What when can you expect technology to be effective?

Answers

Answer 1

Answer:

we dont have to expect , the technology are effective , as each day the technology are being advance and developed day by day. each day the technology are being more and more effective. they are effective now and they will be effective in future too

Answer 2

One can expect technology to be effective when its selection and implementation of that technology is said to meet the need that it was created for.

What is the effectiveness of any technology?

Technology is often used to change  the learning experience of people. Students now have means to greater amount of new opportunities through the use of it.

Conclusively, technology helps students to be a little more creative and to be  connected to others and technology is effective when its selection and implementation of that technology is said to meet the need that it was made for.

Learn more about technology from

https://brainly.com/question/25110079


Related Questions

When a digital camera produces an image by exposing an electronic sensor to light, the process involves a lens and a ____
that opens for a certain period of time.

Answers

Answer:

Shutter

Explanation:

Lisa is developing a Web application using a framework and wants to include interactive elements using JavaScript. She decides to use a JavaScript library too but she is on a tight budget and cannot pay for a license. Which of the following would be the best option for Lisa to access a library?

a. Borrow the JavaScript code from another site
b. Use Kendo UI
c. Use the jQuery UI library
d. Use JavaScript code from the Foundation library

Answers

Answer:

The best option for Lisa to access a library is to:

c. Use the jQuery UI library.

Explanation:

The jQuery UI is an interactive user interface with the interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.  It is used for building highly interactive web applications.  It comes free and is an open-source software distributed by the jQuery Foundation under the MIT License. The library, jQuery UI, was first published in September 2007.

This lesson discussed some changes seen in very young children using computers. Which of these was mentioned in the lesson as
being associated with increased screen time?
O improved development of mental abilities
O poorer development of mental abilities
O more hours of sleep at night
O less hours of sleep at night

Answers

Answer:

B poorer development of mental abilities

Explanation:

Very young children were found to have poorer development of mental abilities with increased screen time.

Poorer development of mental abilities. The correct option is B.

What are mental abilities?

The ability to learn or remember information, the capacity to comprehend the context and implications of your actions, and the possession of the attributes (capacity, ability, power) necessary to complete a task are just a few examples of the many varied definitions of mental ability.

A child's physical health has been discovered to be negatively impacted by excessive use of electronics or computers. According to one study, children who watched more television and played more video games were more likely to develop obesity, sleep disorders, and stomach problems. The study of languages may be hampered by excessive TV viewing.

Therefore, excessive use of computers has adverse effects on the mental health of children.

To know more about mental abilities follow

https://brainly.com/question/3951300

#SPJ2

What changes have occurred over the last 25 years impacting how we use information systems and that increasingly require using encryption to meet our security requirements

Answers

Answer:

Follows are the solution to this question:

Explanation:

Throughout the presence of third-party companies that is attackers, cryptography is indeed a method of protecting information and communication.

Its cryptographic techniques are numerous, which are used for data security and encryption levels were defines, throughout all protocols.

Encryption - was its method for encoding a message and information. So, it can be viewed only by authorized parties.

They can search online for various data encryption. The changes over the last 25 years also actually occurred:

Cryptography is all around. Each time you make a phone call, buy something like that in a store or even on the Internet with a credit or debit card or receive money from an Atm is an authentication that helps secure and secures the payment.

Tausend years ago, codes or encryption were used to protect information. These encryption schemes have evolved from the past 25 years or say we are getting far better than that of the preceding one But cryptography was far more advanced with both the advent of computers than it used to be.

World War II would also see Enigma code, the perfect example of analog encryption.

Its computer design technology had also finally been enough to break its Enigma cipher, as well as Enigma texts, still are regarded as just a necessary component of the probable Affiliated successes.

Mathematical 128-bit cryptography has become a standard for several sensible computers and portable structures, far greater than every prehistoric or ancient plasterboard.

Without it.

AES - Another of our safest cryptography techniques is the Intensive Encryption System. The state-government uses it to protect classified information, that is used by all of our phones.

. Write a short Python function that takes a sequence of integer values and determines if there is a distinct pair of numbers in the sequence whose product is odd. (1 Point)

Answers

Answer:

Explanation:

The following code is written in Python and like requested takes a function called odd_number that takes a list of integers as a parameter. It then loops through the list two times, each time calculating the product of the two numbers and returning Yes if the product is an odd number while also including the two numbers from the list that make that product. If there is no odd product in the list the function simply returns No

def odd_product(my_list):

   for num1 in range(len(my_list)):

       for num2 in range(len(my_list)):

           if num1 == num2:

               pass

           else:

               product = my_list.__getitem__(num1) * my_list.__getitem__(num2)

               if (product % 2) != 0:

                   return "Yes, " + str(my_list.__getitem__(num1)) + " and " + str(my_list.__getitem__(num2))

   return "No"

what chemical process adds elements such as boron and phosphorus to make the silicon cell suitable for electrical conduction.

Answers

Answer:

i think its copper

Explanation:

Analytical Engine was designed in​

Answers

Answer:

I think

19 century ( 1938) by Charles Babbage.

Answer:

Charles Babbage

Explanation:

Just did test

Which are benefits of using an IDE while writing a program? Select all the apply.

The IDE keeps track of and links files.

The IDE simplifies and coordinates the creation process.

The IDE allows the programmer to see errors.

Answers

Answer:

The IDE keeps track of and links files.

The IDE simplifies and coordinates the creation process.

The IDE allows the programmer to see errors.

Explanation:

The IDE stands for Integrated Development Environments. In the case when the program the following are the benefits of using an IDE

1. It tracks and link the files

2. It coordinates and simplify the proces of creation

3. Also it permits the programmer to view the errors

hence, the above represent the benefits

So all are considered to be the benefits

Answer:

Explanation:

ITs all 3. edge 2021

Both Wireshark and NetWitness Investigator can be used for packet captures and analysis. Which tool is preferred for each task, and why

Answers

Answer:

packet capture best suited for Wireshark packet analysis best suited for Netwiness

Explanation:

Although both software packages can carry out each task, however, expert network administrators have noted that in terms of effectiveness, the Wireshark software application is best suited for packet capture since unlike Netwitness has no limitation on the size of files it can capture.

Whereas, because Netwitness has a capacity of up to seven-layer protocol analysis, it can perform a more detailed analysis of packets.

Susan works for an agency that manages artificial satellites in space. She suggested that they should use the satellites to generate thematic maps of different areas in her state. What does Susan actually want to create by using the satellites for thematic maps?

Susan wants to create ______ by using the satellites for thematic maps.

Answers

The answer should be satellites because she says she wants to create by using satellites for thematic maps.

Answer:

satellite imagery

Explanation:

(a) Draw a flow chart to a program that will have a servo arm move based on an input from a distance sensor. The sensor values will range from 20cm to 30cm and the servo angle should be proportional to the sensor values. (b) Write this algorithm using pseudo code. (c) Write the algorithm as if you are writing in Arduino IDE

Answers

Answer:

c

Explanation:

got it right

Please program this in Python.


Create a list of your favorite 4 movies. Print out the 0th element in the list. Now set the 0th element to be “Star Wars” and try printing it out again.

Answers

lst = ["Star Wars", "Movie 2", "Movie 3", "Movie 4"]

print(lst[0])

I wrote my code in python 3.8. Best of luck

Another technique that makes use of the colon slicing technique to directly refer to element places is list slicing. Use a blank value before the first colon to access the first element, then use len() with -1 as the input to access the last element.

What is the 0th element in the list?

The element of the current ArrayList object at the provided index is returned by the get() function of the ArrayList class, which accepts an integer indicating the index value.

As a result, if you supply 0 or list to this method, you can obtain the first element of the current ArrayList.

Use a for loop with range (0, N) to get the first N members of a list. Then, make a new empty list and append the elements of the source list to the new list within the for loop. Range(0, N) iterates in steps of 1 from 0 to N-1. N is not comprised.

Therefore,lst = ["Star Wars", "Movie 2", "Movie 3", "Movie 4"] print(lst[0]).

Learn more about element here:

https://brainly.com/question/19312961

#SPJ2

How much tabs can you open with 8GB of ram? ​

Answers

Answer:

Infinite.

Explanation:

Every Tab on chrome generates separate process in Task Manager. So depends on your RAM how many tabs you want to open.At one limit all of your RAM occupied. That's the limit for you.

How is computer science used in entertainment? (Please don’t use GoogIe)

Answers

Answer:

If you are talking in general then you could say computer science is what makes up most indie games. Games like Spelunky and Undertale are games that were programmed to make the characters have movement and abilities. You can also make websites that could have interactive parts or areas that show some kind of media using html with a bit of other programming languages.

Computer science is used in entertainment as the knowledge of the use of computer is used in making animations and movies that people can just relax and watch.

How is computer used in entertainment?

Computers is known to be an electronic machine that helps use to have a lot of access to a lot of  devices such as keyboards, etc. that can be used for entertainment.

Conclusively, Computer games are known to be used mostly for entertainment because its users can manipulate it to their taste. The use of computer is therefore important in entertainment.

Learn more about computer from

https://brainly.com/question/24540334

The purpose of special effects in business publications is to increase the effectiveness of the communication. True False

Answers

It’s true. :)) have a great day

Which molecules are most closely linked to heart disease in humans

Answers

Answer:

I think it's fats

Explanation:

See the answer
Write a Console program, let users to enter prices calculate subtotal, tax, and total.

- Delcare variable data type as decimal (6 variables needed)
decimal apple;
- Conver string to decimal from input
apple = Convert.ToDecimal(Console.ReadLine());
- Do addition for subtotal
- Multiplication for tax (0.065M) --- M or m stands for money value, read page 94.
- Addition for total
- You need to show only two digits after decimal point

Answers

Answer:

um what

Explanation:

In this unit, you developed your skills at coding in Python. In this lab, you will put those skills to work by creating a program.
Your program should do the following:

Ask the user for their first name
Say “Hello” followed by the user’s first name
Ask the user how old they are
Tell the user how old they will be in 10 years and in 20 years
Tell the user how old they were 5 years ago

so this is the question and I have it finished but I need someone to correct it because I think some of it is wrong. please I really need help.

Answers

Answer:

Don't forget to close any parentheses you open. Other then that everything looks fine, I just polished it a little bit

Explanation:

name = input("What is your first name? ")

print("Hello", name)

age = int(input("How old are you? "))

print("In 10 years you will be", (age+10))

print("In 20 years you will be", (age+20))

print("5 years ago you were", (age-5))

Answer:

it looks great to me

Explanation:

For this exercise, we are going to take a look at an alternate Calculator class, but this one is broken. There are several scope issues in the calculator class that are preventing it from running. Your task is to fix the Calculator class so that it runs and prints out the correct results. The CalculatorTester is completed and should function correctly once you fix the Calculator class.
public class Calculator {
private int total;
private int value;
public Calculator(int startingValue){
int total = startingValue;
value = 0;
}
public int add(int value){
int total = total + value;
return total;
}
/**
* Adds the instance variable value to the total
*/
public int add(){
int total += value;
return total;
}
public int multiple(int value){
int total *= value;
return total;
}
public void setValue(int value){
value = value;
}
public int getValue(){
return value;
}
}

Answers

Answer:

public class Calculator {

   private int total;

   private int value;

   

   public Calculator(int startingValue){

       // no need to create a new total variable here, we need to set to the our instance total variable

       total = startingValue;

       value = 0;

   }

   public int add(int value){

       //same here, no need to create a new total variable. We need to add the value to the instance total variable

       total = total + value;

       return total;

   }

   /**

   * Adds the instance variable value to the total

   */

   public int add(){

       // no need to create a new total variable. We need to add the value to the instance total variable

       total += value;

       return total;

   }

   public int multiple(int value){

       // no need to create a new total variable. We need to multiply the instance total variable by value.

       total *= value;

       return total;

   }

   //We need to specify which value refers to which variable. Otherwise, there will be confusion. Since you declare the parameter as value, you need to put this keyword before the instance variable so that it will be distinguishable by the compiler.

   public void setValue(int value){

       this.value = value;

   }

   public int getValue(){

       return value;

   }

}

Explanation:

I fixed the errors. You may see them as comments in the code

Given sphereRadius and piVal, compute the volume of a sphere and assign sphereVolume with the result. Use (4.0 / 3.0) to perform floating-point division, instead of (4 / 3) which performs integer division.

Volume of sphere = (4.0 / 3.0) Ï r3 (Hint: r3 can be computed using *)
import java.util.Scanner;
public class SphereVolumeCalculator {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
double piVal = 3.14159;
double sphereVolume;
double sphereRadius;
sphereRadius = scnr.nextDouble();
*insert code*
System.out.println(sphereVolume);
}
}

Answers

Answer:

The code to this question can be defined as follows:

sphereVolume = (4.0/3.0)*piVal*sphereRadius*sphereRadius*sphereRadius; // defining a double variable sphereVolume that calculate and hold its value

Explanation:

Please find the complete code in the attachment file.

In the code, a class "SphereVolumeCalculator" is declared, and inside the main method Three double variable "piVal,  sphereRadius, and sphereVolume" , in which "piVal" is used to hold a value, in the next step scanner class object is created for holding the "shereRadius" value and the sphereVolume is used for calculate and print its value.  

Which of the following types of media distribution is considered "traditional"?

Answers

Answer:

Marketers have used traditional media such as print, radio, TV, yellow pages and even outdoor ads to reach consumer markets for the last 50 to 100 years. Traditional media can also play a role in the marketing mix for many B2B companies. These media often reach a broad audience and thus can be relatively expensive.

Explanation:

Answer:

Your answer would be ''television''

Explanation:

Traditional media refers to forms of mass media that focus on delivering news to the general public or a targeted group of the public. Traditional forms of media include print publications (newspapers and magazines), broadcast news (television and radio) and, in recent years, the digital version of those media outlets, such as digital newspapers and blogs.

A time-dependent action is placed in the workflow queue when the record is created. When will the action be removed from the queue? Choose 2 answers.

Answers

Complete Question:

A time-dependent action is placed in the workflow queue when the record is created. When will the action be removed from the queue? Choose 2 answers.

Group of answer choices.

A. When another record triggers the same workflow rule

B. When the action is deleted from the workflow queue.

C. When a validation rule is triggered for the record

D. When the record no longer matches the rule criteria.

Answer:

B. When the action is deleted from the workflow queue.

D. When the record no longer matches the rule criteria.

Explanation:

Workflow management systems can be defined as a strategic software application or program designed to avail companies the infrastructure to setup, define, create and manage the performance or execution of series of sequential tasks, as well as respond to workflow participants.

Some examples of workflow management systems used around the world are YAWL, Windows Workflow Foundation, Apache ODE, Collective Knowledge, Workflow Gen, PRPC, Salesforce.com, jBPM, Bonita BPM etc.

Time-dependent actions are actions that are executed at a specific period of time before the close-date of a database record.

Generally, a time-dependent action is placed in the workflow queue when the record is created. Therefore, the action will be removed from the queue under the these two (2) conditions;

I. When the action is deleted from the workflow queue.

II. When the record no longer matches he rule criteria.

Johnathan was assigned to complete a project with three other people. What benefit will he get from working with the team?

Independence
Increased creativity
Easy class credit
Easy decision making

Answers

Answer:

2.

Explanation:

working with other people can increase ones creativity

Groups of cells that run horizontally across the page and are labeled with numbers are called

Answers

Answer:

The answer is rows if i'm not mistaken.

Explanation:

ANSWER ASAP PLEASE Question #4
Fill in the Blank
Fill in the blank to complete the sentence.
_____ is used to store and process data over the Internet using computers that are not located at tthe users site.

Answers

Answer:

A cookie.

Explanation:

Click the crown at the top of this answer if this helped ;)

What other viruses, Trojans, worms, or malicious software were identified and quarantined by AVG within the Virus Vault

Answers

Answer:

Exploit, trojan horse dropper

Explanation:

When using AVG AntiVirus Business Edition to scan a computer system, it is expected that the AntiVirus application will recognize the viruses, worms, Trojans, malware, and/or other malicious software that is present in an infected PC device.

These other viruses, Trojans, worms, or malicious software that were identified and quarantined by AVG within the Virus Vault are: Exploit, trojan horse dropper

✨Why is among us so addictive I try to play one game but end up playing over 20✨

Answers

Answer:

it is i got in troble for playing it so much lol

Explanation:

sorry for the spelling

Answer:

porque es adictivo XD

Explanation:

A Label control's ________ property allows a label to change size to fit the text in its text property.

Answers

Answer: autosize

Explanation:

Label controls are typically used by users to either display images or in the display of text. We should note that the autosize property of the label control is used for the modification of the size.

Based on the explanation given above, therefore, the correct answer to the above question will be autosize.

The Python language uses a compiler which is a program that both translates and executes the instructions in a high-level language. True False

Answers

Answer:

False.

Explanation:

A compiler is a computer program that has the function of translating a computer program developed in a certain programming language, so that it is readable through the use of another programming language. Thus, for example, a program designed in Python is translated so that it is readable in Java, etc.

The main objective of compilers is to connect the different programming languages, making the programs executable on different devices without the need to have the same programming language for it.

What is the purpose of the website directory provided by the website host?

to look up user account information

to provide help and training for new customers

to store all of a website’s content files

to archive website usage logs

Answers

Answer:

C. to store all of a website’s content files.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

For example, cloud computing includes;

- Go-ogle Slides saves your work to Go-ogle Drive.

- PowerPoint has the option to save to One-Drive.

All of these solutions are in the cloud not on your computer.

A website directory can be defined as a list of a website (web pages) containing link addresses and are located on the world wide web.

The purpose of the website directory provided by the website host is to store all of a website’s content files.

Answer:

c

Explanation:

c

Other Questions
Which phrase describes how metamorphic rocks form?form from meltingform at Earths surfaceform from sedimentsform from existing rocksPls answer it Hydrochloric acid (HCl) and sodium hydroxide (NaOH) react to form water and sodium chloride (NaCl). If you have 2.87 g of HCl, 3.75 g of water, and 1.98 g of NaCl, how many grams of NaOH were reacted? Your answer should go to the hundredths place. Solve for x. x-1 is in exponential form2^x-1 = 31 Chronic traumatic encephalopathy (CTE) is caused by a single blow to the head. Creating a Movie PosterPurpose: Create a movie poster that effectively advertises the film adaptation of The Strange Case of Dr. Jekyll and Mr. Hyde.Summary: In this assignment, you will create a movie poster for the film adaptation of The Strange Case of Dr. Jekyll and Mr. Hyde. The movie poster should create an appropriate mood. It should incorporate elements of design that reflect the genre, plot, and theme. Think about important characters and scenes when illustrating your poster. Your poster should include text elements such as taglines or quotations.Assignment Prompt: Create a movie poster that effectively advertises the film adaptation of The Strange Case of Dr. Jekyll and Mr. Hyde.Assignment InstructionsStep 1: Identify elements to include in your poster.a) Recall the purposes of an advertisement, and think about examples of movie posters.b) Consider the elements of a movie poster, such as images of important scenes, notable characters, and taglines.c) Decide on what aspects of the genre, plot, and theme to include on the poster.Step 2: Create an appropriate mood.a) Identify the genre of the story and its most important features.b) Determine how plot events, characters, or themes can reflect the genre.c) Choose elements of design that reflect key aspects of the story and its genre.Step 3: Use text effectively.a) Brainstorm key words to include in a tagline.b) Determine an effective tone for a tagline.c) Write a concise tagline that uses key words and reflects the tone.d) Think about how to incorporate quotations from the text on the poster.Step 4: Create your movie poster.a) Use images that reflect the story and grab the viewers attention.b) Include other elements of design that set an appropriate mood, such as color and font. c) Include a tagline and/or a quotation from the text.d) Remember to save your work as you go.Step 5: Evaluate your movie poster using the checklist.If you can answer yes to each question, you are ready to submit your movie poster. Does your movie poster contain elements that reflect genre, plot, and theme? Does your movie poster accurately portray characters or scenes? Does your movie poster create a mood that is appropriate for the story? Does your movie poster incorporate concise taglines or relevant quotations? Does your movie poster have a persuasive appeal?Step 6: Revise and submit your movie poster file.a) If your work does not meet all of the requirements on the checklist, revise it.b) Once you have completed your movie poster, you will save your file. (Ask your teacher for help.)c) Return to the Virtual Classroom and use the Browse for file option to locate and submit your assignment. Congratulations on completing your assignment!d) Ask your teacher for further instructions about printing and presenting your work to an audience Which of the following results in the expression 0.43 x 52? (1 point)52% of 0.4243 of 52%0.52 of 43%43% of 52 The purpose of hazard lights is to _____. What is the volume of the rectangular prism? PLZ HELP What is the problem with this program?name = "Jenny"name = input("What is your name?")A. the variable name has to begin with a capital letterB. input should be outputC. the first line should be omitted because the second line defines the variableD. the variable needs to begin with a number to distinguish it from other variables Whats better Takis or Cheetos?! please helpppppppppppp 4. How long does it take a horse to run 300m if itsspeed is 15m/s A triangle has sides with lengths of 6centimeters, 11 centimeters, and 13centimeters. Is it a right triangle? Howdo you know?Plss help A boy starts from point A and walks 3 meters toward the south, then turns around and walks 7 meters toward the north. What is the boys placement from point A? Foster makes sandwiches at a deli. There are 8 1/2 (eight and one half) pounds of turkey at the deli. How many 1/4 (one fourth)pound turkey sandwiches can he make? If:BC= 4x + 2,AB = 8x + 8, andAC = 22,Find BC. Crunches are principally a(n) __________ exercise.a. abdominalb. armc. backd. chest Please PLEASE HELPPP!!!!!! MULTIPLE CHOICE QUESTIONThe area of a rectangular picture frame is 93.5 square inches. The area formula for a rectangle is A = lw. Write and solve an equation to find the width, w, of the picture frame. read the sentence:Sally could see her lip quivering and the tears filling her eyes.Select the meaning of the word quivering as it is used in this sentence.Group of answer choicesCurling with interestFrowning with sadnessShaking with fearSmiling with happiness