1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
3 years ago
11

A speech why friends are important 2 min​

Computers and Technology
1 answer:
Gnoma [55]3 years ago
4 0

Friends can challenge us, confuse us, and sometimes, we might wonder why we bother. But friendship is as important to our wellbeing as eating right and exercising. What’s more, friendships help us grow through each year of our lives.

The friends we meet in school teach us how to be patient, wait our turn, reach out, and try new hobbies. When we move into young adulthood we learn more about taking responsibility, finding a career path, and seeking out people as mentors.

As we continue into our 40s and beyond, we learn to weather the ups and downs in life, and once again friends provide a sounding board and place for us to grow. Friendship is key to our success with all our relationships and it can create a sense of purpose in our lives.

The people we bring into our lives as friends will show us how to forgive, laugh, and make conversation. The basic components of any relationship, from our marriage to our coworkers, are all founded in friendship. We learn how to interact with people because of our friends, even the ones that are opposite from us or share a different worldview.

We don’t just talk with others but learn from them. We understand the process of meeting new acquaintances and finding out what makes them tick. These people help push us out of our comfort zones while still providing a safe emotional space for us to be totally ourselves.

One of the most overlooked benefits of friendship is that it helps keep our minds and bodies strong. In fact, it’s as important to our physical health as eating well and keeping fit. A recent Harvard study concluded that having solid friendships in our life even helps promote brain health.

You might be interested in
A network administrator was told by the Chief Information Officer (CIO) to set up a new office with a network that has redundanc
balandron [24]

Answer:

"Mesh topology" is the correct answer.

Explanation:

  • A mesh topology seems to be a network configuration where there has been an interconnection between each hardware and communications system. This topology configuration allows the distribution of many of these signals, although one of the connexons starts going down.
  • This topology needs to connect each destination to any other end destination, thus creating a completely pointless channel.
3 0
3 years ago
Michael a programmer, is writing an algorithm to solve programming problems, Guide him to write an algorithm
Nadusha1986 [10]

Answer:

Algorithms need to be simple, factual, and explained in simple but relevant vocabulary, and must be step by step, and none of the step should be missing.

Hence, first you need to understand the requirement, which can be yours or your clients.

Then consider each module of the problem, and separate each of them from the others. Now, understand the relationship between each module. And then you need to understand how you can combine them in one algorithm.

Also remember, the modules are functions. and various functions combine together to form an algorithm. We can have separate algorithms for each module as well, and then you can combine them together in right continuity to form the one single program.

Also, a project can have a loads of programs with other parts like images and various other assets and technologies.

However, everything starts with algorithms. And if are good at explaining, and a sound vocabulary, plus can explain the process well, you can explain the process well, and write a good algorithm definitely. Learn languages like Python, C, and C++  to start with, and then continue with Java, R etc. Remember we still uses functional programming as well like through Haskell etc.

The below is an example of sample algorithm. John wants to check what Ana has brought for him.

Step 1: Ana arrives with meat, which can be of goat or chicken

Step 2: John: Hi Ana

Step3: Yes John

Step 4 What meat is that Ana

Step 5: Goat

Step 7: Thanks Ana for Bringng Goat Meat

Step 8: Stop

In the above algorithm John confirms that what meat Ana has brought for him. And he comes to know She has bought Goat meat. This is the simplest of algorithm with no loop. And the complexity can be increased to any level.

Explanation:

The Answer is self explanatory, and has all that is required.

7 0
3 years ago
Read 2 more answers
What was the name of the first computer (machine) language?
Angelina_Jolie [31]

In 1957, the first of the major languages appeared in the form of FORTRAN. Its name stands for FORmula TRANslating system. The language was designed at IBM for scientific computing. The components were very simple, and provided the programmer with low-level access to the computers innards.


8 0
3 years ago
Read 2 more answers
When is it not necessary to invoke the method myMethod using dot notation? When myMethod is private. When myMethod is invoked by
Paraphin [41]

Answer:

When myMethod is invoked by a method in the same class as myMethod.

Explanation:

When you are in a class, it is like a different enviroment and within that class you can call a method without using the dot notation because you are still within the class.

Outside the class and despite the type of method, public, private or static, the dot notation will be required.

5 0
3 years ago
Read 2 more answers
What are the most recent attacks on computer security that you face this month? Use the Internet to search for the latest attack
grigory [225]

Answer:

Now a days every thing can be done on the internet easily but this internet has various drawbacks with that as the most of our personal information we share on internet these days so if anyone attacks on your server then he/she can easily access all the private information including financial details and this attack is known as cyber attack. there are various ways to attack on the internet some of them are-

1.Malware- it is shortly known as the malicious software, malware can be described as worms, viruses, trojans these all are variety of malware which provide root access to the attacker by which they can control the system remotely.

2.phising- This is a technique by which the criminals craft emails to fool a target into taking some harmful action. The recipient might be tricked in downloading malware that disguised as an important document for instance or argued toclick on that link that takes them to a fake website where they can get the password which are necessary for any transaction.

3.Ransomware- This is like a malware which is stored in the computer and easily encrypt all the necessary files of the victim's computer and after that they demand some ransom to decrypt it.

4.SQL injection- This is the process by which the SQL command gets injected by the attacker into the victim's system so that the attacker can easily gather all the necessary information which they want to take control on the system.

These attacks are very dangerous for the system because the attacker can get all the necessary information about the user and can easily harm him/her by getting their personal information.

There are various steps to prevent these attacks which are-

I.secure your hardware- The user has to prevent their hardware from lost or steal. protect all devices with a complicated password, share that password with the device user only.

II.Encrypt and backup data- You have to prevent your data by making the backup of the necessary files so that if any of your information gets lost then you can retrieve it from your backup.

III. create a security focused workplace- Employees are the most common ways of breaching of the data as many don't recognise the external threats the internal one breaches the security and it cause the loss of the information.

some latest viruses are-

1.cyborg ransomware-This virus is present in the floppy disk which is used by the user and can cause the count of time the system reboot. it's new variant is present in windows 10.

2.Gobrut-This is also one of the latest viruses it is capable enough to detect weak passwords and can cause loss of information.

3.jokeroo-This virus works as the ransomware their author spread it in the computer system which will encrypt the files and for decrypting it they demand ransom for that.

4.Trojan Glupteba- Once this virus enters the system the user cannot know that the system is infected and it will slowly communicates with the IP of the system which results in loss of the confidential information.

Most vulnerable platforms are-

1.Social engineering- The social networking sites has most of your personal information of the user which can be used by the attacker to get the necessary information.

2.cloud computing services- More companies use to store their most of the information on the cloud which is used by the attacker to get the confidential passwords which can cause loss of the essential information.

Explanation:

6 0
3 years ago
Other questions:
  • To set up a slide show you should do all of the following except ______.
    9·1 answer
  • After unit and integration testing are completed, _________ testing ensures that all hardware and software components work toget
    7·1 answer
  • I don’t know technically
    9·2 answers
  • If parties in a contract are not ____, the contract can be canceled.
    12·1 answer
  • Search engines that search other search engines are called
    12·2 answers
  • 1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
    5·1 answer
  • The memory unit of a computer has 2M Words of 32 bits (or 4 bytes) each. The computer has an instruction format with 4 fields: a
    14·1 answer
  • Write a function that accepts an argument for a persons name. The method should loop through the number of characters in the nam
    7·1 answer
  • Explain the difference between social engineering and reverse social engineering.
    6·1 answer
  • Someone say crackhead
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!