes a field called needs_met, which evaluates the level of satisfaction with the result in terms of meeting the user's requirements. The needs_met category usually has a score between zero and ten, with ten implying that the outcome entirely fulfills the user's demands.

Learn more about Result block from

https://brainly.com/question/14510310

#SPJ1

Which of the following describes a codec? Choose all that apply.
a computer program that saves a digital audio file as a specific audio file format
short for coder-decoder
converts audio files, but does not compress them

Answers

Answer:

A, B

Explanation:

You have entered a URL into a browser and have received a 404 error. Which type of error did you receive?

Answers

Answer:

in redirect pages

Explanation:

the e page can not be down

Answer:

a 404 error is "File not found." This can happen when a file is deleted or there is an error in a hyperlink. It can also happen if a file is copied and the original deleted.

Explanation:

Plz answer me will mark as brainliest picture included ​

Plz answer me will mark as brainliest picture included

Answers

Answer:

Adc

Explanation:

the differencebetween browser and search engine
please my assignment have50 mark

Answers

Answer:

A browser is a piece of software that retrieves and displays web pages; a search engine is a website that helps people find web pages from other websites.

internet's initial development was supported by a)arpanet b)ibm c) Microsoft d) none of these​

Answers

Answer:

It was supported by arpanet in its initial stage.

hope it helps..

The layer of the ISO/OSI responsible for source to destination delivery.

Options:
(a) transport
(b) network
(c) data-link
(d) session ​

Answers

Answer:

(b) network

Explanation:

The Network Layer is the OSI Model's third layer. It is in charge of packet transport from source to destination or host to host across various networks. The layer receives data from the transport layer, adds a header to it, and sends it to the data link layer.

In North America, power cords must use a plug compatible with which of the following standards?

Answers

Answer:

NEMA 5-15

Explanation:

I hope this helps

you have an azure subscription. you plan to run a data warehouse in an azure virtual machine named VM1. you need to ensure that VM1 is optimized for running a data warehouse. which VM type should you use for VM1

Answers

Answer:

To ensure that VM1 is optimized for running a data warehouse, you should use an Azure virtual machine with a large amount of RAM and CPU cores, such as an Azure Standard_E64s_v3 or Standard_E64s_v2. Additionally, you should use a high-performance storage type, such as Azure Premium Storage, to ensure the best performance.

Explanation:

Answer:

Storage optimized (Ls-Series)  

The correct answer is "storage optimized" , because the data warehouse needs a lot of space. 100% Guaranteed

Explanation:

The right question is:

You have an Azure subscription.

You plan to run a data warehouse in an Azure virtual machine named VM1.

You need to ensure that VM1 is optimized for running a data warehouse.

Which VM type should you use for VM1 ?

General purpose (D-Series)

Compute optimized (F-Series)

Memory optimized (M-Series)

Storage optimized (Ls-Series)

High performance computing (H-Series)

what is government to business ​

Answers

Government-to-business is a relationship between businesses and governments where government agencies of various status/levels provide services and/or information to a business entity via government portals or with the help of other IT solutions.

Source: https://snov.io/glossary/g2b/

Write function maxInput() to return the greatest integer that input from keyboard (scanf inside your maxInput() function) and end when 0 was inputted.

Answers

Answer:

#include <stdio.h>

int maxInput(){

   int max;

   int n, i;

   max=-100;

   n=-10;

   i=0;

   while(1){

       scanf("%d",&n);

       if(max<=n && n!=0){

           max =n;

       }

       if (n==0){

           break;

       }

       i++;

   }

   if (i!=0){

   return max;

   }

   else{

       return 0;

   }

}

Explanation:

working with the tkinter(python) library



make the window you create always appear on top of other windows. You can do this with lift() or root.attributes('-topmost', ...), but this does not apply to full-screen windows. What can i do?

Answers

To make a tkinter window always appear on top of other windows, including full-screen windows, you must use the wm_attributes method with the topmost attribute set to True.

How can I make a tkinter window always appear on top of other windows?

By using the wm_attributes method in tkinter and setting the topmost attribute to True, you can ensure that your tkinter window stays on top of other windows, even when they are in full-screen mode.

This attribute allows you to maintain the window's visibility and prominence regardless of the current state of other windows on your screen.

Read more about python

brainly.com/question/26497128

#SPJ1

. Write a program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times.

Answers

The program to calculate the square of 20 by using a loop

that adds 20 to the accumulator 20 times is given:

The Program

accumulator = 0

for _ in range(20):

   accumulator += 20

square_of_20 = accumulator

print(square_of_20)

Algorithm:

Initialize an accumulator variable to 0.

Start a loop that iterates 20 times.

Inside the loop, add 20 to the accumulator.

After the loop, the accumulator will hold the square of 20.

Output the value of the accumulator (square of 20).

Read more about algorithm here:

https://brainly.com/question/29674035

#SPJ1

5. Let sigma = {0,1,+,=} and ADD = {x=y+z|x,y,z are binary intergers and x is the sum of y and z}.
Show that ADD is not regular. bining​

Answers

To prove that ADD is not regular, we can use the Pumping Lemma, which is a tool for proving the non-regularity of languages.

Assume ADD is a regular language. According to the Pumping Lemma, there exists a pumping length (p) such that any string in the language with a length of p or greater can be divided into substrings in a way that satisfies the pumping conditions.

Let's consider a string "s" in ADD that satisfies the pumping conditions. Since s is in ADD, it can be represented as x = y + z, where x, y, and z are binary integers.

Now, we can analyze the possible cases for dividing the string s into substrings: x, y, and z.

1. If y contains only 0s or only 1s, then pumping up or down by repeating y will result in a string that is no longer in ADD since the sum of two binary integers will always have a carry-over.

2. If y contains a mix of 0s and 1s, we can pump up or down by repeating y to change the balance between 0s and 1s. This will result in a string that violates the condition for binary addition.

In both cases, the pumped string will no longer be in ADD, which contradicts the assumption that ADD is regular.

Therefore, we can conclude that ADD is not a regular language.

By using the Pumping Lemma and analyzing the properties of the language ADD, we have shown that it does not satisfy the conditions for regularity.

for more questions on Pumping Lemma,

https://brainly.com/question/30819932

#SPJ11

Please describe how you can use the login page to get the server run two SQL statements. Try the attack to delete a record from the database, and describe your observation.

Answers

The only sure way to prevent SQL Injection attacks is input validation and parametrized queries including prepared statements. The application code should never use the input directly. ... Database errors can be used with SQL Injection to gain information about your database.

Which is NOT a valid sparkline type?
O line
O column
Owin/loss
O bar

Answers

Answer: bar
Bar is not a valid sparkling type
Other Questions
A stock has a beta of 1.75 and an expected return of 12 percent. A risk-free asset currently earns 3.0 percent.a. What is the expected return on a portfolio that is equally invested in the two assets? (Round your answer to 2 decimal places. (e.g., 32.16)) Expected return %b. If a portfolio of the two assets has a beta of 0.98, what are the portfolio weights? (Round your answer to 4 decimal places. (e.g., 32.1616))Weight of stock Risk-free weight c. If a portfolio of the two assets has an expected return of 9 percent, what is its beta? (Do not round intermediate calculations and round your answer to 3 decimal places. (e.g., 32.161)) Beta d. If a portfolio of the two assets has a beta of 3.50, what are the portfolio weights? (Negative amount should be indicated by a minus sign.)Weight of stock Risk-free weight For the following exercises, use the fundamental identities to fully simplify the expression. 6. sin(x)cos (x)sec(x) 7. sin (-x)cos (-x)csc (-x) Apprenticeship programs are registered by which of the following organizations Which source is most clearly a secondary source? write a story that ends with "it was a blessing in disguise" what does a mla in-text citation include in parentheses when the source is quoted directly and the author's name is mentioned in the text? question 6 options: author and page number without intervening punctuation (doe 25) author, publication year, and page number: (doe, 2007, p. 25) author and publication year: (doe, 2007) author and page number separated by a comma: (doe, 25) Please answer the question solve for s. 3(s+11)=57 What is the complete solution to the followingequation?ew25 - 5x = 5(-x+5) What statement could be used to prove that m // n?HELP The Case of the Poorly Written Manual John Howard was shaking his head as he left the meeting with his boss, Joe French. Joe was right; the new technical manual was simply not up to the company's standards. Yes, he had told Joe that there were three new people in the test group, but that was no excuse. The three apparently were simply not capable writers; they might be capable product engineers, but their writing was terrible. John called the training department and asked for Susan Harris. Could Susan schedule his three new employees in her next technical writing course? 1. What are John's assumptions in making this decision? 2. Is this an appropriate approach to solving his problem? what evidence did alfred wegener use to support his continental drift hypothesis? (use three examples) What is the percent yield for a certain reaction when 56.8 g of product wasobtained in the lab, but the theoretical yield was 64.4g? The endpoints of LF are L(-2, 3) and F(3, 1). The endpoints of JR are J(1, -1) and R(2, -3). What is the approximate difference in the lengths of the two segments? Help!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Correct answer please to both question D & EI will mark you brainliest a moist red litmus paper is used for testing ammonia gas ,why What is a semi-fluid layer of solid-liquid rock? one of the longest unwritten chapters in the history of the united states is that treating the relations of the negroes and the indian Using the drop-down menus below, identify the processes cells use to maintain homeostasis. A. is the movement of water along the concentration gradient. B. is the use of energy to move particles against the concentration gradient. C. is the movement of particles by diffusion without energy. D. is the movement of particles along the concentration gradient. Solve the system 3x-7y=-24 3x-7y=-18