1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klio [65]
4 years ago
12

Which advertising medium has the widest reach on a global front?

Computers and Technology
1 answer:
lesya [120]4 years ago
8 0

Answer: B

The internet would allow businesses to easily expand globally with the help of social media and the ever expanding resources being poured onto the internet, reaching customers anywhere in the world.

You might be interested in
Describe the GRANT statement and explain how it relates to security. What types of privileges may be granted? How are they revok
Misha Larkins [42]

Answer:

GRANT statement basically allows access to the database.

Explanation:

GRANT statement allows the user to get privileges on the database. This allows the users to manipulate data in the database or perform some actions such as SELECT, CREATE, DELETE etc are some privileges granted to the users to select data from a table, to create a relation/table or to delete records from a table etc.

GRANT statement involves the type of privilege that is to be granted such as SELECT, the object to which the access is to be granted such as a table so the table name is mentioned here and third is the name of the user to which the rights or privilege is to be granted.

Privileges can be system or object.

System privileges examples are: DROP, CREATE ,ALTER, etc in which DROP allows to delete a database object, create allows to create a database object and ALTER is used to modify database objects.

Object privileges allows to perform actions on a table and manipulate data in a table. For example INSERT, EXECUTE, SELECT, UPDATE etc.

GRANT statement is beneficial for security purposes as it grants certain access and privileges to specific users according to their requirements and does not give access to every object to all users which helps in securing the data and database objects as giving access to all users can sometimes be a security risk. So GRANT statement by selective access to specific users for specific operations can be beneficial in securing the data in the database e.g from being corrupted in anyway. It defines roles for different users for performing different actions to make sure that users only access the database in ways they are granted or permitted to. GRANT allows each user only the privileges necessary to perform a task.

The access rights given by the GRANT statement can be revoked by using REVOKE command. This statement is used to remove the privileges from the users or database objects. This statement involves the privilege to be revoked e.g SELECT, the object on which the privilege is to be revoked such as table name and the user name from whom the granted privilege is to be revoked.

7 0
4 years ago
When a defendant pleads guilty to one offense just to have another offense dropped, this is what type of plea bargain
dybincka [34]
<h2>Answer:</h2>

The answer is sentenced plea bargain

<h2>Explanation:</h2>

sentence bargaining occurs when a defendant agrees to plead guilty to the stated charge in return for a lighter sentence. Typically this must be reviewed by a judge, and many jurisdictions simply don't allow it. In sentence bargaining, they plead guilty agreeing in advance what sentence will be given; however, this sentence can still be denied by the judge.

3 0
3 years ago
Read 2 more answers
Using a text editor, create a file that contains a list of at least 15 six-digit account numbers. Read in each account number an
Zanzabum

Answer:

See explaination

Explanation:

/File: ValidateCheckDigits.java

import java.io.BufferedWriter;

import java.io.File;

import java.io.FileWriter;

import java.io.IOException;

import java.util.Scanner;

public class ValidateCheckDigits {

public static void main(String[] args) {

String fileName = "numbers.txt"; //input file name

String validFileName = "valid_numbers.txt"; // file name of the output file

//Open the input file for reading and output file for writing

try(Scanner fileScanner = new Scanner( new File(fileName));

BufferedWriter fileWriter = new BufferedWriter( new FileWriter(validFileName))) {

//Until we have lines to be read in the input file

while(fileScanner.hasNextLine()) {

//Read each line

String line = fileScanner.nextLine().trim();

//calculate the sum of first 5 digits

int sum = 0;

for(int i = 0; i < 5; i++) {

sum += Integer.parseInt( line.charAt(i) + "");

}

//Get the last digit

int lastDigit = Integer.parseInt(line.charAt(5)+"");

//Check if the remainder of the sum when divided by 10 is equal to last digit

if(sum%10 == lastDigit) {

//write the number in each line

fileWriter.write(line);

fileWriter.newLine();

System.out.println("Writing valid number to file: " + line);

}

}

System.out.println("Verifying valid numbers completed.");

} catch(IOException ex ) {

System.err.println("Error: Unable to read or write to the file. Check if the input file exists in the same directory.");

}

}

}

Check attachment for output and screenshot

4 0
4 years ago
What can be done to improve the security of business uses of the Internet? Give several examples of ecurity measures and technol
igor_vitrenko [27]

Answer Explanation

There are many things to improve the security of business with the help of internet

  • the pillars of business depends upon the information and internet provide security to these information.
  • the computer or laptop which is used for business purpose are secure by internet
  • we use hardware and software firewalls to protect the PC or laptop.
  • we use antivirus to protect the system
  • for runing the computer we uses software firewalls
  • for protection purpose we use hardware firewalls

7 0
4 years ago
Why is an array like a list? How do you identify and find elements in an array? Explain the purpose of a try-catch block and giv
viktelen [127]

Answer:

Java supports creation and manipulation of arrays, as a data structure. The index of an array is an integer value that has value in interval [0, n-1], where n is the size of the array. If a request for a negative or an index greater than or equal to size of array is made, then the JAVA throws a ArrayIndexOutOfBounds Exception. This is unlike C/C++ where no index of bound check is done.

The ArrayIndexOutOfBoundsException is a Runtime Exception thrown only at runtime. The Java Compiler does not check for this error during the compilation of a program.

Explanation:

8 0
4 years ago
Other questions:
  • In the 1950s, the three major networks (ABC, NBC, and CBS) developed prime-time shows that would appeal to a general family audi
    11·1 answer
  • What allows people to create their own radio shows over the internet?
    14·1 answer
  • Diane wants to maintain a record of percent change in sales from the year 2000 to the present year. She enters the values of per
    10·1 answer
  • Write a function called median, that takes as parameter a full, sorted array of doubles and returns the median of the list. For
    15·1 answer
  • Suppose that a computer can read or write a memory word in 5 nsec. Also suppose that when an interrupt occurs, all 32 CPU regist
    10·2 answers
  • Why is know app downloading in my android phone even if I have 900 MB ???
    8·2 answers
  • How do I use brainly.<br> What is brainliest.<br> And what is the rating thing about
    6·2 answers
  • Input an int greater than 0 and print every multiple of 5 between it and 0 inclusive in descending order. If the number is not g
    13·1 answer
  • If you click on repeat header rows what will happen?
    9·1 answer
  • Print numbers 0, 1, 2, ..., userNum as shown, with each number indented by that number of spaces. For each printed line, print t
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!