1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
3 years ago
6

write a Program which displays at least 5 different sentences that explain how technology has been used to win souls to Christ.

Computers and Technology
1 answer:
creativ13 [48]3 years ago
5 0

Answer:

<em>#include <iostream></em>

<em>using namespace std;</em>

<em>int main()</em>

<em>{</em>

<em>cout<<"Technology Has been Used to Win Souls to Christ through Some of these means"<<endl;</em>

<em>cout<<" "<<endl;</em>

<em>cout<<"1.\t Through Ministry and Church Websites"<<endl;</em>

<em>cout<<" "<<endl;</em>

<em>cout<<"2.\t Through Internet Media on the Web (Podcasts, simulcasts etc) for gospel streaming"<<endl;</em>

<em>cout<<" "<<endl;</em>

<em>cout<<"3.\t Keeping in touch or follow-up of new converts through social media platforms"<<endl;</em>

<em>cout<<" "<<endl;</em>

<em>cout<<"4.\t Receiving Monetary seed donations online from members accross the world (Paypal, Western Union etc)"<<endl;</em>

<em>cout<<" "<<endl;</em>

<em>cout<<"5.\t Through keeping up to date Membership records and church attendance data Analysis"<<endl;</em>

<em>cout<<" "<<endl;</em>

<em>    return 0;</em>

<em>}</em>

Explanation:

The following program in C++ prints out five sentences using multiple cout statements outlining how technology has been used to win souls to Christ Jesus

You might be interested in
Show the array that results from the following sequence of key insertions using a hashing system under the given conditions: 5,
sergejj [24]

Answer:

a) Linear probing is one of the hashing technique in which we insert values into the hash table indexes based on hash value.

Hash value of key can be calculated as :

H(key) = key % size ;

Here H(key) is the index where the value of key is stored in hash table.

----------

Given,

Keys to be inserted are : 5 , 205, 406,5205, 8205 ,307

and size of the array : 100.

First key to be inserted is : 5

So, H(5) = 5%100 = 5,

So, key 5 is inserted at 5th index of hash table.

-----

Next key to inserted is : 205

So, H(205) = 205%100 = 5 (here collision happens)

Recompute hash value as follows:

H(key) =(key+i) % size here i= 1,2,3...

So, H(205) =( 205+1)%100 = 206%100 = 6

So, key 205 is inserted in the 6th index of the hash table.

----------

Next Key to be inserted : 406

H(406) = 406%100 = 6(collision occurs)

H(406) =(406+1) %100 = 407%100 = 7

So, the value 406 is inserted in 7the index of the hash table.

-----------------

Next key : 5205

H(5205) = 5205%100 = 5(collision)

So, H(5205) = (5205+1)%100 = 6( again collision)

So, H(5205) = 5205+2)%100 = 7(again collision)

So, H(5205) = (5205+3)%100 = 8 ( no collision)

So, value 5205 is inserted at 8th index of the hash table.

-------------

Similarly 8205 is inserted at 9th index of the hash table because , we have collisions from 5th to 8th indexes.

-------------

Next key value is : 307

H(307) = 307%100 = 7(collision)

So, (307+3)%100 = 310%100 = 10(no collision)  

So, 307 is inserted at 10th index of the hash table.

So, hash table will look like this:

Key       index

5         5

205         6

406         7

5205 8

8205 9

307         10

b) Quadratic probing:

Quadratic probing is also similar to linear probing but the difference is in collision resolution. In linear probing in case of collision we use : H(key) = (key+i)%size but here we use H(key) =( key+i^2)%size.

Applying Quadratic probing on above keys:.

First key to be inserted : 5.

5 will go to index 5 of the hash table.

-------

Next key = 205 .

H(205) = 205%100 = 5(collision)

So. H(key)= (205+1^2)%100 = 6(no collision)

So, 205 is inserted into 6th index of the hash table.

--------

Next key to be inserted 406:

So, 406 %100 = 6 (collision)

(406+1^2)%100 = 7(no collision)

So, 406 is moved to 7th index of the hash table.

----------

Next key is : 5205

So, 5205%100 = 5 (collision)

So, (5205+1^2)%100 = 6 ( again collision)

So, (5205+2^2)%100 = 9 ( no collision)

So, 5205 inserted into 9th index of hash table.

-----------

Next key is 8205:

Here collision happens at 5the , 6the , 9th indexes,

So H(8205) = (8205+4^2)%100 = 8221%100 = 21

So, value 8205 is inserted in 21st index of hash table.

--------

Next value is 307.

Here there is collision at 7the index.

So, H(307) = (307+1^2)%100 = 308%100= 8.

So, 307 is inserted at 8the index of the hash table.

Key           Index

5                  5

205                  6

406                  7

5205                9

8205               21

307                   8

3 0
3 years ago
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
yaroslaw [1]

Answer:

Phishing

Explanation:

Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.

The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c

3 0
4 years ago
Read 2 more answers
Which command can be used to connect to a remote windows share called data on the server called fileserver?
DiKsa [7]

c. c.) smbclient //fileserver/data

7 0
3 years ago
The collaborative team responsible for creating a film is in the process of creating advertisements for it and of figuring out h
miskamm [114]

Answer:

1. distribution

Explanation:

Filmmaking can be defined as the art or process of directing and producing a movie for viewing in cinemas or television. The process of making a movie comprises of five (5) distinct phases and these are;

1. Development.

2. Pre-production.

3. Production.

4. Post-production.

5. Distribution.  

In this scenario, the collaborative team responsible for creating a film is in the process of creating advertisements for it and of figuring out how to generate excitement about the film.

<em>Hence, they are likely in the distribution phase of the five phases of filmmaking.</em>

Distribution refers to the last phase of filmmaking and it is the stage where the collaborative team considers a return on investment by creating advertisements in order to have a wider outreach or audience.

6 0
3 years ago
15) When you buy an operating system for your personal computer, you are actually buying a software ________. A) copyright BE) u
Darina [25.2K]

Answer:

D. Licence

Explanation:

A software licence is a binding agreement that gives an individual, company or organisation permission to use a software.

7 0
4 years ago
Read 2 more answers
Other questions:
  • Data mining must usestatistics to analyze data.<br> True<br> False
    12·1 answer
  • I NEED HELP!!!
    9·2 answers
  • As your textbook explains, Wikipedia is usually the only source you need when
    8·1 answer
  • Use a for/else loop to traverse through the key names in the dictionary below in order to find Mr. Potatohead’s mailing address.
    7·1 answer
  • Using complete sentences post a detailed response to the following.
    9·1 answer
  • Select the correct answer from each drop-down menu.
    10·1 answer
  • Most project files will contain:
    9·1 answer
  • Hey does anyone know the name of that movie where like this teenage girl is chilling at her house then there is an outbreak of s
    6·1 answer
  • G. What are handheld computers? Write its types.​
    7·1 answer
  • 30 POINTS FOR THE CORRECT ANSWERS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!