1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulijaS [17]
3 years ago
7

How a student can use computer to improve academic performance?

Computers and Technology
2 answers:
yarga [219]3 years ago
6 0

Answer:

A student can use it by searching up things with his/her computer.

Browse for different new things everyday that gives knowledge.

Ask questions.

Do new things everyday.

A computer can easily input grades and send data.

Explanation:

Okay.

nikdorinn [45]3 years ago
3 0

Answer:

k Nishant

Explanation:

he can learn many things internet by using computer he change his self by learning about many things

You might be interested in
How does data structure affect the programs we use​
Semmy [17]

Answer The data structure and algorithm provide a set of techniques for that program in order for it to function. think of it like yt

Explanation:

7 0
3 years ago
Im building my first gaming pc, got any part suggestions or tips?
ladessa [460]

Answer:

You should find a good game engine that is not hard. Unity and Unreal are some good ones.

You should also search for the programming language you like the most, and use engines that use that specific language.

5 0
3 years ago
Read 2 more answers
Data as a service began with the notion that data quality could happen in a centralized place, cleansing and enriching data and
saul85 [17]

Answer: True

Explanation:

 Yes, the given statement is true that the data as the service model basically describe about the data quality which could be happened in the centralized place and also enriching the given data. It also offer the data services to the different types of users, system and applications.

 The data as a service (DaaS) is similar to the software as s service. The DaaS concept is that it is provided according to the requirement of the user such as data and information of the different types of product and services.

 It is technically known as the web delivering service which is offer by the cloud manager and its also perform various types of function.  

7 0
3 years ago
A _______ network is the most secure and is less likely to be hacked because of few access points. Question 1 options: A. wired
densk [106]
The answer would be a wired network
5 0
3 years ago
JAVAThe method longestStreak is intended to determine the longest substring of consecutive identical characters in the parameter
Butoxors [25]

Answer:

public static void longestStreak(String str){

       int maxCharacterCount = 0;

       char longestSubString = str.charAt(0);

       

       for(int i=0; i<str.length(); i++){

           

           int currentMaxCharacterCount = 1;

           

           for(int j=i+1; j<str.length(); j++){

               if(str.charAt(i) != str.charAt(j)){

                   break;

               }

               else {

                   currentMaxCharacterCount++;

               }

           }  

           if (currentMaxCharacterCount > maxCharacterCount) {

                   maxCharacterCount = currentMaxCharacterCount;

                   longestSubString = str.charAt(i);

           }

       }

       System.out.println(longestSubString + " "+ maxCharacterCount);

   }



Explanation:

Let's start from the top of the code and go all the way down.

- Two variables created; <em>maxCharacterCount</em> to count the longest character in the string, and <em>longestSubString</em> to save the current longest substring. Initially they are set to 0 and the first character of given string respectively.

- We need to check all the substrings to find longest one. That is why a <u>nested for loop</u> (for loop inside a for loop) is created.

- The first loop starts from the first character of the given string and goes until the end of the given string.

- Inside the first loop, <em>currentMaxCharacterCount</em> is created to hold the current value of the maximum character in the given string.

- The second loop starts from the second character of the string, and checks if the character is same as the one that is being checked by the first loop.

- If they are not same, then the loop stops.

- If they are the same characters, <em>currentMaxCharacterCount</em> is incremented by 1. (That means we may find our new longest substring)

* Reminder: When the <em>i</em> is equal to 0, <em>j </em>is increasing from 1 to given string length. When <em>i</em> is equal to 1 <em>j</em> is increasing from 2 to given string length and so on. This process repeats for all <em>i</em> and <em>j</em> values to find out the longest substring.

- If <em>currentMaxCharacterCount </em>is greater than<em> maxCharacterCount, </em>that means we have a new longest substring, and <em>maxCharacterCount </em>should be equal to this new substring's count.

- Then, to be able to check for the next possible longest substring, it should continue from the next iteration of the <em>i </em>(longestSubString = str.charAt(i);)

- Finally, when the loops are done checking, <em>longestSubString</em> and <em>maxCharacterCount</em> need to be printed.

5 0
3 years ago
Other questions:
  • Write a Bash script that searches all .c files in the current directory (and its subdirectories, recursively) for occurrences of
    14·1 answer
  • What does CSS stand for?
    8·2 answers
  • How do i divid 521 to the nearest tenth
    12·2 answers
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    12·1 answer
  • Where do deleted files go?
    7·2 answers
  • I have to write a program with a function that finds the biggest out of 3 numbers, but the problem is i have to use a reference
    6·1 answer
  • consider a group of 30 people who wish to establish pair-wise secure communications using symmetric-key cryptography. How many K
    15·1 answer
  • Suppose you have the following declaration.int[] beta = new int[50];Which of the following is a valid element of beta.(i) beta[0
    14·1 answer
  • 4. What is the simplest way to permanently get rid of an unwanted file?
    12·1 answer
  • Database policies should be created and implemented by all organizations, regardless of the ________ of the organization.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!