1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dennis_Churaev [7]
3 years ago
7

Tools enable people to connect and exchange ideas

Computers and Technology
2 answers:
Ilia_Sergeevich [38]3 years ago
6 0

Answer:

Social networking, Crisis mapping use for gather information from sources like emails, text messages and tweets make the information instantly and publicly, Crowdfunding.

Sedaia [141]3 years ago
5 0
True, throughout history this is prominent.
You might be interested in
Write a statement that declares a prototype for a function add, which has two int parameters and returns an int .
Anarel [89]
Int add( int, int );
4 0
3 years ago
Denelle, an accountant, needs to present her client Stephen with a page showing how his yearly retirement savings will be affect
mihalych1998 [28]

Answer:

Ok so the power of sussy is hard to find because you have to be sus which the impostor sus sussy then you sus more of the sus then you get the sus sus sus sus sus sus sus sus sus sus sus amogus.

Explanation:

4 0
3 years ago
Which of the following is NOT true about functions? They go below the main program in the source code file. They do a single tas
Charra [1.4K]

Answer:

First-line i.e, "They go below the main program in the source code file" is the correct answer.

Explanation:

A method is a set of instruction, that can be used in a program whenever we need, it can be divided into two parts user define and built-in. In user define method three-point are very important, that are method definition, declaration, and calling.  

  • These types of methods should be declared and defined above the main method, and it calls inside the method.
  • It also known as a mini-program because it is used to perform a specific task.
  • Both users define and built-in is a collection of the commands.

4 0
3 years ago
What are the chief contributions of philosophy to artificial intelligence?
olga nikolaevna [1]

Answer

Hi,

The chief contribution of philosophy to artificial intelligence is the knowledge of the connections between the two and the understanding of the shared concept.

Explanation

Philosophy and Artificial intelligence has a close scientific connection because they both share concepts such as action, consciousness, epistemology and free will. From the artificial intelligence perspective, theories in philosophy are important in AI as long as they provide the basis of the designs, reasons and plan. The concepts shared in AI con tribute to the realization of the philosophy of artificial intelligence.

Hope this Helps!

5 0
3 years ago
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
Murrr4er [49]

Answer:

" Non-persistent" is the right response.

Explanation:

  • A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
  • Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
6 0
3 years ago
Other questions:
  • If someone were unable to pay cash right now, which financing option would be best for the laptop and for the refrigerator?
    10·2 answers
  • REEEEEEE I STILL NEED MORE AESTHETIC USERNAMES TO GO OFF OF PWEASE HELP IMA HAVE A PANIC ATTACK!!!... next post ima do a vote :&
    13·1 answer
  • Which tab is used to edit objects on the slide master and layouts
    10·1 answer
  • As a chemical engineer, what would you be most likely to do in your job?
    15·1 answer
  • The Spanning Tree Protocol operates at the Network layer of the OSI model.
    13·1 answer
  • What is a sequence of graphic illustrations which represent the planned scenes for a video or animation?
    6·2 answers
  • What is the most likely to be a possible physical attack?
    7·2 answers
  • Memory cards from your cameras (SD cards) and flash drives are examples of __________.
    13·1 answer
  • The process of recording and reporting the financial data for a business is known as:
    6·2 answers
  • You need to design an online login form in which users have to type their name and password to log into an application. The pass
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!