Answer:
empathy for others
Explanation:
The Journal, Reading Psychology, written by John McCreary and Merchant Gregory, explores the relationship between reading and empathy. Controlling for gender, GPA, and reading variables were hypothesized as closely related to empathy. Reading literary fiction engages us with social and psychological complexities of life. They require us to become someone else by transporting ourselves into the situations of others and their minds. Reading some Harry Potter books, for instance, should have a similar impact. Parts of his book tested how Harry had to deal with prejudice by showing more empathy towards immigrants and homosexuals than those who knew how to read neutral passages.
Answer:
#include <iostream>
using namespace std;
void swap(int *a,int *b)
{
int temp;
temp=*a;
*a=*b;
*b=temp;
}
bool consecutive(int k1,int k2,int k3)
{
int arr[]={k1,k2,k3}; //storing these variables into an array
int i,j;
for(i=0;i<3;i++)
{
for(j=i;j<3;j++)
{
if(arr[i]>arr[j])
{
swap(arr[i],arr[j]); //swapping to sort these numbers
}
}
}
if((arr[1]==arr[0]+1)&&(arr[2]==arr[0]+2)) //checks if consecutive
return true;
else
return false;
}
int main()
{
int result=consecutive(6,4,5); //storing in a result variable
if(result==0)
cout<<"false";
else
cout<<"true";
return 0;
}
OUTPUT :
true
Explanation:
In the above code, it stores three elements into an array and then sorts the array in which it calls a method swap() which is also defined and interchanges values of 2 variables. Then after sorting these numbers in ascending order , it checks if numbers are consecutive or not, if it is true, it returns true otherwise it return false.
Cyberbullying occurs when individuals use technology to write aggressive, embarrassing, or hateful messages to/about peers in order to intimidate, harass, shame, and control.
Answer: keeps confidential documents secure,
displays a GUI, allocates the computer's resources, and retrieves files
Explanation:
The operating system can be defined as the software installed in the system that provides the information and services to the users by controlling the hardware, software resources, and regulates the computer programs. It runs the applications and programs in the system, displays the graphic user interface for the services, stores, manipulates, and retrieves files. It prevents the unauthorized access to the data and programs by using passwords thus provides the security to the system and documents.