1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
9966 [12]
3 years ago
14

A shift in Demand occurs when the Demand curve moves either to the left or right. This results in a change in quantity without a

change in which of the following?
A. Amount
B. Demand
C. Price
Computers and Technology
1 answer:
Marina86 [1]3 years ago
7 0
I think it is Price absolutely
You might be interested in
Brainiest To Best Answer!! Java coding help, can you tell me what Switch and Case does using the example below?
fiasKO [112]
The switch statement is an n-way branch. An n-way branch can branch to any of an arbitrary number ( n ) of branches. An if statement can branch two ways, whether the condition is true or false.

The example you gave is a great example of how how code is written can make the code make sense or not.

public void setQuiz( int quiz, int grade )
{
  switch( quiz )
  {
    case 1: // if quiz == 1
      grade1 = grade; //where was grade1 declared?
      break;  // otherwise execution will continue through the next case block
    case 2: // if quiz == 2
      grade2 = grade;
      break;
  }
}

The variable named in the switch statement is tested against each case statement and whichever case statement's value matches, the rest of the switch statement's code is executed. (That's why the break statements are needed) Usually switch statements are written with a default case at the end as a "catchall".
4 0
4 years ago
Does Kennesaw State University have any computing ethical policy for computer usage? If so - what is it?
Svet_ta [14]

Answer:

The answer to the questions: Does Kennesaw State University have any computing ethical policy for computer usage? If so - what is it? Would be as follows:

1. Yes, Kennesaw State University, a university in Georgia, does have a computing ethical policy that regulates the proper use of the facilities and computing services within the facilities of the university and the use of computing equipment that belongs to the university. This policy is known as the KSU Computer Usage Policy.

2. As said before this policy establishes that the use of computing services are not the right of a person, but rather a privilege afforded to the students, faculty and other people who are present in the university and who may need to use its computing services. The use of the computing services would be whitin this policy as long as it stays inside the delimitations established by federal, state and University policies.

Explanation:

7 0
4 years ago
please help me!!!!!! all of the following may be benefits of a technical or vocational college except
-BARSIC- [3]

Answer:

im not sure

Explanation: is their supposed to be a picture or something?

5 0
4 years ago
Read 2 more answers
Are DHCP messages sent over UDP or TCP? 2. What is the link-layer (e.g., Ethernet) address of your host? 3. What values in the D
maks197457 [2]

Answer:

1.) DHCP is sent over the message at UDP.

2.) The address of link-layer is Source: DellComp_4f:36:23 (00:08:74:4f:36:23)

3.) The message type of value to the discover message is 1, but the message type of value to the request packets is 3. This how you can be differentiate two.

4.) The Transaction ID in first four message is 0x3e5e0ce3

The transaction ID in second sets of messages is 0x257e55a3

The transaction ID is identifies if the message is a part of the set of the messages is related to the one transaction

Explanation:

DHCP is stands for the Dynamic Host Configuration Protocol which is the networks management protocol that is used on the UDP/IP networks where by the DHCP servers dynamically assign the IP address and the other networks configuration parameters to the each devices on the network so they can be communicate with the other IP network.

6 0
4 years ago
How does social media affect communication skills negatively?
AnnZ [28]
How social media affects communication negatively
The following are the ways in which social media affects communication negatively
1)Internet-the internet has made it easier to communicate too much use can result to addiction . Internet addiction make most of youths skip vital activities like homework,social activities among others. 
2)Text messages-The use of instant messaging has become popular especially among teens.Use of symbols such as emojis and abbreviated words has made many people to become too cusual on language use.
The use of fewer syllables and shorter words is likely to make teens leave out important aspects of verbal communication and may lead to misinterpretation of messages.
3)Dialogue-  Internet communication mostly takes place in the written form as opposed to the spoken form. Teens primarily communicate through textual posts,emails e.t.c all of which are in the written form.
Since written communication typically occurs in form of monologue, teens addicted to the internet may find it difficult to engage in dialogue a feature of verbal communication.For instance they may find it difficult to effectively use aspects of verbal communication such as tonal variation turn taking and speed.
<span>4)Informal language- </span>The use  of informal language is a salient feature of internet communication.This has a negative effect on teens mastery of formal language.
Internet language has features of informal language such as short turn taking, exclusion of auxiliary verbs and pronouns.
This could be due to the reason that teens put more emphasis on speed and efficiency at the expense of grammar.
5)Listening skills-
listening skills is an important aspect of verb communication and effective listening enhances communication.
Effective listening entails being information literate which is the ability to identify which information is needed when it is needed,where to find it, and effectively using it.
4 0
4 years ago
Other questions:
  • Whaat was the first sound recording machine
    12·2 answers
  • 5. Create a vector called to20 that goes from 1 to 20 (use the range notation). Now create a variable called end that goes from
    9·1 answer
  • How do you access the dark web? What are the negatives of doing this?
    14·1 answer
  • Unlike the _____ presentations of the other students in class, Calum's presentation demonstrated a thorough and mature grasp of
    9·1 answer
  • The destructor automatically executes when the class object goes out of ____.
    12·1 answer
  • Consumers may receive an​ e-mail, supposedly from their bank or credit card​ company, saying that their​ account's security has
    10·1 answer
  • For this lab you will write a class to create a user-defined type called Shapes to represent different shapes, their perimeters
    6·1 answer
  • For which tasks would Excel be useful? Check all that apply.
    7·1 answer
  • Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a
    7·1 answer
  • If a company saw an online photo of you playing basketball, it might try to sell
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!