1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
2 years ago
8

PLEASE HELP THIS IS CONFUSING ME

Computers and Technology
2 answers:
Artemon [7]2 years ago
3 0

Answer:

The answer is:

Yes, because Antonio clearly copied someone else's words.

Explanation:

It is still forbidden to plagiarize Wikipedia despite it being a Open-Source Data base of information. This means, unless you directly cite in a bibliography or with in-text citations, the article, the author, and everything else needed in the proper citations for the format, it is plagiarism.

iragen [17]2 years ago
3 0

Answer:

Yes, Antonio is plagirizing since he did not site the author of that specific Wikipedia Page.

Explanation:

Plagirisim can be avoided by citing the source of the paragraph, but you need to be specific by stating the author of the pargraph, and what the title of the webpage or book was. Otherwise, you can be suspect to prosecution and suspention at your school.

You might be interested in
1. The Forever block is present in the<br> ......... block category.
rosijanka [135]

Answer:

loop or a repeating block. I think it’s this because I like robotics and I have to know a lot of different kinds of blocks.

Explanation:

This is why.

8 0
1 year ago
Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input
kompoz [17]

Answer:

Following are the program in the C++ programming Language.

//header files

#include <iostream>

#include <vector>

using namespace std;//name space

// define main method

int main()

{

//set integer variables

int size, num;

//get input the size of the list

cout<<"Enter size of list: ";

cin >> size;

//set integer type vector variable

vector<int> vecs;

//Set the for loop

for (int index = 0; index < size; ++index)

{//get elements of the list from the user

cout<<" :";

cin >> num;

//push back the elements of the list

vecs.push_back(num);

}

//storing the first two elements in variable

int n = vecs[0], n1 = vecs[1], current , temp;

//set if conditional statement

if (n > n1)

{

//perform swapping

temp = n;

n = n1;

n1 = temp;

}

//Set for loop

for (int index = 2; index < size; ++index)

{

//store the value of the vector in the variable

current = vecs[index];

//set if conditional statement

if (current < n)

{

//interchange the elements of the variable

n1 = n;

n = current;

}

else if(current < n1)

{

n1 = current;

}

}

//print the value of first two smallest number.

cout <<"\n" <<n << " " << n1 << endl;

return 0;

}

<u>Output:</u>

Enter size of list: 5

:10

:5

:3

:21

:2

2 3

Explanation:

Here, we define the required header files and namespace then, we define "main()" function inside the main function.

  • Set two integer data type variable "size", "num".
  • Print message and get input from the user in variable  "size".
  • Then, we set integer vector type variable "vecs".
  • Set the for loop to get the number of input in the variable "num" from user.
  • Then, we push back the elements of the list and store first two elements of the list in the variable "n", "n1".
  • Set the conditional statement to perform swapping.
  • Define the for loop to store the list of the vector in the integer type variable "current".
  • Finally, we print the value of the two smallest numbers of the list.
8 0
2 years ago
Explain the security mechanisms available for a database and how the data will be protected.
Stolb23 [73]

Answer: Views, unauthorized access, encryption are some of the security mechanisms.

Explanation:

The database of any application or software contains all the important data, therefore it is utmost necessary to protect the data from falling into dangerous hands. Most databases use authentication measures in form of passwords or bio metrics to avail access. Besides these users can use views to see the data but cannot change anything into the database. Some databases also use encryption systems to encrypt the passwords for better safety. There are some databases which grants user with two types of privileges such as system and  object privileges, whereby with system privileges one can change the system environment variables.

8 0
2 years ago
Our motherboard supports dual channeling and you currently have two slots used in channel a on the board
deff fn [24]
<span>The system will run faster if you install two DIMMs because dual channeling can be used if both Channel B slots are filled. Dual channeling is faster than single channeling.</span>
6 0
2 years ago
​one column of a table in a relational database is called a(n) ____.
ziro4ka [17]
One column of a table in  relational database is called an attribute(property).
3 0
3 years ago
Other questions:
  • What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f
    7·1 answer
  • Exit network systems, information support, and software development are all careers in which career cluster?
    10·1 answer
  • Mr. Green maintains a spreadsheet containing data on all of his employees, including name, job profile, monthly salary, and home
    15·1 answer
  • How many bits must be “flipped” (i.e., changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase ‘a’ that’s represe
    11·1 answer
  • Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
    13·1 answer
  • The __________ is a visual or textual storyboard that will assist in determining the type of web pages on your site.
    14·1 answer
  • Justin Blake and Raegan Beast anyone?? I miss Jaegan a ton and I need a fangirl to talk to.
    13·1 answer
  • IF YOU COULD CREATE A SOCIAL NETWORK:, what would it be like? What would make it so special about the others? (If you want you c
    9·1 answer
  • 100 points, PLEASE HELP...To generate numbers between and including -10 to 10 you would use:
    5·1 answer
  • 84 104 101 32 97 110 115 119 101 114 32 105 115 32 53 48 33 There's a way to make this meaningful; find it!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!