1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
2 years ago
6

g Which of the following factors primarily determines how the Internet is used in different countries? A. local attitude to info

rmation privacy B. local connection speeds C. extent of intercultural communication systems D. availability of personal computer parlors
Computers and Technology
1 answer:
Nady [450]2 years ago
8 0

Answer: A. local attitude to information privacy.

Explanation:

The factor that primarily determines how the Internet is used in different countries is the local attitude to information privacy.

Information privacy simply means the relationship which exist between his data is collected and shared as week as the legal and political issues surrounding them.

It is used in different countries through a sim card in the trip, a mobile hotspot, or Wi-Fi for internet access.

You might be interested in
Why is Apple using social media ?
jeka57 [31]

Apple uses social media to promote their products and increase user-engagement. This is a very effective method of advertising.

6 0
3 years ago
Who is better at fortnite mc creamy or mau?
Mama L [17]

Answer:

neither

Explanation:

fortnite sucks

8 0
3 years ago
Read 2 more answers
Which are types of lines? Choose three answers.
alekssr [168]
Straight
Curvilinear
Rectilinear
7 0
3 years ago
Write a C function which takes three parameters which are the cost for an item in a grocery store, the quantity to buy, and the
xeze [42]

Answer:

struct item

{

  float previousCost;

  float taxAmount;

  float updatedCost;

} itemObject;

void calculation(int cost,int quantity,float tax)

  {

      struct item *itemPointer=&itemObject;

      itemPointer->previousCost=(cost) * (quantity);

      itemPointer->taxAmount=itemPointer->previousCost * (tax/100);

      itemPointer->updatedCost=itemPointer->previousCost+itemPointer->taxAmount;

  }

Explanation:

  • Define a structure called item that has 3 properties namely previousCost, taxAmount and updatedCost.
  • The calculation function takes in 3 parameters and inside the calculation function, make a pointer object of the item structure.
  • Calculate the previous cost by multiplying cost with quantity.
  • Calculate the tax amount by multiplying previous cost with (tax / 100).
  • Calculate the previous cost by adding previous cost with tax amount.
4 0
3 years ago
Read 2 more answers
How to create a checkerboard on Python turtle?
mafiozo [28]

Answer:

here is my crude attempt:

import turtle

t = turtle.Turtle()

t.speed(0)

colors = ["black", "yellow"]

SQUARES = 8

SQUARESIZE = 20

def rectangle(color, s):

 t.begin_fill()

 t.pendown()

 t.color(color)

 for i in range(4):

   t.forward(s)

   t.right(90)

 t.end_fill()

 t.penup()

for row in range(SQUARES):

 for col in range(SQUARES):

   t.setpos(row*SQUARESIZE, col*SQUARESIZE)

   rectangle(colors[(row+col)%2], SQUARESIZE)

6 0
3 years ago
Other questions:
  • How would you say an hard drive works
    9·2 answers
  • The goal expressed in this definition states that data visualization is about ______ . 1. Interpreting 2. Perceiving 3. Facilita
    6·1 answer
  • Which is true about POP3 and IMAP for incoming email?
    13·1 answer
  • Who can search the internet and select element base on important words
    13·1 answer
  • What are the home row keys?
    15·1 answer
  • A representation of something by using a description, summary or image.
    7·1 answer
  • Part of metacognition involves making a plan to address <br> .
    9·2 answers
  • Learning Task 3: Write the safety requirement indicated in each number on a
    15·1 answer
  • The names of the governing body or organizationds that creates rules for information technology and information communication te
    9·1 answer
  • The _____ _____ form of database attack injects code into user login information with one or more statements that perform action
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!