1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Slav-nsk [51]
2 years ago
8

NO LINKS Please

Computers and Technology
2 answers:
Kamila [148]2 years ago
6 0

Answer:

ok po majsbejwwlaodhd susbvskwmoskwaubsbsiwnwis sisbsbsb is a good 2AM 2AM 2nd edition 2and I am a nanny 2and and u 2122feet 225feet to see how 2nd grade are you 22feet but not yet a lot more because it has alot of people who is the key to the girl in your life of your own life NATO is the most powerful and I was a great person in a sentence and a very nice meeting you had to do nothing babe and she had an affair in a way maker that I am in a relationship with u are in bed now babe and my mom and my dad a lot of my cousn and my kids in the morning and my kids were in the same boat and 5PM was the first of my two 5th grade boys in school to be with u at work now babe on my messenger then the Lord was in bed and she had no probs and no babe to be in Philippines and my kids had to be a good 58 and a little more because I was so happy bday sis had a lot to say about the girl and she was busy with me I will be having dinner with the kids on me sometime next time because she is very good at home now babe ruth is it ur wife is still single forever ni mama ne is a good girl also a big part in her to be the center babe if I will be a good person and I think they 5th 5 and 5 and u have a lot more to lose than me if u have a lot

AVprozaik [17]2 years ago
4 0

Answer:

<em>Yes because using technology in classrooms has the potential to create increased student motivation, increased social interactions, positive outcomes, enhanced student learning, and enhanced student engagement.</em>

You might be interested in
Write an application that determines which, if any, of the following files are stored in the folder where you have saved the exe
Elza [17]

Answer:

Here is the JAVA application that determines which if any of the following files are stored in folder where you have saved the exercises created.

import java.nio.file.*;   // used to manipulate files and directories

import java.nio.file.attribute.*;  //used to provide access to file and file attributes

import static java.nio.file.AccessMode.*;  // provides access modes to test the accessibility of a file

import java.io.IOException;  //for exception handling

class FindSelectedFiles {

public static void main(String[] args) { //start of main function

   Path f1 = Paths.get("/root/sandbox/autoexec.bat"); //creates Path object f1 using Paths.get() method and this instance contains the file name and directory list used to construct the specified path

   Path f2 = Paths.get("/root/sandbox/CompareFolders.java");  //creates Path object f2 using Paths.get() method and this instance contains the file name and directory list used to construct the specified path

   Path f3 = Paths.get("/root/sandbox/FileStatistics.class");   //creates Path object f3 using Paths.get() method and this instance contains the file name and directory list used to construct the specified path

   Path f4 = Paths.get("/root/sandbox/Hello.doc"); //creates Path object f4 using Paths.get() method and this instance contains the file name and directory list used to construct the specified path

   int count=0; //used to count the number of files found  

try{  // used to define a code chunk to be tested for errors

 f1 = Paths.get("/root/sandbox/autoexec.bat");  // Converts a path string when joined form a path string to a Path

 System.out.println(f1);  //prints the file

     /* getFileSystem method is used to return the file system that created this Path object f1 and checkAccess Verifies access and throws exception if something is wrong

 f1.getFileSystem().provider().checkAccess(f1);  

 System.out.println(f1 +" File Exists\n");  //if file exists then displays this message

 count++;  }  //adds 1 to the count of number of files found

 catch (IOException e) {  //a code chunk to be executed if error occurs in the try part

  System.out.println("File Doesn't Exist\n"); }  //if file not found displays this message

   

try{  //works same as above try block but for 2nd folder and object f2

 f2 = Paths.get("/root/sandbox/CompareFolders.java");

 System.out.println(f2);

 f2.getFileSystem().provider().checkAccess(f2);

 System.out.println(f2 +" File Exists\n");

 count++;  }

 catch (IOException e) {

  System.out.println("File Doesn't Exist\n"); }

   

try{  //works same as above try block but for 3rd folder and object f3

 f3 = Paths.get("/root/sandbox/FileStatistics.class");

 System.out.println(f3);

 f3.getFileSystem().provider().checkAccess(f3);

 System.out.println("File Exists\n");

 count++; }

 catch (IOException e) {

  System.out.println("File Doesn't Exist\n"); }

   

try{  //works same as above try block but for 4th folder and object f4

    f4 = Paths.get("/root/sandbox/Hello.doc");

    System.out.println(f4);

 f4.getFileSystem().provider().checkAccess(f4);

 System.out.println(f4 +" File Exists\n");

 count++; }

 catch (IOException e) {

  System.out.println("File Doesn't Exist\n"); }

   

   System.out.println(count+" of the files exist");  }  } //displays the number of files found

Explanation:

If you want to directly pass the file name as argument to Paths.get() method then you can use the following code:

   Path f1 = Paths.get("autoexec.bat");

   Path f2 = Paths.get("CompareFolders.java");

   Path f3 = Paths.get("FileStatistics.class");

   Path f4 = Paths.get("Hello.doc");

The program determines if any, of the files from autoexec.bat, CompareFolders.java, FileStatistics.class, and Hello.doc. are stored in the folder. If a file is found then the program displays the message File exists and add 1 to the count variable each time a file is found. If all the files are found then the program returns the count as 4 otherwise the program display the number of files found by displaying the computed final value of count in the output. Lets say all the files are found then the output of the above program is:

autoexec.bat                                                                                                                                                   autoexec.bat File Exists  

                                                                                                                                                      CompareFolders.java                                                                                                                                            CompareFolders.java File Exists                                                      

                                                                                                                                                         FileStatistics.class                                                                                                                                           File Exists                                                                                        

                                                                                                                                                     Hello.doc                                                                                                                                                      Hello.doc File Exists  

   

4 of the files exist    

8 0
3 years ago
When data are entered into a form and saved, they are placed in the underlying database as knowledge?
luda_lava [24]
The answer would be and is true.
7 0
3 years ago
Beside homework, what products can you use for personal use? Identify three uses and briefly describe.
Dominik [7]
<span>Beside homework, what products can you use for personal use? Identify three uses and briefly describe.

</span>
3 0
3 years ago
Read 2 more answers
Create a program in Matlab that prints the numbers from 1-100.
Burka [1]

Answer:

numbers = 1:1:100;

for num=numbers

remainder3 = rem(num,3);

remainder5 = rem(num,5);

 

if remainder3==0

disp("Yee")

else

if remainder3 == 0 && remainder5 == 0

disp ("Yee-Haw")

else

if remainder5==0

disp("Haw")

else

disp("Not a multiple of 5 or 4")

end

end

end  

end

Explanation:

  • Initialize the numbers variable from 1 to 100.
  • Loop through the all the numbers and find their remainders.
  • Check if a number is multiple of 5, 3 or both and display the message accordingly.
4 0
3 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
Other questions:
  • Design and write an object-oriented program for managing inventory bins in a warehouse. To do this you will use two classes: Inv
    5·1 answer
  • Web sites use _____ to track users while they are on the site.
    14·1 answer
  • Write a program in python that ask the user to enter a word and then capitalizes every other letter of that word
    15·1 answer
  • You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP addre
    13·1 answer
  • Rapid development programming languages eliminate the possibility of having bugs in code. True or False
    8·1 answer
  • To create a cover letter to send to potential employers along with a resume, what software program should you use ?
    6·2 answers
  • Processors for most mobile devices run at a slower speed than a processor in a desktop PC.
    9·2 answers
  • Define get_date() function.
    6·1 answer
  • Write its features:features of computer ​
    15·1 answer
  • What are the local, state, and national opportunities that may be available to those who participate in CTSOs?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!