1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
3 years ago
7

14. Which now-established technology went through the “emerging” phase in the early 2000s and makes the sharing of ideas much ea

sier? (1 point)
virtual reality

email marketing

video conferencing

social media



15. One of the elements that make the internet such a significant development is its ability to do which of the following? (1 point)

connect people all around the world

stream movies

offer ecommerce

share photos
Computers and Technology
1 answer:
ELEN [110]3 years ago
3 0
<span>14. Which now-established technology went through the “emerging” phase in the early 2000s and makes the sharing of ideas much easier?
The correct answer is: </span><span>social media

</span><span>15. One of the elements that make the internet such a significant development is its ability to do which of the following? 
The correct answer is: </span><span>connect people all around the world</span>
You might be interested in
The numbering system we commonly use is called the decimal numbering system because it uses ________ symbols to represent all po
mojhsa [17]

Answer:

10.

Explanation:

Decimal numbering system is a number system which has ten digits. These ten digits are 0,1,2,3,4,5,6,7,8 and 9. It has signed and unsigned digits. The signed digits represents negative values of digit with the minus "-" sign written before the digit. The unsigned digits have no sign before them.

Binary numbering system has only 1 and 0 digits, while the hexadecimal number system has 16 digits.

6 0
3 years ago
Careers in information technology deal with
podryga [215]

Answer:

A

Explanation:

A would be the best possible answer

3 0
3 years ago
Read 2 more answers
1. What are the two things the base of a number system tells you? After describing these two things, illustrate each with exampl
Alexxx [7]
Using our normal decimal numbering system, the base of a number system, for example 8, tells us two things

1. Each digit is an integer that uses numbers from 0 to 7. There are 8 possible values for a digit
2. We multiply each digit by a power of 8 depending on the position of the digit.

If we use number 112 to (base 8), then; 

<span>(1 x 8 to the power of 2) + (1 x 10 to the power of 1) + (2 x 8 to the power of 0).   </span>


3 0
4 years ago
Write a program that asks for the names of three runners and the time, in minutes (no seconds, etc.), it took each of them to fi
Crank

Answer:

Complete python code with explanation and output results is given below

Explanation:

User is asked to input names of runners and their finishing time

We have to determine first, second and third according to their finishing time.

if else conditioning is used to determine who has lowest finishing time.

Outer if is used to decide first position and inner if is used to decide second and third position.

str() function is used to concatenate the integer variable with string

Code:

runner1 = input("Please enter name of the runner1 ")

time1 = int(input("Please enter the time of runner1 "))

runner2 = input("Please enter name of the runner2 ")

time2 =int(input("Please Enter name of the runner2 "))

runner3 = input("Please enter name of the runner3 ")

time3 =int(input("Please Enter name of the runner3 "))

if(time1 < time2 and time1 < time3):  

   if(time2 < time3): // to decide 2nd and 3rd position

       print(runner1+" has finished First with time: "+str(time1))

       print(runner2+" has finished Second with time: "+str(time2))

       print(runner3+" has finished Third with time: "+str(time3))

   else:

       print(runner1+" has finished First with time: "+str(time1))

       print(runner3+" has finished Second with time: "+str(time3))

       print(runner2+" has finished Third with time: "+str(time2))

if(time2 < time1 and time2 < time3):  

   if(time1 < time3):

       print(runner2+" has finished First with time: "+str(time2))

       print(runner1+" has finished Second with time: "+str(time1))

       print(runner3+" has finished Third with time: "+str(time3))

   else:

       print(runner2+" has finished First with time: "+str(time2))

       print(runner3+" has finished Second with time: "+str(time3))

       print(runner1+" has finished Third with time: "+str(time1))

if(time3 < time1 and time3 < time2):

   if(time2 < time1):    

       print(runner3+" has finished First with time: "+str(time3))

       print(runner2+" has finished Second with time: "+str(time2))

       print(runner1+" has finished Third with time: "+str(time1))

   else:

       print(runner3+" has finished First with time: "+str(time3))

       print(runner1+" has finished Second with time: "+str(time1))

       print(runner2+" has finished Third with time: "+str(time2))

Output:

Program has been tested with multiple inputs and results are accurate as per problem specifications.

Please enter name of the runner1 danny

Please enter the time of runner1  45

Please enter name of the runner2  sam

Please enter the time of runner2  34

Please Enter name of the runner3  tedd

Please enter the time of runner3  23

tedd has finished First with time: 23

sam has finished Second with time: 34

danny has finished Third with time: 45

5 0
4 years ago
Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
bagirrra123 [75]

Answer:

Check the explanation

Explanation:

1) The single router approach is a security Implementation of all security policies and the defense-in depth approach employs a firewall. the DMZ approach Is establish between two routers with a firewall.

2) The single router approach is for small offices and homes.

The defense in depth approach is for large organizations.

The DMZ approach is for publicity operated networks.

3) The DMZ can provide better defense because it has more than two firewall for increased security.

5 0
4 years ago
Other questions:
  • After brainstorming engineers may refine their ideas by making
    8·1 answer
  • What FAA-approved document gives the leveling means to be used when weighing an aircraft?
    5·1 answer
  • What is the program that searches through data bases?
    10·1 answer
  • PLEASE HELP ME ASAP!!! THIS IS DUE SOON!!
    9·1 answer
  • Implement the Dining Philosophers problem (described on pages 167-170 in the textbook (chapter 2.5.1)). Create a Graphical User
    13·1 answer
  • Which scenario is best for an online discussion group?
    5·1 answer
  • Assume a computer uses pipelining of 9 stages. Each stage demands 3 clock cycles to finish its task. How many clock cycles are n
    9·1 answer
  • What is Identity Theft?
    8·1 answer
  • Buddys machine shop has a kiosk computer located in the lobby for customers to use. The kiosk computer has recently been updated
    13·1 answer
  • What’s the difference between var and val?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!