1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmainna [20.7K]
3 years ago
12

PLEASE HELP ME ON THIS..............PLEASEEEEEEEEEEEE PLEASEEEEEE ITTS EASYYYYYYYY

Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
3 0
Meetup is a really weird site. It's objective is to put people in groups according to their interests. It is certainly no place to go if you are job hunting.

Twitter seems to be a place where comments are made. Most would be personal. Donald Trump uses it to set policy. Most likely he is the first president to use that.

Facebook for those who have sent me things, is somewhat the same. I wouldn't trust it to find a job.

MySpace no longer exists. So it is not a place you'd put an ad for a job. I think myspace was used for photos. 

That only leaves the 4th one down. Submit that one.



 
You might be interested in
To keep your audience interested in your speech, you should provide them with as many details as possible about the topic.
soldier1979 [14.2K]
The answer is False.  <span>To keep your audience interested in your speech, you should do the ff techniques : 
</span><span>1. Talk about something your audience is interested in
</span><span>2. Tell them why they should listen
</span><span>3. Don’t make it too easy or too hard
</span><span>4. “Change grabs attention”
</span><span>5. Tell stories
</span><span>6. Have frequent breaks
</span><span>7. Make it short</span>
4 0
3 years ago
You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
mario62 [17]

Answer:

C

Explanation:

It is best to Implement a UTM appliance.

A Unified Threat Management (UTM) system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features.

DescriptionUnified threat management is an approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function.

Cheers

8 0
3 years ago
What are new technologies, products, or services that eventually surpass the existing dominant technology or product in a market
kicyunya [14]

Answer:

Disruptive innovation

Explanation:

Disruptive innovation are considered those new technologies, products or services whose application can greatly impact the manner in which an industry or a market functions. This is because the surpass the existing dominant product or technology. One example of a disruptive innovation is the internet. The internet altered the manner in which business was done by companies, but negatively affected those who refused to adopt it.

4 0
3 years ago
All of the following are benefits of automation except
Tasya [4]

Question 1:

4. it increases the number of employees

Question 2:

2. false

Question 3:

2. it causes great damage to the ozone layer

Question 4:

1. true



6 0
3 years ago
One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
salantis [7]

Answer:

import java.util.Scanner;

public class Miles {

public static void main(String[] args) {

   //initialization

       double Number_Miles;

       //print the message

       System.out.print("Enter the number of miles: ");

       Scanner scn1 = new Scanner(System.in);

       

       Number_Miles = scn1.nextDouble();  //read the input from user

       //calculate the laps

       double yourValue = Number_Miles/0.25;

       //display the output on the screen

       System.out.printf("%.2f", yourValue);

     

}

}  

Explanation:

First import the library Scanner than create the class and define the main function. In the main function, declare the variables.

print the message on the screen and then store the value enter by the user into the variable.

Scanner is a class that is used for reading the output. So, we make the object of the class Scanner and then object call the function nextDouble() which reads the input and store in the variable.

After that, calculate the number of laps by dividing the number of miles with the given one lap running track value (0.25 miles).

Number\,of\,laps = \frac{Number\,of\,miles}{0.25}

the output is stored in the variable.

After that, print the value on the screen with 2 digits after the decimal point.

we can use "%.2f" in the printing function in java.

like System.out.printf("%.2f", output);

5 0
3 years ago
Read 2 more answers
Other questions:
  • What is the other name of the horizontal column graph?
    6·2 answers
  • Every node (except of the last node) in a singly linked list contains ____
    5·1 answer
  • Is a book considered technology?
    8·2 answers
  • Select the correct answer.
    7·1 answer
  • Satellite images are based on data obtained by ____________ (gps/landsat) satellites.
    5·1 answer
  • What are some examples of what can be changed through options available on the mini toolbar
    5·1 answer
  • Number are stored and transmitted inside a computer in the form of​
    6·1 answer
  • Match the context details with the pattern that applies.
    7·1 answer
  • How do you think electronic spreadsheets have transformed businesses today?​
    6·1 answer
  • Topic: Drivers ed 100 points and brainliest!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!