What does the Java Virtual Machine seek first?

Answers

Answer 1

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The Java Virtual Machine seek first class loader, where this machine load, link and initialize the classes.

However, at the architecture level, when you are running java code in different machine/operating systems, it will seek first firewall.


Related Questions

Adam has decided to add a table in a Word doc to organize the information better. Where will he find this option? Insert tab, Illustrations group Insert tab, Symbols group Insert tab, Tables group Design tab, Page Layout group

Answers

He will have to navigate to the Insert Tab and then Click on Table option.

Answer:

C

Explanation:

find four
reasons
Why must shutdown the system following the normal sequence

Answers

If you have a problem with a server and you want to bring the system down so that you could then reseat the card before restarting it, you can use this command, it will shut down the system in an orderly manner.

"init 0" command completely shuts down the system in an order manner

init is the first process to start when a computer boots up and keep running until the system ends. It is the root of all other processes.

İnit command is used in different runlevels, which extend from 0 through 6. "init 0" is used to halt the system, basically init 0

shuts down the system before safely turning power off.

stops system services and daemons.

terminates all running processes.

Unmounts all file systems.

Learn more about  server on:

https://brainly.com/question/29888289

#SPJ1

C programming

You are to write a program which will have the following Functions:
.getAreaRectangle
.getArea Triangle
.getAreaCircle
getPerimeterRectangle
.getPerimeter Triangle
• getPerimeterCircle

You will first need to ask the user if they want to find the Area or the Perimeter.

Then you will ask of which shape (Rectangle, Triangle, Circle).
Finally, based on the input of the user, you will call the Function, passing all necessary variables to the function. The function will
return the answer and you will then display the correct answer on the screen.

This is going to be a long program!! It will mainly test your ability to use Condition statements and Functions. You can use a switch
for the menu if you want.

Answers

Answer:

Here's an example program in C that implements the requirements

#include <stdio.h>

#include <math.h>

// Function prototypes

double getAreaRectangle(double width, double height);

double getAreaTriangle(double base, double height);

double getAreaCircle(double radius);

double getPerimeterRectangle(double width, double height);

double getPerimeterTriangle(double side1, double side2, double side3);

double getPerimeterCircle(double radius);

int main() {

   char shapeType;

   char calcType;

   // Ask user if they want to find the area or perimeter

   printf("Do you want to find the area or perimeter? (a/p): ");

   scanf("%c", &calcType);

   // Ask user which shape they want to calculate for

   printf("Which shape do you want to calculate for? (r/t/c): ");

   scanf(" %c", &shapeType);

   double result;

   switch (shapeType) {

       case 'r': // Rectangle

           double width, height;

           printf("Enter the width and height of the rectangle: ");

           scanf("%lf %lf", &width, &height);

           if (calcType == 'a') {

               result = getAreaRectangle(width, height);

               printf("The area of the rectangle is %.2lf\n", result);

           } else if (calcType == 'p') {

               result = getPerimeterRectangle(width, height);

               printf("The perimeter of the rectangle is %.2lf\n", result);

           }

           break;

       case 't': // Triangle

           double base, height_t, side1, side2, side3;

           printf("Enter the base and height of the triangle: ");

           scanf("%lf %lf", &base, &height_t);

           printf("Enter the three sides of the triangle: ");

           scanf("%lf %lf %lf", &side1, &side2, &side3);

           if (calcType == 'a') {

               result = getAreaTriangle(base, height_t);

               printf("The area of the triangle is %.2lf\n", result);

           } else if (calcType == 'p') {

               result = getPerimeterTriangle(side1, side2, side3);

               printf("The perimeter of the triangle is %.2lf\n", result);

           }

           break;

       case 'c': // Circle

           double radius;

           printf("Enter the radius of the circle: ");

           scanf("%lf", &radius);

           if (calcType == 'a') {

               result = getAreaCircle(radius);

               printf("The area of the circle is %.2lf\n", result);

           } else if (calcType == 'p') {

               result = getPerimeterCircle(radius);

               printf("The perimeter of the circle is %.2lf\n", result);

           }

           break;

       default:

           printf("Invalid shape type entered.\n");

           break;

   }

   return 0;

}

double getAreaRectangle(double width, double height) {

   return width * height;

}

double getAreaTriangle(double base, double height) {

   return 0.5 * base * height;

}

double getAreaCircle(double radius) {

   return M_PI * radius * radius;

}

double getPerimeterRectangle(double width, double height) {

   return 2 * (width + height);

}

double getPerimeterTriangle(double side1, double side2, double side3) {

   return side1 + side2 + side3;

}

double getPerimeterCircle(double radius) {

   return 2 * M_PI * radius;

}

~ In this program, the main() function prompts the user for ~

(Please do not answer with a link, Answer in here) Milagros designed a game by dragging and dropping pre-made blocks that contain elements of code. Which term best describes what Milagros used?
Group of answer choices

blocking code

basic code

block-based code

editing code

Answers

Answer:the second one

Explanation:

The term best describes what Milagros used is blocking code. The correct option is b.

What are blocking codes?

Block coding is a technique for computer programming that converts text-based software into a visual block format, making it simple to create animated games, characters, and stories without the use of actual text in the coding.

To write a block code, open the text page on your java language. Write a block of javascript. Now, you run java on your computer.

Block-based coding is used by programmers to program any application or computer program. Block code is used to construct games and stories. These codes are used for making kids-friendly games and stories apps.

Therefore, the correct option is b, blocking code regarding what Milagros used.

To learn more about blocking codes, refer to the link:

https://brainly.com/question/17583871

#SPJ2

Create a Java program that asks the user for three test
scores. The program should display the average of the
test scores, and the letter grade (A, B, C, D or F) that
corresponds to the numerical average. (use dialog boxes
for input/output)

Answers

Answer:

there aren't many points so it's not really worth it but here

kotlin

Copy code

import javax.swing.JOptionPane;

public class TestScoreGrader {

 public static void main(String[] args) {

   double score1, score2, score3, average;

   String input, output;

   input = JOptionPane.showInputDialog("Enter score 1: ");

   score1 = Double.parseDouble(input);

   input = JOptionPane.showInputDialog("Enter score 2: ");

   score2 = Double.parseDouble(input);

   input = JOptionPane.showInputDialog("Enter score 3: ");

   score3 = Double.parseDouble(input);

   average = (score1 + score2 + score3) / 3;

   output = "The average is " + average + "\n";

   output += "The letter grade is " + getLetterGrade(average);

   JOptionPane.showMessageDialog(null, output);

 }

 public static char getLetterGrade(double average) {

   if (average >= 90) {

     return 'A';

   } else if (average >= 80) {

     return 'B';

   } else if (average >= 70) {

     return 'C';

   } else if (average >= 60) {

     return 'D';

   } else {

     return 'F';

   }

 }

}

Explanation:

list of functions of control unit​

Answers

Answer:

I guess it would help you

list of functions of control unit

What tool can help discover and report computer errors when you first turn on a computer and before the operating system is launched?

Answers

Answer:

a post diagnostic

Explanation:

Answer:

post diagnostic Card

Explanation:

a post diagnostic card helps discover computer errors.

numPeople is read from input as the size of the vector. Then, numPeople elements are read from input into the vector runningListings. Use a loop to access each element in the vector and if the element is equal to 3, output the element followed by a newline.

Ex: If the input is 7 193 3 18 116 3 3 79, then the output is:

3
3
3

Answers

Using a loop to access each element in the vector and if the element is equal to 3, is in explanation part.

Here's the Python code to implement the given task:

```

numPeople = int(input())

runningListings = []

for i in range(numPeople):

   runningListings.append(int(input()))

for listing in runningListings:

   if listing == 3:

       print(listing)

```

Here's how the code works:

The first input specifies the size of the vector, which is stored in the variable `numPeople`.A `for` loop is used to read `numPeople` elements from input and store them in the vector `runningListings`.Another `for` loop is used to iterate through each element in `runningListings`.For each element, if it is equal to 3, it is printed to the console followed by a newline.

Thus, this can be the program for the given scenario.

For more details regarding programming, visit:

https://brainly.com/question/14368396

#SPJ1

Pls due soon



Directions: Answer these questions as you navigate through the modules of the Computer Basics Tutorial.



Define computer:

What are the functions of a computer?

Name three ways in which you can use a computer?

Define hardware:

Define software:

Name at least four different types of computers.

What are the two main styles that personal computers come in?

What is the purpose of the operating system?

Name the three most common operating systems for PCs.

What does GUI stand for and what is its purpose?

In what year did Microsoft create Windows?

What is MAC OS?

What is Linux?

Name three operating systems designed specifically for mobile devices?

What is an App?

What are apps for mobile devices called?

Name six types of desktop applications?

Name three examples of mobile apps (does not have to come from the tutorial)?

What is the Cloud?

Name three services that use the Cloud?

Give at least one reason why someone would want to use the Cloud.

Give three examples of web apps?

What are the basic parts of a desktop computer and what purpose does each one serve?

Name two common mouse alternatives?

Name at least five peripherals?

What is the CPU/Processor of a computer?

How is the processor’s speed measured?

What is the motherboard and what purpose does it serve?

What does the power supply unit do?

What is RAM and what is it measured in?

What is a hard drive and what purpose does it serve?

What is the purpose of each of the following:

expansion card

video card

sound card

network card

Bluetooth card

What is a laptop computer and how is it different from a desktop computer?

What is a mobile device? Give three examples.

What is a smartphone?

What are 3G, 4G, and LTEs?

How is a tablet computer different from a laptop? What are some advantages and disadvantages of using a tablet?

What is the desktop and what features does it usually contain?

What is the purpose of using folders on the computer?

What is the purpose of the Recycle Bin?

Name three things you need to access the Internet?

Describe each of the following common types of Inter services:

Dial-up

DSL

Cable

Satellite

3G and 4G

What are some things you should consider when you are choosing and Internet Service Provider?

What is a modem?

What is a router?

What is a network card?

What does Wi-Fi stand for?

What is a web browser and what is its main job?

What is the World Wide Web?

Name three different types of web browsers?

Explain the following security terms:

SSID:

Encryption password

Encryption

Passphrase

What steps do you need to take to keep your computer healthy?

How do you deal with spilled liquid on your keyboard?

How do you clean the mouse and the monitor?

What is malware and what does it include? What is the best way to guard against malware?

In what ways can you back up your computer?

Name several techniques to maintain your computer?

Define computer ergonomics.

What are four general tips to keep in mind when troubleshooting your computer?

What is a flash drive?

What is Cloud storage?

What is the proper way to safely remove a flash drive from the computer?

Name three free popular services that allow you to save data to the Cloud?

What are accessibility features? Name three?

Name three assistive technology devices and what they are used for?

Answers

Answer:

Software for personal computers is typically developed and distributed independently from the hardware or operating system manufacturers. Many personal computer users no longer need to write their own programs to make any use of a personal computer, although end-user programming is still feasible. This contrasts with mobile systems, where software is often only available through a manufacturer-supported channel. And end-user program development may be discouraged by lack of support by the manufacturer.

Explanation:

Complete the sentence. A data is the precisely formatted unit of data that travels from one computer to another​

Answers

Answer:

packet

Explanation:

website is a collection of (a)audio files(b) image files (c) video files (d)HTML files​

Answers

Website is a collection of (b) image files (c) video files and  (d)HTML files​

What is website

Many websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.

To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.

Learn more about  website  from

https://brainly.com/question/28431103

#SPJ1

switches use resistors in series and parallel and can function well as digital inputs
to electronic control systems.
Select one:
O a. Proximity
O b. Smart
O C. Touch-sensitive
O d. Push button

Answers

Answer:

d push button bc it will cut all power when in off

(Please Help! Timed Quiz!) Messages that have been accessed or viewed in the Reading pane are automatically marked in Outlook and the message subject is no longer in bold. How does a user go about marking the subject in bold again?

*Mark as Read
*Flag the Item for follow-up
*Assign a Category
*Mark as Unread

Answers

Answer:

D Mark as Unread

Explanation:

I just took the test

what logo is this? can someone else please answer this?​

what logo is this? can someone else please answer this?

Answers

maybe it’s Adidas?

Sorry if I’m wrong
But I hope it help

what is the difference between hydra and hadoop?​

Answers

Hadoop is batch oriented whereas Hydra supports both real-time as well as batch orientation.

The Hadoop library is a framework that allows the distribution of the processing of large data maps across clusters of computers using simple as well as complex programming models. batch-oriented analytics tool to an ecosystem full of multiple sellers in its own orientation, applications, tools, devices, and services has coincided with the rise of the big data market.

What is Hydra?

It’s a distributing multi - task-processing management system that supports batch operations as well as streaming in one go. It uses the help of a tree-based data structure and log algorithms to store data as well as process them across clusters with thousands of individual nodes and vertexes.

Hydra features a Linux-based file system In addition to a job/client management component that automatically allocates new jobs to the cluster and re-schedules the jobs.

Know more about Big Data: https://brainly.com/question/28333051

Control structures are used while performing everyday tasks.
If you had to make a choice between studies and games during a holiday, you would use the
your name and address on ten assignment books, you would use the
control structure.
ghts reserved.
Reset
O
>
Next
control structure. If you had to fill

Answers

Control structures are merely a means of defining the direction of control in programs.

Thus, Any algorithm or program that makes use of self-contained modules known as logic or control structures will be easier to understand and comprehend. On the basis of particular criteria or conditions, it essentially examines and selects the direction in which a program flows.

As the name implies, sequential logic follows a serial or sequential flow, and the flow is determined by the set of instructions that are delivered to the computer. The modules are performed in the obvious order unless further instructions are specified and control structures.

Sequences can be explicitly stated by using numbered steps. implicitly adheres to the writing of modules as well. The majority of processes, including some complicated issues, will typically adhere to this fundamental flow pattern and program.

Thus, Control structures are merely a means of defining the direction of control in programs.

Learn more about Control structure, refer to the link:

https://brainly.com/question/27960688

#SPJ1

Add code to ImageArt to start with your own image and "do things to it" with the goal of making art. You could, for example, change the brightness and blur it. Or you could flip colors around, and create a wavy pattern. In any case, you need to perform at least two transforms in sequence.

Add code to ImageArt to start with your own image and "do things to it" with the goal of making art.

Answers

Attached an example of how you can modify the code to apply brightness adjustment and blur effects to the image.

What is the explanation for the code?

Instruction related to the above code

Make sure to replace   "your_image.jpg" with the path to your own image file.

You can   experiment with different image processing techniques, such as color manipulation, filtering,edge detection, or any other transformations to create unique artistic effects.

Learn more about code at:

https://brainly.com/question/26134656

#SPJ1

Add code to ImageArt to start with your own image and "do things to it" with the goal of making art.

what does the acronym SAFe stand for?​

Answers

Answer:

Security and Accountability for Every

PLEASE HELP
Find five secure websites. For each site, include the following:

the name of the site

a link to the site

a screenshot of the security icon for each specific site

a description of how you knew the site was secure

Use your own words and complete sentences when explaining how you knew the site was secure.

Answers

The name of the secure websites are given as follows:

wwwdotoxdotacdotuk [University of Oxford]wwwdotmitdotedu [Massachusetts Institute of Technology]wwwdotwordbankdotorg [World Bank]wwwdotifcdotorg [International Finance Corporation]wwwdotinvestopediadotorg [Investopedia]

Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.

What is Website Security?

The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.

It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.

Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.

Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.

Learn more about website security:
https://brainly.com/question/28269688
#SPJ1

PLEASE HELPFind five secure websites. For each site, include the following:the name of the sitea link

What feature allows a person to key on the new lines without tapping the return or enter key

Answers

The feature that allows a person to key on new lines without tapping the return or enter key is called word wrap

How to determine the feature

When the current line is full with text, word wrap automatically shifts the pointer to a new line, removing the need to manually press the return or enter key.

In apps like word processors, text editors, and messaging services, it makes sure that text flows naturally within the available space.

This function allows for continued typing without the interruption of line breaks, which is very helpful when writing large paragraphs or dealing with a little amount of screen space.

Learn more about word wrap at: https://brainly.com/question/26721412

#SPJ1

different between input and output device​

Answers

Answer:

An input device is something you connect to a computer that sends information into the computer. An output device is something you connect to a computer that has information sent to it.

Explanation:

Append newValue to the end of vector tempReadings. Ex: If newValue = 67, then tempReadings = {53, 57, 60} becomes {53, 57, 60, 67}.
#include
#include
using namespace std;
int main() {
vector tempReadings(3);
int newValue = 0;
unsigned int i = 0;
tempReadings.at(0) = 53;
tempReadings.at(1) = 57;
tempReadings.at(2) = 60;
newValue = 67;
/* Your solution goes here */
for (i = 0; i < tempReadings.size(); ++i) {
cout << tempReadings.at(i) << " ";
}
cout << endl;
return 0;
}
2.Remove the last element from vector ticketList.
#include
#include
using namespace std;
int main() {
vector ticketList(3);
unsigned int i = 0;
ticketList.at(0) = 5;
ticketList.at(1) = 100;
ticketList.at(2) = 12;
/* Your solution goes here */
for (i = 0; i < ticketList.size(); ++i) {
cout << ticketList.at(i) << " ";
}
cout << endl;
return 0;
}
3. Assign the size of vector sensorReadings to currentSize.
#include
#include
using namespace std;
int main() {
vector sensorReadings(4);
int currentSize = 0;
sensorReadings.resize(10);
/* Your solution goes here */
cout << "Number of elements: " << currentSize << endl;
return 0;
}
4. Write a statement to print "Last mpg reading: " followed by the value of mpgTracker's last element. End with newline. Ex: If mpgTracker = {17, 19, 20}, print:
Last mpg reading: 20
#include
#include
using namespace std;
int main() {
vector mpgTracker(3);
mpgTracker.at(0) = 17;
mpgTracker.at(1) = 19;
mpgTracker.at(2) = 20;
/* Your solution goes here */
return 0;}

Answers

Answer:

Following are the code to this question:

In question 1:

tempReadings.push_back(newValue); //using array that store value in at 3 position

In question 2:

ticketList.pop_back(); //defining ticketList that uses the pop_back method to remove last insert value

In question 3:

currentSize = sensorReadings.size(); /defining currentSize variable holds the sensorReadings size value

In question 4:

cout<<"Last mpg reading: "<<mpgTracker.at(mpgTracker.size()-1)<<endl;

//using mpgTracker array with at method that prints last element value

Explanation:

please find the attachment of the questions output:

In the first question, it uses the push_back method, which assigns the value in the third position, that is "53, 57, 60, and 67 "In the second question, It uses the pop_back method, which removes the last element, that is "5 and 100"In the third question, It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10".In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".
Append newValue to the end of vector tempReadings. Ex: If newValue = 67, then tempReadings = {53, 57,
Append newValue to the end of vector tempReadings. Ex: If newValue = 67, then tempReadings = {53, 57,
Append newValue to the end of vector tempReadings. Ex: If newValue = 67, then tempReadings = {53, 57,
Append newValue to the end of vector tempReadings. Ex: If newValue = 67, then tempReadings = {53, 57,

Using data from interviews with ESCO executives conducted in late 2012, this study examines the market size, growth forecasts, and industry trends in the United States for the ESCO sector.

Thus,  It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10". In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".

There are numerous types of gateways that can operate at various protocol layer depths.

Application layer gateways (ALGs) are also frequently used, albeit most frequently a gateway refers to a device that translates the physical and link layers. It is best to avoid the latter because it complicates deployments and is a frequent source of error.

Thus, Using data from interviews with Gateway executives conducted in late 2012, this study examines the market size, growth Esco size and industry trends in the United States for the Gateway.

Learn more about Gateway, refer to the link:

https://brainly.com/question/30167838

#SPJ6

In c++, make the output exactly as shown in the example.

In c++, make the output exactly as shown in the example.

Answers

Answer:

Here's a C++ program that takes a positive integer as input, and outputs a string of 1's and 0's representing the integer in reverse binary:

#include <iostream>

#include <string>

std::string reverse_binary(int x) {

   std::string result = "";

   while (x > 0) {

       result += std::to_string(x % 2);

       x /= 2;

   }

   return result;

}

int main() {

   int x;

   std::cin >> x;

   std::cout << reverse_binary(x) << std::endl;

   return 0;

}

The reverse_binary function takes an integer x as input, and returns a string of 1's and 0's representing x in reverse binary. The function uses a while loop to repeatedly divide x by 2 and append the remainder (either 0 or 1) to the result string. Once x is zero, the function returns the result string.

In the main function, we simply read in an integer from std::cin, call reverse_binary to get the reverse binary representation as a string, and then output the string to std::cout.

For example, if the user inputs 6, the output will be "011".

Hope this helps!

Write a program in Python to sum to numbers:

Urgently needed, please.

Answers

num1 = float(input("Enter the first number: "))

num2 = float(input("Enter the second number: "))

print("{} + {} = {}".format(num1,num2,num1+num2))

Variables num1 and num2 prompt the user for a number. The print function then displays the answer and equation.

Prompt: A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-life of about 6 hours in humans. Given caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 24 hours. Use a string formatting expression with conversion specifiers to output the caffeine amount as floating-point numbers.

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))

Ex: If the input is:

100
the output is:

After 6 hours: 50.00 mg
After 12 hours: 25.00 mg
After 24 hours: 6.25 mg

my code:
caffeine_mg = float(input())

six_hours = caffeine_mg / 2
twelve_hours = six_hours / 2
twenty_four_hours = twelve_hours / 4

print('After 6 hours: {:.2f}'.format(six_hours))
print('After 12 hours: {:.2f}'.format(twelve_hours))
print('After 24 hours: {:.2f}'.format(twenty_four_hours))

Question: How do I add "mg" at the end? This is my output
After 6 hours: 50.00
After 12 hours: 25.00
After 24 hours: 6.25

Answers

Answer:

caffeine_mg = float(input())

six_hours = caffeine_mg / 2

twelve_hours = six_hours / 2

twenty_four_hours = twelve_hours / 4

print('After 6 hours: {:.2f} mg'.format(six_hours))

print('After 12 hours: {:.2f} mg'.format(twelve_hours))

print('After 24 hours: {:.2f} mg'.format(twenty_four_hours))

The program is a sequential program, and does not require loops or conditional statements.

The program in Python, where comments are used to explain each line is as follows:

#This gets input for the Caffeine Amount

caffeineMg = float(input("Caffeine Amount: "))

#This prints the amount after 6 hours

print("After 6 hours: {:.2f}mg". format(caffeineMg/2.0))

#This prints the amount after 12 hours

print("After 12 hours: {:.2f}mg". format(caffeineMg/4.0))

#This prints the amount after 24 hours

print("After 24 hours: {:.2f}mg". format(caffeineMg/8.0))

Read more about sequential program at:

https://brainly.com/question/17970226

What are some examples and non-examples of digital law?

Answers

Examples: Plagiarism. Illegal downloads - music, games, movies etc. Piracy. Stealing someone's identity.

Non-Examples: Sending Scams, Copyright Infringement, Sexting

Someone who gets pleasure out of hurting people online and starting conflicts and is a/an

Question 8 options:



advocate.




bystander.




troll.




positive digital citizen.

Answers

A person who gets pleasure out of hurting people online and starting conflicts is a troll.

Explanation:

A troll is someone who posts inflammatory, off-topic, or offensive messages in online forums or discussion boards, often with the intent of causing disruption or starting conflicts. They often hide behind anonymity and use the internet as a tool to hurt people or cause trouble. They don't have the same goal as an advocate, who is someone who actively works to support a cause or policy, or a bystander, who is someone who is present during an event but doesn't take part in it. On the other hand, a positive digital citizen is someone who use digital technology responsibly and ethically, who respect other people's rights and privacy and is aware of the impact of their actions online.

Why are formulas used in spreadsheets?
A to ensure that data is entered correctly
B so that calculations are automatically redone when data is changed
C to ensure that data is properly formatted
D so that errors can be easily identified when data is changed.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is B.

The formulas in the spreadsheet are used to do the automatic calculation when data is changed in the spreadsheet.

For example, if you add numbers in a column and then get average. you can use sum() and average() formula to calculate the sum and average of numbers in a column. If you will change any number in the column, the calculation for sum and average automatically done. So, the answer to this question is B. i.e.

so that calculations are automatically redone when data is changed.

While the other options are not correct because:

To ensure data is entered correctly is done by validation not by using formula.To ensure data is properly formated is done in the formatting section.The error can be easily identified using validation features in excel.

In this activity, you will conduct online research and explain how Social Media Connectivity has impacted aspects of your life.

Social media tools allow you to connect with people anywhere in the world who share your interests. Evaluate your interactions with people living outside the United States using various social media tools. How have these influences helped you break cultural stereotypes and discover the local activities, career aspirations, and sports preferences of people from other cultures? What are the social media tools that you used to form these connections? Explain how these connections have influenced you, providing specific examples.

Answers

Social media connectivity has both positive and negative impacts on human life in modern times. As it includes various tools through which people connect anywhere in the world.

What are the social media tools that you used to form these connections?

The social media tools that you used to form these connections may basically include MeetEdgar, Post planner, Agorapulse, Sprout Social, Hootsuite, Sendible, Tailwind, Buffer, and many more.

Social media helps individuals connect with others and develop new relationships. However, such relationships tend to be more formal and transient. Social media users tend to not share close and trusting relationships with their online friends.

Social media's influence has given rise to a different genre of communication, where conversations are quick and information is easily relayed. Due to its widespread impact, employers are seeking professionals who are well-versed in social media platforms to take on important roles within an organization.

To learn more about Social media connectivity, refer to the link:

https://brainly.com/question/27947249

#SPJ1

Explain briefly what would happen if marketing research is not conducted before a product is developed and produced for sale.

Answers

Answer:

Neglecting to do market research can result in indecision and inaction, fear of risk or the truth, and/or too many options, which can lead to paralysis. When launching a new product, effective market research will help you narrow down your true market potential and your most likely customers.

Explanation:

Other Questions
how do you solve this problem to find the measure of the angle indicated in bold? thank you pls answer! Which of the following is the most suitable for wavelength standard? a) Cadmium 114 b) Krypton 86 c) Mercury 198 d) Any monochromatic light. urban elite cosmetics has used a traditional cost accounting system to apply quality-control costs uniformly to all products at a rate of 18 percent of direct-labor cost. monthly direct-labor cost for satin sheen makeup is $99,000. in an attempt to more equitably distribute quality-control costs, management is considering activity-based costing. the monthly data shown in the following chart have been gathered for satin sheen makeup. activity cost pool cost driver pool rates quantity of driver for satin sheen incoming material inspection type of material $ 24.00 per type 24 types in-process inspection number of units 0.26 per unit 34,000 units product certification per order 148.00 per order 75 orders required: 1. calculate the monthly quality-control cost to be assigned to the satin sheen product line under each of the following product-costing systems. a. traditional system, which assigns overhead on the basis of direct-labor cost. b. activity-based costing. 2. does the traditional product-costing system overcost or undercost the satin sheen product line with respect to quality-control costs? by what amount? How did the racial caste system become justified during the Enlightenment era?a) Slavery was createdb)It went from scientific justification to religious justificationc) John Locke said slavery was allowed.d)It went from religious justification to scientific justification a normative statement evaluates group of answer choices what will be. what is. what was. what ought to be. i need help in this one please help me Liz truss resigned on thursday, making her the shortest-serving prime minister in british history. How long was she in office?. misinterpreting normal physical sensations as symptoms of a dreaded disease is indicative of Which of the following reflect healthy examples of spiritual healthhaving a purpose in lifefollowing your values and moralshaving high self-esteemasking for help when feeling overwhelmed Writing essay tips for intermediate. What are 3 reasons why phones should not be allowed in school?. Kim paid $996.54 for a bond one year ago with a yield to maturity of 8.25% and a coupon rate of 6.75%. Today, the bond is worth $1000.95. What was Kim's total percentage return over the past year?Multiple Choicea. 8.25%b. 6.75%c. 0.44%d. 7.22%e. 2.38% Last week Tina did 500 box jumps , 350 pushups, and 700 sit-ups. Ben did 1.5 times as many pushups as tina . he did 3/4 ( three fourths) ( 3 with a line underneath and then 4) as many box jumps and sit-ups as tina. how many box jumps, sit ups and pushups did ben do Read the following paragraph. Manny is writing a paper about whether violence in video games makes kids more violent. He found a news article about violence in video games on a national news organizations .com website. The article seemed to be objective and the news organization is well known. On the website, readers are allowed to post comments about the article. One reader posted a comment with a lot of information that she claimed proved that violent video games do not make kids more violent. Manny thinks that the information in this readers comment might be helpful in his paper. Which statement is the best evaluation of the readers comment as a source of information? The readers comment is a credible source because it was posted in response to an objective article. The readers comment is a credible source because it was posted on a trusted website. The readers comment is not a credible source because nothing is known about the person who wrote the comment. The readers comment is not a credible source because the website it was found on is not credible 10.0g of fe and 7.00g of 02 react how many grams of fe203 are produced When Polonius complains that the actor's speech ". . . Is too long" Hamlet reacts angrily. Aside from theobvious rudeness of Polonius's interruption, why does Hamlet get in his face (by speaking threateningly ofhis "beard")? A horizontal force of 90.7 N is applied to a 40.5 kg crate on a rough, level surface. If the crate accelerates at 1.08 m/s, what is the magnitude of the force of kinetic friction (in N) acting on the crate? someone plz help with problemby the way funny photo What is the volume of a rectangular prism with a length of 5 cm, a height of 3 cm, and a width of 10 cm?A18 cm3B150 cm3C190 cm3D80 cm3 What choice best explains why the author put the battle with grendels mother at the bottom of the lake