Think of a time when you posted something online that you would not have said or shared otherwise? Why do you think you felt more comfortable communicating this way?

Answers

Answer 1

Answer:

This was because I could post merely by sitting in front of a computer or via my smartphone. Nothing else was required. And this was being seen by many from around the world. Hence, with such ease, I could talk with so many. Also, I can edit what I said anytime. Hence, if my words go wrong, and I find it anytime, I can edit at once. Due to all the above reasons, I posted online that I would have not said or shared otherwise.

Explanation:

Please check the answer section.


Related Questions

10. Question

The checksum doesn't compute for a packet sent at the Internet

Protocol (IP) level. What will happen to the data?

Answers

It will go down then it will start working

When a packet's checksum fails at the IP level, TCP would request a retransmission, while UDP would simply discard the packet. The occurrence of this checksum error indicates data corruption during transmission.

If the checksum does not compute for a packet sent at the Internet Protocol (IP) level, it indicates that the packet has been corrupted during transit. This means the data within the packet has been altered or garbled, which could be due to several reasons such as transmission errors, noise, or other forms of disruption. As IP operates primarily at the Network Layer (Layer 3), it is responsible for routing packets through the network but not for reliable delivery of data. This is typically managed by the Transport Layer protocols like Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).

In the case of TCP, which provides reliability features such as error checking and confirmation of data delivery, if a packet's checksum doesn't match, TCP will automatically request the retransmission of the corrupted packet. However, if the packet was sent using UDP, which is connection-less and does not guarantee delivery, the packet will simply be discarded, and no automatic retransmission will occur. This is because UDP is designed for low-latency or loss-tolerating connections, where speed is more crucial than reliability. Applications that require absolute data integrity must implement their error-checking mechanisms on top of UDP.

Therefore, when a checksum error is detected at the IP level, the handling of the corrupted data depends on the upper-layer protocol being used and whether it's a connection-oriented protocol like TCP or a connection-less protocol like UDP.

"So far this month you have achieved $100.00 in sales, which is 50% of your total monthly goal. With only 5 more workdays this month, how much do you need to sell each day to reach your goal?”

Answers

Answer:

$20 per day for next 5 working days.

Explanation:

if 50% is $100.00 another $100 need to achieve in 5 days.

100/5=20

Final answer:

The student needs to sell $20.00 worth of goods or services each day for the remaining 5 workdays to meet the total monthly goal of $200.00.

Explanation:

The student has achieved $100.00 in sales, which is 50% of their total monthly goal. Therefore, the total sales goal for the month is $200.00. To determine how much needs to be sold each day to reach this goal, we must consider the remaining days in the month. The student has 5 more workdays, so we divide the remaining 50% of the sales goal by 5 days.

Remaining Goal: $200.00 - $100.00 = $100.00
Divide the remaining goal by the number of workdays left:
$100.00 / 5 days = $20.00 per day.

To reach the total monthly sales goal, the student needs to sell $20.00 worth of goods or services each of the remaining 5 workdays.

One of the most important responsibilities of a leader is properly evaluating the _________ of their subordinates.
ability
performance
aptitude
achievements

Answers

One of the most important responsibilities of a leader is properly evaluating the performance of their subordinates.

Explanation:

One of the most important responsibilities of a leader is properly evaluating the performance of their subordinates. Leadership allows managers to affect employee behavior in the organisation. Thus, motivated employees are one of the most important results of effective leadership. ... They influence their followers' behavior through communication, group dynamics, training, rewards and discipline.The best leaders exhibit certain traits that make them hugely successful. These traits include clarity, decisiveness,humility ,passion  and courage

Which topology connects all the computers in a circular pattern?
A. mesh topology
B. ring topology
C. star topology
star topology
D. bus topology

Answers

Answer:

it is ring topology uhh how do i make this 20 characters long

Answer:

Compare the advantages and disadvantages of ring topology versus star topology.

Explanation:

Select the correct answer.
At which stage of project management do you need to discuss and clarify doubts about the project
A risk mitigation
B. project initiation
C. project planning
D. project execution

Answers

Answer : C project planning

Answer:

B. project initiation

(got it right on edmentum)

please be sure to look at the picture below so you wont question this answer

Explanation:

True or False

Tier 3 Internet providers sells bandwidth to Tier 2 Internet providers, who then sells bandwidth to Tier 1 providers that then sell Internet to your household.

Answers

Answer:

Fales

Explanation:

networking, and routing equipment. ISPs allow users access to networks that contain the required equipment, enabling users to establish Internet connectivity.

Answer:

false

Explanation:

Proofreaders' marks are:

Answers

They are symbols and notations for correcting typeset pages.

Which of the following technologies can operate in the 125 kHz to 134 kHz range?

Answers

Technologies that can operate in the 125 kHz to 134 kHz range is the

B. RFID

Explanation:

RFID is technology which works on radio frequency and it is used for the auto-identification for the different object. The RFID system mainly consists of two parts. In this RFID system, this RFID reader continuously sends radio waves of a particular frequencyRFID is the use of radio waves to read and capture information stored on a tag attached to an object, providing a unique identifier for an object. Active RFID tags have a transmitter and their own power source. Instead, they draw power from the reader, which sends out electromagnetic waves that induce a current in the tag's antenna.Semi-passive tags use a battery to run the chip's circuitry, but communicate by drawing power from the reader.Radio frequency identification (RFID) can operate in three frequency bands: 125 kHz to 134 kHz, 13.56 MHz, or 856 MHz to 960 MHz. Bluetooth is 2.4 GHz; NFC is 13.56 MHz; and LTE is between 600 MHz and 6 GHz.

Gemima has outlined the steps she needs to take to complete this task.

Step 1. Copy the table.

Step 2. Place the insertion point where the chart needs to be added.

Step 3. Go to the Insert tab on the ribbon.

Step 4. Navigate to the Table command group.

Step 5. Click the Chart icon.

Step 6. Paste the copied information in the chart in the Microsoft Word table.

Which step should Gemima fix to complete the task correctly?

Step 3

Step 4

Step 5

Step 6

Answers

Answer:

B - Step 4.

Hope this helped! :D

Answer:

its b

Explanation:

i did the quiz

How do you get the value of an element in an array? And how about for an ArrayList?

Answers

Answer:

array: a[21], b[34] etc.

ArrayList: arr.get(12), arr.get(23)

Explanation:

Remember that array is a fixed size collection of values of the same datatypes. We need to provide the array size at the time of the declaration itself. Like:

Student[]=new Student[5];

The above is an array of five student object types.

Similarly, we can have:

a[] =new int[5];

This is an array of five int type.

And we can output the fourth student as Student[4].name, Student[4].marks. And in int case like a[3], a[4], etc.

Similarly, we can get the value from ArrayList as:

arr.get(3);

ArrayList is a resizable array, and can be found inside java.util.ArrayList.

A network administrator wants to change the frequency of their wireless network to allow more channels that do not interfere with
each other. Which of the following frequencies or protocols would accomplish this?
5 GHz
802.119
802.11b
2.4 GHz

Answers

Answer:

5 GHz

Explanation:

Select the correct answer.
In a project, who gives approvals for moving to the next project phase?
A.
project manager
B.
project director
C. project team members
D.
team lead

Answers

Answer:

A. Project Manager

Explanation:

Answer : A project manager

Meg is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding technique to use. Which technique would work best for her?

A. hierarchical
B. linear
C. webbed
D. wheel

Answers

Answer:

i assume it,['s b.linear since it invloves math equations

When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?

Answers

Answer:

B.) Open Office Impress

Explanation:

The options are:

A.) Open Office Writer

B.) Open Office Impress

C.) an outline

D.) photographs

Out of the above, the Impress is used for doing complex presentation, and its one of the best tool for it like PowerPoint. Its quite the same as PowerPoint, and it supports both ppt format as well as odp or the open document presentation format. You can make very complex presentations with the help of the Open office Impress.

Answer:

the answer is A: an outline

Explanation:

I did the test and got 100%

What kind of voltage do solar cells generate? Solar cells produce ______ voltage which is not usable by most household appliances.

Answers

Answer:

open circuit voltage

Explanation:

A camera scan of grieving Columbine family members and friends_
-is known as disaster fatigue.
-is an invasion of privacy and therefore not newsworthy
-is known as ethnocentrism.
-is questionably newsworthy because it brings celebrity status to the culprit.
-is too dangerous just for the sake of promoting ratings.
-is okay and newsworthy.

Answers

Answer:

is an invasion of privacy and therefore not newsworthy

Explanation:

What could break the circuit between your home and an electric power plant?

Answers

Answer:

A wire burning out

Explanation: that would end the circuit

Answer:

Maybe if one of ur wires are broken out!

Explanation:

The following console program uses parameters and produces hive lines of output. What are they?!
public class Parameter MysteryExam1 extends ConsoleProgram {
public void run() {
String x = "java";
String y = "tyler":
String z = "tv";
String rugby = "hamburger":
String java = "donnie";
hamburger (x, y, z);
hamburger (z, x, y);
hamburger ("rugby", z, java):
y = hamburger (y, rugby, "x");
hamburger (y. y. "java");
public String hamburger (String y. String z, String x) {
println(z + " and " + x + " like " + y):
return z;

Answers

Answer:

Explanation Tammy is making 5 batches of punch for the school's Spring Carnival. The recipe for one batch uses 1 liter of orange juice, 550 milliliters of lemon juice, 2.5 liters of soda water, and two 850 milliliter bottles of apple cider.How much punch will she make?Tammy will make  L of punch.

Explanation:Can I please be your friend and get brainly!

What is it called when you make a reference in the text of a document alerting the reader that you are using information from another source?

Answers

An in-text citation is a reference made within the body of text of an academic essay. The in-text citation alerts the reader to a source that has informed your own writing. The exact format of an in-text citation will depend on the style you need to use, for example, APA.

Final answer:

An in-text citation is used when referencing information from another source in a document to acknowledge the original creator and avoid plagiarism. It consists of the author's name and sometimes the page number within parentheses and requires a detailed reference list for full source information.

Explanation:

When you make a reference in the text of a document to inform the reader that you are using information from another source, it is known as an in-text citation. An in-text citation alerts the reader to the fact that the material, whether it is a summary, paraphrase, or a direct quote, originates from a different source. In-text citations are a fundamental aspect of scholarly writing and serve to prevent plagiarism by making it clear which ideas and words are yours and which are from other sources.

When properly used, in-text citations typically include the author's last name and a page number in parentheses if available. Furthermore, the first time a source is mentioned in your writing, it's important to introduce both the speaker and, if applicable, the title of the source to provide additional context. This practice, along with a detailed reference list at the end of the document, ensures the source can be easily identified and located by readers.

Citing sources accurately is an essential skill in academic writing. It validates your research, allows readers to follow up on the original sources, and maintains the integrity of your work.

Which of the following best describes the constraints within a model?
They modify the values
They evaluate the outcomes
They limit the choices available
They add more choices and options​

Answers

Answer:

They limit the choices available

Explanation:

Take an example of UNIQUE constraint. It limits the output to have UNIQUE values. All duplicate values are being cleaned. And only the unique values are shown in the search list. Hence, this means that the constraint limits the choices available. No modification of the value is done by it. Nor does it evaluate the outcomes. Also, it does not add more choices as well as options. But it does limit the choices available. Hence, the correct option is certainly C. or that it limits the choices available.

Computers are used to store, retrieve, and _____ data. manipulate mechanize memorize operate

Answers

Final answer:

Computers are used to store, retrieve, and manipulate data. The correct word that fills the blank in the question is 'manipulate', which refers to the process of skillfully handling or controlling data to achieve specific objectives or analyze the data.

Explanation:

Computers are used to store, retrieve, and manipulate data. To manipulate means to handle or control data in a skillful manner. This involves editing, altering, and analyzing the data to achieve a desired outcome. For example, a computer that can store and perform calculations on large data sets effectively manipulates information to provide insightful results, much like how experimental results on molecules and their motion can be manipulated to produce a three-dimensional diagram of a compound. Our brain's memory functions in a comparable way, manipulating the information gathered by the senses and stored in long-term memory to produce thoughts and actions.

True or False

MAC addresses are assigned by the router along with your IP address.

Answers

True. If you look at the router it will correspond with your MAC address

Write a sentence that describes how a series circuit works.

Answers

Answer:

In a series connection, the current is the same through each component regardless of any kind of components are used or their values. The voltage drops across each component in the circuit are dependent upon the values of the components used in the circuit. Another way to view a series connection is that the positive end of each component is connected to the negative end of the previous component in a 'one after the other' arrangement. The negative end of each component is also connected to the positive end of the next component.

It is one of which every component is arranged in a series connection. Hence series circuit will have same current at all points of the circuit. The voltage drop across each component in the circuit adds up to sum of voltage source across each component and of an equivalent component value. Breaking of the series circuit will make entire circuit to stop working. Suppose consider the three bulbs are connected in series connection and if even one bulb burns out or broken then all the three bulbs will stop working as well. In series circuit components like current (I) is sum of all the element and Voltage is sum of all the voltage drops and resistance is the sum of individual resistances.

Explanation:

What do you think was the immediate effect of the introduction of handheld consoles and video games?

Answers

Final answer:

The immediate effect of the introduction of handheld consoles and video games was an increase in aggressive thoughts and emotions among children who played violent video games.

Explanation:

The immediate effect of the introduction of handheld consoles and video games was an increase in aggressive thoughts and emotions among children who played violent video games. Psychologists Anderson and Bushman (2001) found that children who had just played a violent video game demonstrated an immediate increase in hostile or aggressive thoughts, an increase in aggressive emotions, and physiological arousal that increased the chances of acting out aggressive behavior

Competitive admission is mostly used by:
O
A. junior colleges
O
B. community colleges.
O
C. two-year colleges.
O
D. four-year colleges.

Answers

Competitive admission is mostly used by four-year colleges. Thus, option D is correct.

What is vocational school?

A vocational school is operated for the express purpose of giving its students the skills needed to perform a certain job.

In contrast to university diploma programs, vocational diploma applications do not contain extra courses, which include writing or history classes. as a substitute, you may cognizance entirely of the essentials for your chosen field.

A vocational faculty also referred to as a trade school or profession college, is a shape of schooling this is designed to teach students the valuable skills they need to perform a selected task or job. those faculties generally offer practical education that focuses on a single area.

Learn more about vocational school here:

brainly.com/question/14894593

#SPJ5

Are You ‘Addicted’ to Texting?
How Many Text Messages Are Too Many?
Have You Ever Sent an Odd Message Because of Auto-Correct?

Answers

1.i am addicted to texting.
2.about 1,000
3.yes way too many

science: what are atoms where can they be found?​

Answers

Answer:

atoms make up every single living thing on earth.

atoms can be found in/on any living thing on earth

Type the correct answer in the box. Spell all words correctly.
The Internet is a worldwide communications network. Which device connects computer networks and computer facilities?
The Internet connects computer networks and computer facilities through a device called the

Answers

A router is the device that connects computer networks and facilities, managing data traffic and directing information between devices on local and global networks.

The Internet connects computer networks and computer facilities through a device called a **router.** A router plays a crucial role in managing data traffic between different networks, ensuring that information is efficiently directed to its intended destination. It serves as a central point for data transmission, directing data packets between devices on the local network and external networks, including the vast global network that constitutes the Internet.

Routers operate at the network layer of the OSI model, making decisions based on IP addresses to determine the most effective path for data to travel. They enable seamless communication between devices within a local network and facilitate the connection to the broader network infrastructure.

In essence, a router serves as a gateway, connecting multiple computer networks and facilitating the exchange of data across the Internet. Its role in directing data packets ensures that information is transmitted accurately and reaches its destination in a timely manner, contributing to the functionality and efficiency of the global communications network that is the Internet.

(Java)
How do you remove a segment from a string?
For example I need to remove only the first "11" from "1100000111" in java

Answers

Answer:

I Explanation

Explanation:

To delete a segment on a string, pick the option from the toolbar or menu. Firstly select the segment to be delete/removed from the string with a left mouse click. Once the segment has been accepted, it will be removed/deleted from the string

Which is a characteristic of multimedia systems?
A.
They aren't under the control of computers.
B. They are exclusive to the Internet.
C.
They use analog data formats.
D.
They provide an interactive interface.
E.
They consist of standalone systems.​

Answers

Answer:

D. They provide an interactive interface.

Explanation:

Multimedia is a computer based system that supports more than a single type of media usually text, image, animation, audio and video.

The characteristics of the multimedia system are;

1. Multimedia system must be computer controlled

2. All multimedia components are integrated.

3. The interface to the final user may permit interactivity.

4. Information must be represented digitally.

Other Questions
Why does Miss Caroline say, Youre starting off on the wrong foot in every way, my dear? A,B, and C are collinear, and B is between A and C. The ratio of AB to BC is 1:1 of A IS AT (-1,9) and B (2,0) what is the volume of a cube whose surface area is 294 A waiter at a restaurant receives a 15% tip on a $25 bill. At the same restaurant, a waitress receives a 20% tip on a $20 bill. Who gets the larger tip? By how much? Create a procedure that generates a random string of length L , containing all capital letters. The procedure, CreateRandomString, receives the length of the string (L) in EAX, and returns the pointer to a byte array in ESI held the random string. Part 2 Write a driver program uses the CreateRandomString procedure to generate 20 random strings. Each random string with a random length between 1~100. Output all strings in the console window. Why is it a good idea to make interest payments for those loans that accrue interest during a grace period? What are the three ways thermal energy is transferred A student at a four-year college claims that mean enrollment at four-year colleges is higher than at two-year colleges in the United States. Two surveys are conducted. Of the 35 four-year colleges surveyed, the mean enrollment was 5,135 with a standard deviation of 783. Of the 35 two-year colleges surveyed, the mean enrollment was 4,436 with a standard deviation of 553. Test the student's claim at the 0.01 significance level.NOTE: If you are using a Student's t-distribution for the problem, including for paired data, you may assume that the underlying population is normally distributed. (In general, you must first prove that assumption, though.)State the distribution to use for the test. (Enter your answer in the form z or tdf where df is the degrees of freedom. Round your answer to two decimal places.)(1) What is the test statistic? (Round your answer to two decimal places.)(2) What is the p-value? (Round your answer to four decimal places.) How is the "inborn talents" model similar to and different from the "new picture"? The function below takes a single input, containing list of strings. This function should return string containing an HTML unordered list with each of in_list strings as a list item. For example, if provided the list ['CS 105', 'CS 125', 'IS 206'], your function should return a string containing the following. The only whitespace that is important is those contained in the given strings (e.g., the space between CS and 105). What number is 1/100 of the value of 2.6 what is the meaning of love 6.8 Use the Normal approximation. Suppose we toss a fair coin 100 times. Use the Normal approximation to find the probability that the sample proportion of heads is (a) between 0.3 and 0.7. (b) between 0.4 and 0.65. Moore, David. Exploring the Practice of Statistics & Student CD (p. 325). W.H. Freeman & Company. Kindle Edition. A project is composed of many elements and includes a variety of tools to manage all of the elements of the project. Which of the following best defines the relationship between organizational culture and estimating? Melanie knew that the perimeter of the soccer field was 1/6 miles.Her goal was to walk 2 miles while watching her sisters game.If she walked around the field 13 times,did she reach her goal?Tell how 3. Find the radius of the object to the right. Can you help me out plzzz A trough is filled with a liquid of density 835 kg/m3. The ends of the trough are equilateral triangles with sides 4 m long and vertex at the bottom. Find the hydrostatic force on one end of the trough. (Use 9.8 m/s2 for the acceleration due to gravity.) Mike has lactose intolerance and has to ingest commercial lactase in pill form before consuming milk products in order to avoid the unpleasant symptoms associated with this disorder. One day he noticed a classmate refusing a free sample of the new milkshakes sold in the campus cafe. His classmate, Jamal, explains that he has to avoid all milk products in his diet because he has galactosemia. Mike offers Jamal one of his lactase pills. Because both of their disorders are caused by consumption of milk products, he thinks Jamal should try lactase to see if it will allow him to try the milkshake. Should Jamal try the lactase pill to see if it will work Factor. 3ab-6b^2-2bc+ac(Thank you, please explain all steps)