1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnoma [55]
2 years ago
5

What is the primary way that social networks work? Multiple Choice providing a security system for communication online connecti

ng people by matching profile information helping grow website traffic by viral advertisements charging users each time they use the service
Computers and Technology
1 answer:
sasho [114]2 years ago
4 0

Answer:

Providing a security system for communication online.

Explanation:

Social Networks are built to provide a platform for people to connect online.

You might be interested in
Lourdes is going to create a company logo. She will create it in a vector format so that she can resize it without distortion. W
kirill [66]

Explanation:

military

hope this helps you

5 0
3 years ago
You will complete 3 tasks. Task 1: Determine if the input number is prime or not You will ask the user for an integer You will d
GuDViN [60]

Answer:

Program is written in C++

#include<iostream>

using namespace std;

int main()

{

//1. Prime Number

int num;

cout<<"Input Number: ";

cin>>num;

int chk = 0;

for(int i =2; i <num;i++)

{

 if(num%i==0)

 {

  chk = 1;

  break;

 }

}

if(chk == 0)

{

 cout<<num<<" is prime"<<endl;

}

else

{

 cout<<num<<" is not prime"<<endl;

}

//2. Greatest Common Factor

int num1, num2, x, y, temp, gcf;  

cout<<"Enter two numbers: ";

cin>>num1;

cin>>num2;

x = num1;

y = num2;

while (y != 0) {

   temp = y;

   y = x % y;

   x = temp;

 }

 gcf = x;

 cout<<"Greatest Common Factor: "<<gcf<<endl;

 

// 3. LCM  

cout<<"Enter two numbers: ";

cin>>num1;

cin>>num2;

x = num1;

y = num2;

while (y != 0) {

   temp = y;

   y = x % y;

   x = temp;

 }

 gcf = x;

 int lcm =(num1 * num2)/gcf;

cout<<"Least Common Multiple: "<<lcm<<endl;

return 0;

}

Explanation:

<em>I've added the full source code as an attachment where I make use of comments to explain some lines</em>

Download cpp
6 0
3 years ago
Professor Gekko has always dreamed of inline skating across North Dakota. He plans to cross the state on highway U.S. 2, which r
geniusboy [140]

The efficient algorithm by which he can determine which water stops he should make; <em>has been determined below and the strategy which is the greedy strategy has been proven to yield an optimal solution.</em>

<em />

To solve this question optimally, we will make use of the greedy solution.

In this method, we will maximize the distance that can be covered from a particular point in such a way that there must be a place where water can be gotten before a run out is experienced.

Now, the first point at which there will be a stop should be located at a point that is farthest from the starting position and is also made to be ≤ m miles from the starting position.

Now, this this situation is one that shows optimal substructure and since our  first stopping point will be made to be at p, it means that we are solving the sub-question with the assumption that our starting point is at p.

When we combine the two stated plans above, we will arrive at an optimal solution for the normal reasons via cut and paste.

B) Now we need to show that the greedy approach earlier used produce a first stopping point which is contained in the optimal solution.

Let O represent any optimal solution whereby the professor stops at positions o₁, o₂, o₃....oₙ.

Let h₁ represent the farthest stopping point that is reachable from the starting point. Then we can replace o₁ by h₂ to generate a modified solution H since o₁ - o₂ < o₂ - h₁.

Finally, we can really make it to the positions in H without having to run out of water and since H has the same number of stops, we can conclude that h₁   is contained in one of optimal solution.

Therefore our strategy which is the greedy strategy has been proven to work.

Read more about algorithms at; brainly.com/question/24793921

8 0
3 years ago
A. True
Anuta_ua [19.1K]
100% TRUE AND VERY IMPORTANT
In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.

From my experience, limit the number of those with full access (1-2 people, 3 at most).
Also, perform daily backups. If this data is critical, you can set timers for it to be backed up during intervals in the day.
Relationship databases or databases that can be shared should only be shared for viewing.
5 0
4 years ago
Do you think you should learn to program? Why or why not?
avanturin [10]

Answer:

yes

Explanation:

6 0
4 years ago
Read 2 more answers
Other questions:
  • What does the hexadecimal number EF represent in the decimal system?
    12·1 answer
  • Do you think cyber-bulling is more damaging, as damaging, or less damaging than in-person bullying? Why?
    11·2 answers
  • Write a program that will compare two names. The program prompts the user to enter two names for a comparison. If the names are
    8·1 answer
  • You have been hired by an educational software company to create a program that automatically calculates the sum of each place-v
    15·1 answer
  • Print person1's kids, call the incNumKids() method, and print again, outputting text as below. End each line with a newline.
    9·1 answer
  • What effect does the interconnectedness of modern media have on society?
    14·2 answers
  • 9. Differentiate between bolding and highlighting<br>text.<br>(2 marks)​
    15·2 answers
  • Why are Quick Parts useful in an Outlook message?
    10·2 answers
  • Characteristics of the printer​
    6·1 answer
  • Which of the following application delivery methods requires Internet access?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!