1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alekssandra [29.7K]
3 years ago
14

Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di

d you do? What was the outcome?
Computers and Technology
1 answer:
aalyn [17]3 years ago
5 0

Answer:

I introduced my sister to a thrift app called “Jongo”

Explanation:

Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What did you do? What was the outcome?

While growing up, my sister runs a monthly thrift in our small community, where she collects daily contribution from our neighbors. She does this manually by going around and collecting cash from them. In addition to the risk of cash handling, it was quite stressful and tasking.  

Considering all these, I had to introduce her to a mobile app called “Jongo”, it made the job look easy. All my sister had to do was  

1. Download the app for herself and the contributors  

2. Add them to a group which she created on the app

3. The contributors linked their debit cards to the app and granted access for their account to be debited daily

Due to the cumulative funds, interests was also been accrued daily, hence making it much more easy to do other things in addition to her thrift.  

You might be interested in
What is the name of the virus that appears to be a legitimate program?
timurjin [86]
A virus or malware appearing/pretending to be a legitimate program is called a Trojan. 
3 0
3 years ago
Which securities protect data through processes, procedures,decisions,and user pernissions. Determines where and how data can be
vovangra [49]

Answer:

Data can be stored on storage devices.

Explanation:

Network security, Application security and information security are the securities that protect data. Data can be stored on storage devices such as hard disk drives, solid state drives, external hard drives, USB flash drives and SD cards etc. Hard disk drives, floppy disks and tapes store data magnetically. The data can be stored with a device that spins the disk with magnetic coatings and heads has the ability to read and write information in the form of magnetic patterns.

5 0
3 years ago
Assume that source elements of length k are mapped in some uniform fashion into a target elements of length p. If each digit can
lukranit [14]

Answer And explanation

a)

r^k has 1/r^k probability guess the correct source

b)

Each element in r^p  is mapped by r^k / r^p . There are r^k^-^p  So there are  r^k^-^p -1 elements.

number of target elements = r^k^-^p

number of source elements = r^k^-^p -1

probability = r^k^-^p -1 /r^k

c) Probability of the correct target element

1/r^p

6 0
2 years ago
You should see the following code in your programming
Karo-lina-s [1.5K]

Answer:

import simplegui

import random

def draw_handler(canvas):

for x in range(1000):

colorList = ["Yellow", "Red", "Purple", "White", "Green", "Blue", "Pink", "Orange"]

c = random.choice(colorList)

x = random.randint(1,600)

y = random.randint(1,600)

canvas.draw_point([x, y], c)

frame = simplegui.create_frame('Testing', 600, 600)

frame.set_canvas_background("Black")

frame.set_draw_handler(draw_handler)

frame.start()

Explanation:

I used a for loop, setting my range to 1000 which is how you create exactly 1000 points. Next, I defined my color array, my x randint value, and my y randint value. I set both the x and y randint values to 1 - 600 since the frame is 600x600. The rest is pretty self explanatory.

4 0
2 years ago
To restore a document to the default theme for the template on which the document is based, click the themes button, and then cl
PtichkaEL [24]
Depends on the program you are using

4 0
2 years ago
Other questions:
  • Graphic designers sometimes must adjust the spacing between letters so that the result looks right to them. This is called
    12·1 answer
  • The sequence of folders to a file or folder is called a(n) ________
    8·1 answer
  • Load the titanic sample dataset from the Seaborn library into Python using a Pandas dataframe, and visualize the dataset. Create
    10·1 answer
  • What are two type of physicals connection
    14·1 answer
  • Match the item to the type.
    11·1 answer
  • If your TV was showing a flat black or blue screen, or had "snow", what steps would you take to fix it?
    13·1 answer
  • Which of the following technique is well suited to support very large address space, e.g. 64-bit address space? Select one: a. C
    11·1 answer
  • 5. A Disk defragmenter tool does what to a computer HDD?
    6·1 answer
  • Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type
    7·1 answer
  • Which language should you use to add functionality to web pages.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!