1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
3 years ago
8

The Internet and World Wide Web allow almost any business to be global. What are two important results of this process?

Computers and Technology
1 answer:
lubasha [3.4K]3 years ago
6 0

Answer:

The two Important results of any business to be global is given below.

Explanation:

1.The Internet and World Wide Web allowing the easier and quicker way to getting started any business due to this we can sell the product online and make the business global.

2.The Internet and World Wide Web giving the quicker way to change the business if any changes are reflected in the business environment.

You might be interested in
To reduce the number of used digital outputs of the microcontroller, the display board is connected to the main board through th
Luda [366]

Answer:

The program in Python is as follows:

BCD = ["0001","0010","0011","0100","0101","0110","0111"]

num = input("Decimal: ")

BCDValue = ""

valid = True

for i in range(len(num)):

   if num[i].isdigit():

       if(int(num[i])>= 0 and int(num[i])<8):

           BCDValue += BCD[i]+" "

       else:

           valid = False

           break;

   else:

       valid = False

       break;

if(valid):

   print(BCDValue)

else:

   print("Invalid")

Explanation:

This initializes the BCD corresponding value of the decimal number to a list

BCD = ["0001","0010","0011","0100","0101","0110","0111"]

This gets input for a decimal number

num = input("Decimal: ")

This initializes the required output (i.e. BCD value)  to an empty string

BCDValue = ""

This initializes valid input to True (Boolean)

valid = True

This iterates through the input string

for i in range(len(num)):

This checks if each character of the string is a number

   if num[i].isdigit():

If yes, it checks if the number ranges from 0 to 7 (inclusive)

       if(int(num[i])>= 0 and int(num[i])<8):

If yes, the corresponding BCD value is calculated

           BCDValue += BCD[i]+" "

       else:

If otherwise, then the input string is invalid and the loop is exited

<em>            valid = False</em>

<em>            break;</em>

If otherwise, then the input string is invalid and the loop is exited

<em>    else:</em>

<em>        valid = False</em>

<em>        break;</em>

If valid is True, then the BCD value is printed

<em>if(valid):</em>

<em>    print(BCDValue)</em>

If otherwise, it prints Invalid

<em>else:</em>

<em>    print("Invalid")</em>

7 0
3 years ago
Explain how chord works. To increasing the fault tolerance in chord, each node maintains a successor list (finger table) instead
andrew11 [14]

Answer:

Chord is a set of rules for a peer-to-peer distributed hash table it collects key-value sets by allotting keys to several computers (known as "nodes"); a node will collect the values for all the keys for which that is reliable. Chord defines how keys are allocated to the nodes, and how a node can determine the value for a distributed key by first locating the node liable for such key.

Explanation:

A chord is a peer-to-peer lookup service. It Resolves the difficulty of establishing a data item in a combination of shared nodes, considering various node arrivals and removals The most crucial operation in most peer-to-peer method is the efficient position of data objects.

It is able of supporting only one operation i.e. given a key, it maps the key on a link.

Algorithm:

Algorithm shows working of the chord:

// x is a node used to find successor of id

x.find_successor(id)

if (id (x; successor])

return successor;

else

// query is being delivered around the circle

entrance successor.find_successor(id);

6 0
3 years ago
The display in D1 should read Colin McCain what text function should be used
Kaylis [27]

Answer:

The answer is "SUBSTITUTE(D1,"c","C",1)"

Explanation:

In the given question, some information is missing, that is an option so, the correct option can be described as follows:  

  • Many of us use the Bulletin feature, which is available in MS-Excel.  In these function the SUBSTITUTE is a method, that is used in Builtin to aim the functions to locate a string or character and to replace with the selected module.  
  • In the case of the end-user, it would like to replace "c" with a capital letter "C." And displays cell shifts in D1. This method uses 4 parameters, in which first describes cell reference, second string to located, third replacing string, and fourth its length.
8 0
3 years ago
A network administrator is implementing a token system in which a hardware device is used to store a password. The password is u
nlexa [21]

Answer:

D) Privilege escalation

Explanation:

Privilege escalation is a situation whereby an attacker exploits a privilege escalation vulnerability in a target system which then allows to override the user account.

A token system is usually vulnerable to privilege escalation attacks. The hacker usually acts as a middle man between the original user and the system. The hacker solicits for the token output from the legitimate user which he then supplies to the system for authentication to gain entrance.

5 0
3 years ago
Read 2 more answers
What is the use of jacquard loom
alexdok [17]
The loom was made in 1801 and was made with a series of punched cards. They weaves a pattern of threads. The invention came to be known as Jacquards loom. It is controlled by a a system of stiff punch cards and hooks. Each row of holes punches in the cards corresponds to one row of thread in the design.
7 0
3 years ago
Other questions:
  • In a PERT network, non-critical activities that have little slack need to be monitored closely
    14·1 answer
  • Why are networked systems beneficial?
    9·2 answers
  • What are the prime factorizations of 52 and 77? a. b.
    5·1 answer
  • What is the difference, if any, between an alpha test group and a beta test group? An alpha test group is made up of people asso
    9·1 answer
  • Which of the following attack is a threat to confidentiality?
    10·1 answer
  • Which of the following is a high-speed network dedicated to storage that connects different kinds of storage devices, such as ta
    12·1 answer
  • In which of the following work situations would word processing software be most appropriate to make the task easier?
    6·1 answer
  • Bob has started a company and registered its name with the government as a private corporation. He tries to create a domain name
    12·1 answer
  • Decrypt this secret message if your able to a lot will come..
    14·2 answers
  • The section of the cpu that is responsible for performing mathematical operations.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!