1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astra-53 [7]
3 years ago
13

TRUE OR FALSE! HELP!!

Computers and Technology
1 answer:
skad [1K]3 years ago
6 0

Answer:

True

Explanation:

There's no one law that governs internet privacy.

You might be interested in
_______ requirements are courses that build knowledge and skills in a specific
snow_tiger [21]
B. Specialization :))
7 0
3 years ago
Which of the follow represents a form of disruptive technology? Tend to open new markets and destroy old ones A new way of doing
RSB [31]

Answer: All of the above are included

Explanation: Disruptive technology is the created for the manipulation of the business operations and related components significantly.It works by changing the habits of the business system by its more superior standards and ways.

The opening of new market to eliminate the older market, invoking in the marketplace for cheap range of goods and making a new strategy that does not fulfill the demand of the customer are disruptive strategy as they change the regular way of business operation through their techniques.

4 0
3 years ago
Question 2 In this question you are asked to calculate probabilties for the discrete uniform and exponential distribution. Make
sasho [114]

Answer:

Hi there! The question is asking to make changes to the H3_Q2.java program however there is no such program attached. Nevertheless, the requirements in the question can be addressed in a new H3_Q2.java program that i've listed below.

Explanation:

We can use the Scanner util in Java for prompting user input. The method nextInt() and nextDouble() allow only values of types "int" and "double" respectively. I have used the "switch" statement to direct the program based on user selection of menu item. The checks are printed with the "System.out.println" command and the program exits in case of error or invalid input. Finally, the calculation of probability simply requires you to replace the comment with the formula for the probability calculation based on the method chosen.

H3_Q2.java

import java.util.Scanner;

public class H3_Q2 {

 public static void main(String args[]) {

   // print main menu for user selection

   System.out.println("Please type 1 to select 'discrete uniform' or 2 to select 'exponential'");

   Scanner scan = new Scanner(System.in);

   int selection = scan.nextInt();

   switch(selection) {

     case 1:

       // discrete uniform

       System.out.println("Please enter a lower bound value a: ");

       int a = scan.nextInt();

       System.out.println("Please enter a upper bound value b: ");

       int b = scan.nextInt();

       System.out.println("Please enter a value x: ");

       int x = scan.nextInt();

       if (b <= a) {

         System.out.println("The upper bound value b should be greater than the lower bound value a");

         System.exit(0);

       }

       if (a > x) {

         System.out.println("The value x should be greater than the lower bound value b");

         System.exit(0);

       }

       if (b < x) {

         System.out.println("The value x should be greater than the lower bound value b");

         System.exit(0);

       }

       break;

     case 2:

       // exponential

       System.out.println("Please enter a lambda value for exponential: ");

       double lambda = scan.nextDouble();

       System.out.println("Please enter a value x: ");

       double d_x = scan.nextDouble();

       if (d_x <= 0.0) {

         System.out.println("The value x should be greater than 0");

         break;

       } else {

         // calculate P(X = x) and P(X ≤ x)

         // result = calculateExponential()

         System.out.println("The calculation for the exponential method given the lambda value " + lambda + " and the value of x " + d_x + " is: ");

       }

       break;

     default:

       System.out.println("Invalid input. Exiting..");

       break;

   }

 }

}

7 0
3 years ago
Which of the following statements is true about cyberbullying?
dlinn [17]
Your answer would be D everyone has a different situation of cyberbullying
5 0
3 years ago
What were Roman Capitals first used for?
gizmo_the_mogwai [7]

Answer:

Square capitals were used to write inscriptions, and less often to supplement everyday handwriting. When written in documents this style is known as Latin book hand. For everyday writing the Romans used a current cursive hand known as Latin cursive. Notable examples of square capitals used for inscriptions are found on the Roman Pantheon, Trajan's Column, and the Arch of Titus, all in Rome. Square capitals are characterized by sharp, straight lines, supple curves, thick and thin strokes, angled stressing and incised serifs. These Roman capitals are also called majuscules, as a counterpart to minuscule letters such as Merovingian and Carolingian.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Is a network traffic management device used to connect different network segments together?
    9·1 answer
  • What does it mena when they say "all germs are germs"
    6·1 answer
  • Is using abbreviations and symbols in social media a problem? Why or why not?
    11·1 answer
  • Explain how being a metal, metalloid, or non-metal affects conductivity
    10·1 answer
  • All linear programming problems have all of the following properties EXCEPT
    9·2 answers
  • One of your professors has asked you to write a program to grade her midterm exams, which consist of only 20 multiple-choice que
    15·1 answer
  • let's imagine you're searching for hotels in searching chicago, what should you search for in order to get the most relevant res
    11·1 answer
  • The difference between Return key and word Wrap
    14·1 answer
  • How would a barcode reader be used in a healthcare industry?​
    6·1 answer
  • O How basic blocks are identified and how the blocks are used to construct control flow graphs
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!