1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serggg [28]
3 years ago
14

Dominic list his camera for sale on an online auction site Chloe is the highest bitter and purchase as the camera how does the a

uction site earn its revenue through the transaction
Computers and Technology
1 answer:
ludmilkaskok [199]3 years ago
4 0

Answer: Dominic would pay a small fee to the auction site.

You might be interested in
Write the half function. A function call and the functionprototype
EastWind [94]

Answer:

C code for half()

#include<stdio.h>

void half(float *pv);

int main()

{

float value=5.0;  //value is initialized  

printf ("Value before half: %4.1f\n", value); // Prints 5.0

half(&value);  // the function call takes the address of the variable.

printf("Value after half: %4.1f\n", value); // Prints 2.5

}

void half(float *pv) //In function definition pointer pv will hold the address of variable passed.

{

*pv=*pv/2;  //pointer value is accessed through * operator.

}

  • This method is called call-by-reference method.
  • Here when we call a function, we pass the address of the variable instead of passing the value of the variable.
  • The address of “value” is passed from the “half” function within main(), then in called “half” function we store the address in float pointer ‘pv.’ Now inside the half(),  we can manipulate the value pointed by pointer ‘pv’. That will reflect in the main().
  • Inside half() we write *pv=*pv/2, which means the value of variable pointed by ‘pv’ will be the half of its value, so after returning from half function value of variable “value” inside main will be 2.5.

Output:

Output is given as image.

3 0
3 years ago
____ of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation
umka21 [38]

Answer:

b. Acceptance

Explanation:

<em>"Acceptance </em><em>of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation.  </em><em>"</em>

<em>Acceptance Control </em>is important as a strategy when an organization has accomplished a determined level of risk, or it has estimated potential damages that might happen due to attacks, or the organization has developed a thorough analysis related to cost benefits, or it has also evaluated the probabilities of attacks.

7 0
2 years ago
Which of the following statements is TRUE of business intelligence (BI) systems? Business intelligence systems are primarily use
Scrat [10]

Answer:

D) Business intelligence systems analyze an organization's past performance to make predictions is the correct answer.

Explanation:

  • Business intelligence systems represent systems that help the business in the decision making and strategic making method.
  • BI provides is applications that help in the analysis, collection, and integration of business information.
  • Business intelligence systems help the organization to analyze the business trends and to find the problems that occur in the business that is required to be examined.

5 0
3 years ago
A regular language can not be infinite.<br> True<br> False
Elan Coil [88]

Answer:

False

Explanation:

A regular language can be represented by a regular expression. A regular language can be infinite. Let us consider a simple example of an infinite regular language:

a* is a regular language represented by a regular expression.

The languages matches all strings containing or more a's.

Clearly this is an infinite language.

Note that all finite languages are regular but all regular languages need not be finite.

3 0
3 years ago
Question 6 [10 marks] a) How does a company's use of information systems affect its corporate strategies? (7 marks) b) Provide a
Alja [10]

Answer:

following are the responses to the given question.

Explanation:

The capability to successfully utilize IT is mutually dependent on its ability to execute strategic strategy and set business goals. The ability to compete more and more relies on the capacity of an organization of using technology. In the future, what a company wants to do will rely on what its technologies can do. It may be an example of a company investing in information technology that allows a company to manufacture new products or improve the efficiency of the distribution system to the corporation's economic efficiency.

5 0
3 years ago
Other questions:
  • The identification of critical information is a key part of the OPSEC process because: a) It is required by the JTF commander to
    13·1 answer
  • Imagine your friend wants to apply
    5·1 answer
  • What is one property of a good hash code?
    11·1 answer
  • 15
    5·2 answers
  • Each piece of evidence that is collected should be placed in a separate container true or false
    11·1 answer
  • You have a notebook computer and wish to connect to an IEEE 802.11ac wireless network. The computer does not have a built-in WLA
    15·1 answer
  • A nursing informatics specialist is preparing an in-service program for staff on healthcare informatics and information technolo
    13·1 answer
  • A programmer has an idea to use just one language for the content, structure, and style of web pages. What might be a problem wi
    11·1 answer
  • You are testing the user experience.
    12·2 answers
  • Input two numbers and print their sum products difference division and remainder​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!