1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svp [43]
3 years ago
13

Media has scientifically been linked to media messages, as in the cause and effect theory. True or False?

Computers and Technology
1 answer:
padilas [110]3 years ago
4 0

Answer:

true

this ans is not 100% correct but it may help you

You might be interested in
Determine the number of character comparisons made by the brute-force algorithm in searching for the pattern GANDHI in the text
leonid [27]

Answer:

Total number of character comparison = 43

Explanation:

Using the Brute force algorithm

The string of n characters is known as text, and the string of m characters is known as the pattern.

From the given information:

The text (n)=THERE_IS_MORE_TO_LIFE_THAN_INCREASING_ITS_SPEED

The pattern (m) = GANDHI

The total no of characters that we have in the text = 47

The total number of characters in pattern = 6

For a brute force algorithm;

Since; the first character of the pattern does not exist in the text, then the number of trials made can be attempted can be expressed as = n – m + 1

= 47 – 6 + 1

= 47 – 5

= 42

Thus; the algorithm will attempt the trial 42 times.

Now, for loop in the algorithm to run 42 times, the G in the pattern will have to align against the for T in the text, and in the last case, it will be aligned against the last space.

On each attempted trial, the algorithm will make one unsuccessful comparison.

However, at the trial at which the G in the pattern Is aligned with the G in the text, there will be two successful comparisons.

Hence, we can calculate the total number of character comparison as follows:

Total number of character comparison = \mathbf{\bigg ( ( 42 -  (no. \ of \  failed \ comparison) ) \times 1 + (1 \times ( Two \ successful \  comparisons) ) \bigg ) }

Total number of character comparison = ( (( 42 – 1) × 1 ) + ( 1 × 2) )

Total number of character comparison = 41 + 2

Total number of character comparison = 43

3 0
3 years ago
What is the best game of 2020 in pc​
dybincka [34]

Answer:we have games like alien wars call of duty astro avengers

Explanation:8

8 0
3 years ago
Read 2 more answers
1. How many column can you insert in a MS Word in maximum?
tigry1 [53]

Answer:

63 columns

Explanation:

In Microsoft Word you can insert a table with up to 63 columns, that is the limit to the number of columns allowed in a Word document.

<em>brainliest</em><em>? </em><em>plz! </em>

3 0
3 years ago
Double[][] vals = {{1.1, 1.3, 1.5},
Elis [28]

Answer:

Option 3 i.e., 7.3 is the correct answer to the following question.

Explanation:

In the following two dimensional array that is the double data type 2-D array variable "val" and it contains some float type information in the form of matrix that has 4 rows and 3 columns, In the following statement, they asked the value of 4th row and 2nd column and in the matrix 4th row and 2nd column contain the value i.e., 7.3.

3 0
3 years ago
List three functions that you can perform with a database that you cannot perform with a spreadsheet.
Delicious77 [7]
There are some function which can be performed with database but not with a spread sheet, these functions include: 
1. Enforcement of data type.
2. Support for self documentation.
3. Defining the relationship among constraints in order to ensure consistency of data.
5 0
3 years ago
Other questions:
  • Both the USB flash drive and the DVD are data storage devices, but they both have numerous differences. Both can contain insane
    6·1 answer
  • When selecting font size in a document, ____ points equals one-inch-tall text?
    10·1 answer
  • Which design element involves the act of lining up objects vertically or horizontally to give a sense of order?
    15·1 answer
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • What best describes presentation software?
    14·1 answer
  • In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
    13·1 answer
  • What is an "immediate preemptive scheduler"?
    15·1 answer
  • PLEASE HELP ASAP (answer is needed in Java) 70 POINTS
    15·1 answer
  • Create an java application that will process 3-digit numbers as follows:
    8·1 answer
  • Think about a career you would like to have 10 years from now.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!