Answer:
d.Responsive Display ads
e.Uploaded ads (Image & AMPHTML)
Explanation:
The two main ad formats used in a Standard Display campaign are;
1. Responsive Display ads: they are Google's new default ad format and are automatically created by Google using assets provided by users in a square and landscape format.
2. Uploaded ads (Image & AMPHTML): they are created using a tool like Google Web Designer to create adverts outside of Google Ads.
They can be uploaded as a jpeg, gif, zip file and png extension into Google Ads.
For count digits, you could just convert it to a String and check the length
Sum digits, convert to string then seperate each character with charAt then convert it to numbers in the return statement.
Average digits you can convert it to a String and then convert them back after taking them apart.
Answer:
See explaination
Explanation:
//Array to store prices
INT PRICE[10][10]
//Loop through 2d array
FOR I FROM 0 TO 10
FOR J FROM 0 TO 10
//Populate a random int
PRICE[I][J] = RANDOM_INT(99,1999)
PRINT(PRICE[I][J]+" ")
PRINT()
//Prompt user for desired price
COST = READ_INPUT('Please enter your desired flight price: ')
//Variable to store if a match is found
MATCH = FALSE
//Loop through all ints in price
FOR I FROM 0 TO 10
FOR J FROM 0 TO 10
//Compare price with Cost
IF PRICE[I][J]==COST
MATCH = TRUE
BREAK
//Check if match is true
IF MATCH = TRUE
PRINT('A flight was found for that price, have a safe trip!')
ELSE
PRINT('No flight was found for that price, please try a new price.')
Answer:
An elicitation technique is any of a number of data collection techniques used in anthropology, cognitive science, counseling, education, knowledge engineering, linguistics, management, philosophy, psychology, or other fields to gather knowledge or information from people.
Explanation:
A big question or problem in the tech field that i would like to solve is Data security.
<h3>What is Data security ?</h3>
Data security can be regarded as process of protecting data from unauthorized user as well as protection from data corruption .
I will like to solve this problem because as advances in technology, the data of individual or organization is not been total secured and this is posing so much loss to individuals.
Data security are;
- data encryption
- hashing
- tokenization
Learn more about Data security at;
brainly.com/question/17493537