Which example best describes an impact of computers on the economy?
A. Bullying on social media has increased dramatically and across
multiple platforms.
B. Some local businesses have closed because they couldn't
compete with large online sellers.
C. Apps give points for purchases that buyers can use to obtain
discounts.
D. A platform designed to make all user content publicly available
creates privacy issues.

Answers

Answer 1
The answer is D
Ik this cause I took the test
Answer 2

Answer:

B

Explanation:

The reason I say "D" is not the answer because I put the answer in and it was wrong.


Related Questions

Which event represents an example of social media being used in an
emergency situation?
A. The spread of information regarding climate change
O B. The spread of video footage showing a man's murder by a police
officer in 2020
C. The political protests held in several Arab countries in the early
2010s
D. Communication with friends and family after other systems were
disabled by a major earthquake

Answers

Hello!

The answer is:
-D. Communication with friends and family after other systems were disabled by a major earthquake.

I hope this helps you! :)

________ is a location service that allows applications to know when a user has crossed a specific location and then triggers an automated action.

Answers

The location service that allows applications to know when a user has crossed a specific location to trigger an automated action is; Geofencing

What is geofencing?

Geofencing is a location-based service whereby an app or software uses GPS, RFID, Wi-Fi or even cellular data to trigger an already programmed action when a mobile device enters or exits a virtual boundary that is set up around a geographical location called a geofence.

Thus, the answer to the question would be geofencing as it tallies with the definition given above,

Read more about programs at; https://brainly.com/question/16397886

Someone help me!!

select the correct answer

what are the functions of system software?

system software enables a computer's hardware to perform tasks, and functions as a platform for database. quapplication. q

presentation software. it also acts an interface between the computer's hardware and o processor devices

o software

Answers

The first (1st) one. I

Explanation:

It's the definition

If a new car was priced at $23,000 and the m1 in the economy fell, which of the following would occur?

A. More new cars would be produced for the demand.
B. The price of a new car in the economy would fall.
C. The car market woulld collapse.
D. The price would not be impacted by less M1.​

Answers

Answer:

B. The price of a new car in the economy would fall.

Explanation:

3. Which symbol shows one character in criteria for query:
(a) <
(b) >
(c)?

Answers

Answer:

The answer is A

Explanation:

A ( which is a less than sign) is used for all smaller values.

=(A2+A3)*12% is an example of a function in excel true or false

Answers

False but I’m not to sure

What is a menu?
another name for a window
a section that allows you to choose settings
a set of commands that provides quick access to a tool
a list of commands and options for working with a program

Answers

Answer:

a list of commands and options for working with a program

Explanation:

difference between local technology and model technology with example​

Answers

The differences? Speed, size, storage or load, or just plain work-load, between ‘modern,’ and trad. technology is probably easiest to compare. We tend to think of communication tech, and computation tech when we say ‘modern,’ but traditional? Lets define that just a bit. Are we talking machines and devices, or the uses themselves, like fire from rubbing two sticks together to fire from an ‘electronic,’ cigarette lighter?Some things are just novelties. There are times when cheap, non electronic devices provide practical and very necessary service in places where an electronic device is too high-maintenance to be equally practical. There is no need to put a computer on a well pump if you’re in a back-water where electronic replacement parts are hard to come by. You just hand pump the thing and it works fine and at your convenience. Certain ‘Green,’ tech, like solar ovens, are a far cry from a fire pit, or even a gas barbecue, and though it’s marketed as ‘new’ technology, depending of course on design and materials used, it is very low-tech. Useful technology seems really only cosmetically changed, with new clothes over old bones, so-to-speak. A different package, a different color, but it’s the job it does that matters. The best comparison between ‘modern,’ tech and ‘traditional,’ tech that springs to mind though, is that modern tech is very modular and if it breaks it’s often disposable, rather than fixable, for most of us.
The differences between modern and traditional technologies are: Traditional technology was based on simple laws and mechanics while modern technology is formed by the integration of many simple mechanics. Modern technology is built on the existing traditional technology. An example of local technology is plough, water mill and water pump. Example of model technology could be a statue or a painting.

The unit has you writing a script that ends each level when a sprite gets to the right edge of the screen. Propose another “level completed” solution where the levels ends when the player hits a certain part of the screen WITHOUT relying on coordinates. Describe your solution, including the code blocks you would use instead of coordinates.

Answers

Answer:

I  would make a system to go to the next level of the game without using coordinates by creating a finish line for each level that is a color like green or red. When the player’s sprite hits the finish line, it will activate a part of the code which will make the next level appear. To do this I will use an if statement. If the sprite is touching green, it will move to the next backdrop. This will create a way to go to the next level without using coordinates.

Explanation:

This is what i put as the answer, hope it helps! Dont forget to change it a little bit so you dont get flagged and stuff.

which of the following phase change when heat is removed form the material
A. sublimation
B. vaporization
C. Melting
D. Freezing​

Answers

Answer:

It will be D.Freezing

Explanation:

If heat is removed from a substance, such as in freezing and condensation, then the process is exothermic. In this instance, heat is decreasing the speed of the molecules causing them move slower (examples: liquid to solid; gas to liquid). These changes release heat to the surroundings.

GOOD LUCK

Check My Work An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the required output

Answers

An information system includes applications, which are programs that handle the input, manage the processing logic, and provide the required output.

What are applications used in a computer system?

Applications are software program that helps a computer user to work effectively with the computer system.

It  helps the computer user by handling the input, managing the processing logic, and providing the required output.

Examples of application include:

Web browsersPresentation softwareSpreadsheetWord processors

Therefore, an information system includes applications, which are programs that handle the input, manage the processing logic, and provide the required output.

Learn more about application software here:

https://brainly.com/question/18661385

The format that you will use on your works cited page when the entry is longer than one line is__________.

Answers

The format that you will use on your works cited page when the entry is longer than one line is to second and all subsequent lines need to be indented half an inch.

What kind of formatting is used on a works cited page?

In the formatting of the Works on Cited page, the layout is that "Title the page Works Cited, do put it on the center and in plain text (no italics, bold, or underline). etc.

Note that the format to use when  your works cited page  entry is more than one line is to second and all subsequent lines need to be indented half an inch.

Learn more about cited page from

https://brainly.com/question/1382377

1. Select and open an appropriate software program for searching the Internet. Write the name of the program.

Answers

An appropriate software program for searching the Internet is known as Web browser.

What is the software that lets you search?

A browser is known to be any system software that gives room for a person or computer user to look for and see information on the Internet.

Note that through the use of this browser, one can easily look up information and get result immediately for any kind of project work.

Learn more about software program from

https://brainly.com/question/1538272

I NEED HELP PLEASE!


Sweet Pete's Spreadsheets



Pete has a bakery and wants to make a better organizational system to organize what he needs for his business as well as keep track of his finances. Make a mock spreadsheet that details his incoming and outgoing finances. in the spreadsheet Account for money moving with appropriate fields of data, and be sure to use a binary field to track whether it's an incoming or outgoing amount, use data fields to track and order the payments, and add at least five entries that may be common for a bakery (think about bulk orders for food that would bring money in or purchases of ingredients that would cost money, along with rent, etc.).



Next, make an organizational chart that covers the sort of improvements using Excel for his finances that can help him. Also, mention the principles of data analysis to Pete and help him understand the plan you created for him to run his business effectively.





TABLE Grading Rubric

Full Credit
The student came up with a coherent analysis of the kind of needs a bakery might have, provided a good organizational chart that covers the aspects of Excel, and also mentioned the principles of data analysis in order to help Pete out. The student also created an adequate mock spreadsheet using different types of fields and data and filled in at least five entries with example data. The student demonstrated a good understanding of the sort of business needs this type of business might have.

Partial Credit
The student came up with a good analysis of the kind of needs a bakery might have, provided a sufficient organizational chart that covers the aspects of Excel, and mentioned the principles of data analysis in order to help Pete out. The student also created a mock spreadsheet using different types of fields and data and filled in at least four entries with example data. The student demonstrated a basic understanding of the sort of business needs this type of business might have.

Little Credit
The student came up with an analysis of the kind of needs a bakery might have, provided a sufficient organizational chart that covers the aspects of Excel, and mentioned some of the principles of data analysis in order to help Pete out. The student also created a mock spreadsheet using different types of fields and data and filled in at least three entries with example data. The student demonstrated little understanding of the sort of business needs this type of business might have.

Answers

What did you wrote there is no questions lololo

Can anyone help me on assignment 8: personal organizer on edhesive?

Answers

Open the PDF attached and it has the code I used to answer it. It got me 100%. Hope it works for you <3

25 points for this answer
Unethical uses of computer devices include _____. Select 3 options.
financial theft
surfing websites
identity theft
media piracy
downloading videos

Answers

Answer:

financial theft

identity theft

media piracy

Unethical uses of computer devices include the following:

Financial theft.Identity theft.Media piracy.

What is an unethical use of a computer?

The unethical use of a computer can be defined as the unauthorized and illegal (illegitimate) use of a computer system to perpetrate cyber crimes and other criminal inclined practices.

In Cybersecurity, unethical uses of computer devices by a hacker include the following:

Financial theft.Identity theft.Media piracy.

Read more on computer crime here: https://brainly.com/question/13109173

#SPJ2

In Scratch, what term refers to a message that gets passed along and causes an action to happen?
broadcast
mechanical
trigger
variability

Answers

Answer:

Broadcast

In scratch, let's use a block and a message as our example, when I receive and broadcast.

So you would put your syntax like this,

When green flag clicked

broadcast message1

 When I receive message1

 say Hello World!

Answer:

your answer is A. Broad cast

Explanation:

Define spyware and virus

Answers

Answer:

Brainliest pls

Explanation:

Spyware is a kind of malware that gathers your own data and accumulates information about you without your assent. Viruses are a kind of pernicious programming intended to spread from your gadget to different gadgets.

help ASAP i need to finish this! i will get in trouble if i dont

Answers

Answer:

[tex]beinggreat78~is~here~to~save~you![/tex]

Advantage: Speaking to another. Disadvantage: Bad for if you want to see each other.Advantage: You can actually interact physically with the person you are talking to. Disadvantage: The pandemic.Advantage: Type instead of speak, which has the feature of emojis. Disadvantage: Not many.Advantage: Getting contact soon as possible. Disadvantage: None, if you want quick contact with another individual.Advantage: Like a telephone but through the internet, which more people use. Disadvantage: What if you lose internet?Advantage: Good conferences. Disadvantage: Can be problematic, like some other conferences.Advantage: Depends on the conference service. Disadvantage: Can be problematic.Advantage: Very few. Disadvantage: Can be problematic, due to troublesome random callers.

Please help……Your friend is taking images from all over the internet without giving credit to the sources. He tells you that it’s no big deal, and no one will know or care anyway. Help your friend by explaining why it is important to follow copyright laws when photos are needed.

Answers

Answer:

For people who generate creative content, copyright regulations are crucial. It safeguards their works from being utilized without their permission or in ways that they do not approve of. If you successfully profited by utilizing someone else's copyrighted work, in this example their images, you may be required to pay monetary damages, and the court may order you to stop using his/her content without their agreement. A federal judge may potentially seize your work and compel you to delete them right away.

Why is my phone not allowing me to make calls iphone.

Answers

Make sure your celluar data is turned on!
It’s the little green icon when u pull down on the screen looks like a i with 3 lines around it

Also in your settings go to search and type wifi calling and make sure that’s turned on so you can call people when connected to wifi

Finally make sure to full hard restart your phone for as it is a possibility it could have bugged out.
hold power button and sound down still prompts you with a swipe to shut down.

Eric just signed up for his first college class after being out of school for nearly a
decade. He goes to the bookstore the week before class starts to get his book, and
he's surprised to learn that he only needs an access card. How will Eric be
accessing the course material for his college class?

Answers

The way Eric can access the course material for his college class is to use the LMS also known as course management system (CMS)

What are course material?

Course Materials are known to be the courses, documentation, educational materials needed for a specific course.

Conclusively, The LMS is the known to be the background into which instructors often input course content and when Eric access it, he can be able to get the course content.

Learn more about course material from

https://brainly.com/question/4371674

A program that runs each line one at a time in order is called?

Answers

the answer is a one liner program

Which denial of service (DoS) attack generates a large number of ICMP echo requests from a single request, acting like an amplifier and causing a traffic jam in the target network

Answers

The denial of service (DoS) attack that generates a large number of ICMP echo requests from a single request, acting like an amplifier is a  fraggle attack.

What does a Fraggle attack function as?

A Fraggle Attack is known to be a type of a denial-of-service (DoS) attack that entails the sending of a huge amount of spoofed UDP traffic to a given  broadcast address of a router that is often seen in a given network.

Note that  It is said to work in a similar way like the smurf Attack, that often uses spoofed ICMP traffic and as such, the denial of service (DoS) attack that generates a large number of ICMP echo requests from a single request, acting like an amplifier is a  fraggle attack.

Learn more about DoS attack  from

https://brainly.com/question/13068595

#SPJ1

Can someone please help me? My Brainly isn't working correctly and I need help. I can't see the home page... all I can see is in the pic... Please help me!!!

Answers

Answer:

ok. If you refeshed then now click this

Explanation:

The area that we can see just after windows is started is subject​

Answers

Answer:

The area that we can see just after windows is started is desktop or working area.

Which of the following objects is used to create a list of variables in flowcharts?

A. an array or list
B. string variable
C. simple variable
D. &

Answers

Answer:

A

Explanation:

ArrayList (Collection c): This constructor is used to build an array list initialized with the elements from the collection c. Suppose, we wish to create an ArrayList arr which

list 3 compounds of a computer.
list the 4 compounds of a computer system.
The central component system houses, the processer, memory and what else?
What are the 2 types of memory on a computer?
What does RAM stand for?
Name the other type of storage besides a floppy disk.
Name 3 output devices.
What are 2 examples of common software applications?
Name 2 symptoms of bugs in my computer
Name as many do's and don'ts of computer use. (more than 2)

Answers

Answer:

look up this question on here it comes up but do it one-by-one

Explanation:

Three compounds of a computer: Silicon chips, Printed circuit boards, and Plastics and metals.

What is central component system?

A computer's central component system typically refers to the central processing unit (CPU), motherboard, and memory (RAM).

A computer system is made up of four components:

Hardware Software Data User

The processor, memory, and motherboard are all housed in the central component system.

On a computer, there are two types of memory:

RAM stands for Random Access Memory (RAM)Memory That Can Only Be Read (ROM)

Other types of storage besides a floppy disk include hard disk drives, solid-state drives, and optical disks.

Three output devices are:

MonitorPrinterSpeakers

Two examples of common software applications are:

Microsoft Office Suite (Word, Excel, PowerPoint)Adobe Creative Suite (Photoshop, Illustrator, InDesign)

Two symptoms of bugs in a computer are:

Slow performanceUnexpected shutdowns or freezes

Do's of computer use:

Regularly back up important files.Install antivirus and security software.Keep software up to date.

Don'ts of computer use:

Don't download or open suspicious files or emails.Don't use weak passwords.Don't share personal information online.

Thus, this can be concluded regarding the given scenario.

For more details regarding CPU, visit:

https://brainly.com/question/16254036

#SPJ7

How does the quantity of data affect the accuracy of an experiment?
A. The more data is collected, the more accurate predictions and
results can be.
B. The less data is collected, the more data scientists have to search
for.
C. The less data is collected, the less likely it is that the experiment
will have to be repeated.
D. The more data is collected, the more time scientists spend
analyzing the results and predictions.

Answers

The more data that is collected, the more accurate predictions and results can be.

HELP PLEASEE!!
True or False. The POP is a bank of switches that allows many users to connect to the ISP at the same time.

Answers

Answer:

yes it is true. the pop is a bank of switches that allows many users to connect to the ISP at the same time.

Other Questions
student asserted that a suitable unit of specific heat capacity is m/sc .is he correct ? why or why not Increased globalization has been caused by all of the following except __________. A. improved technology B. increased transportation speeds C. improved communication speeds D. decreased distances between nations Please select the best answer from the choices provided. A B C D Mark this and return 7. Cat Woman attacked Batman with her claws and caused injury. Civil or criminal? ou -tu apres les cours? Who was Napoleon Bonaparte? Which type of public policy is the followingpolicy?Establishment of a Federal holiday.A. Domestic PolicyB. Foreign PolicyC. Both Domestic and ForeignD. Not A Public Policy What is the historical piece of the treblinka Which of the following is NOT an example of material culture?O A religion.architectureOC. clothingOD.cars S Why do you believe the sponsors of the Johnson-Reed Act chose1890 as the census year and not 1920, the year for which thegovernment had the most recent census data?4. How would you argue, using these statistics, that eugenics andeugenicists influenced the Johnson-Reed Act?5. How could you modify the Johnson-Reed Act to avoid favoring onespecific nationality over another? In other words, what other criteria -besides nationality-could you use to determine immigration visaeligibility?SAVECLEAR ALL What is the limit on the number of members in a limited liability company? There is no limit to the number of members in a limited liability company. Romans believed in learning to see the future. Who were specialists in thisarea?What is divination? What is 0.083.16? as a decimal. _Me prestas tu coche? _Me prestas tus fotos? _Me prestas tus pantalones? _Me prestas tu pluma? _Me compras un caf? _Me compras una bebida? _Me compras uno zapatos? _Me compras unas revistas? _Les das unas servilletas? _Les das unos lpices? _Les das la comida? _Les das el libro? A. S, te los presto. B. S, te la presto. C. S, te lo presto. D. S, te las presto. E. S, te la compro. F. S, te los compro. G. S, te lo compro. H. S, te las compro. I. S, se lo doy. J. S, se las doy. K. S, se los doy. L. S, se la doy. In the story Harrison Bergeron which takes place in the year 2081, and there have been 213 Amendments added to the U.S. Constitution. What does this demonstrate about the role of government in the story? can i pleas have help with this question below...... Where do you lookfor leaks coming fromthe differential of a car? Could someone help me please. Why was the Louisiana Purchase important? Check all of the boxes that apply.It doubled the size of the United States.It gave the United States control of trade on the Mississippi River.It meant that Spain no longer controlled any territory in the Americas. explain one way in which a campaign could be used to draw public attention to issues of lifestyle diseases resulting from poverty