______ brings the computer into the realm of mass communication: select one:
a. video conferences
b. chat rooms
c. e-mail
d. multi user domains (muds)
e. the world wide web

Answers

Answer 1
]the answwe is chat rooms
Answer 2
B. chat rooms

hope this helps

Related Questions

Installing an operating system onto a hard drive with no previous os installed is known as

Answers

a clean install. Actually as long as the drive has a new filesystem, it's a clean install.

What does a linear bus topology used to connect all network devices?

Answers

A linear bus topology uses a common background cable to connect all network devices.

Final answer:

A linear bus topology connects all network devices to a single cable backbone. Device B shows a linear, ohmic relationship, meaning it follows Ohm's Law. High voltage is used in power lines to reduce current and therefore minimize line losses over long distances.

Explanation:

A linear bus topology is a network design in which all network devices are connected to a single continuous length of cable, often referred to as the backbone. Each device is directly connected to this backbone through a branching cable. In a scenario where device B displays a linear relationship and is ohmic, it means that the device obeys Ohm's Law, where voltage is directly proportional to the current across a conductor at a constant temperature, resulting in a straight-line graph when voltage is plotted against current.

Furthermore, in electrical power transmission, it is beneficial to use high voltage to reduce currents over long distances due to resistance in the lines. Although the conductors have low resistance, long distance lines can accumulate significant losses. Higher voltage leads to lower current and therefore, reduces line losses, making for more efficient transmission of power over kilometers long distances from the power company.

Which process is used to protect transmitted data in a vpn?

Answers

Here is the answer: Tunneling

import java.util.Scanner;

public class Grade
{
public static void main (String[] args)
{
// Declare constants
final double IN_WEIGHT = 0.6; // in-class weight is 60%
final double OUT_WEIGHT = 0.4; // out-of-class weight is 40%

// Declare variables
int preLabPts; //number of points earned on the pre-lab assignment
int preLabMax; //maximum number of points possible for pre-lab
int labPts; //number of poitns earned on the lab
int labMax; //maximum number of points possible for lab
int postLabPts; //number of points earned on the post-lab assignment
int postLabMax; //maximum number of points possible for the post-lab
int outClassAvg; //average on the out of class (pre and post) work
int inClassAvg; //average on the in-class work
double labGrade; //final lab grade

Scanner scan = new Scanner(System.in);

// Get the input
System.out.println("\nWelcome to the Grade Calculator\n");
System.out.print("Enter the number of points you earned on the pre-lab: ");
preLabPts = scan.nextInt();
System.out.print("What was the maximum number of points you could have earned? ");
preLabMax = scan.nextInt();
System.out.print("Enter the number of points you earned on the lab: ");
labPts = scan.nextInt();
System.out.print("What was the maximum number of points for the lab? ");
labMax = scan.nextInt();
System.out.print("Enter the number of points you earned on the post-lab: ");
postLabPts = scan.nextInt();
System.out.print("What was the maximum number of points for the post-lab? ");
postLabMax = scan.nextInt();
System.out.println();

// Calculate the average for the out of class work
outClassAvg = (preLabPts + postLabPts) / (preLabMax + postLabMax) * 100;

// Calculate the average for the in-class work
inClassAvg = labPts / labMax * 100;

// Calculate the weighted average taking 40% of the out-of-class average
// plus 60% of the in-class
labGrade = OUT_WEIGHT * outClassAvg + IN_WEIGHT * inClassAvg;

// Print the results
System.out.println("Your average on out-of-class work is " + outClassAvg + "%");
System.out.println("Your average on in-class work is " + inClassAvg + "%");
System.out.println("Your lab grade is " + labGrade + "%");
System.out.println();
}
}

can anyone help fix this code?

Answers

package Hello;
import java.util.Scanner;

public class NewClass1 {
   
 public static void main (String[] args)
 {
 // Declare constants
 final double IN_WEIGHT = 0.6; // in-class weight is 60%
 final double OUT_WEIGHT = 0.4; // out-of-class weight is 40%

 // Declare variables
 int preLabPts; //number of points earned on the pre-lab assignment
 int preLabMax; //maximum number of points possible for pre-lab
 int labPts; //number of poitns earned on the lab
 int labMax; //maximum number of points possible for lab
 int postLabPts; //number of points earned on the post-lab assignment
 int postLabMax; //maximum number of points possible for the post-lab
 int outClassAvg; //average on the out of class (pre and post) work
 int inClassAvg; //average on the in-class work
 double labGrade; //final lab grade

 Scanner scan = new Scanner(System.in);

 // Get the input
 System.out.println("\nWelcome to the Grade Calculator\n");
 System.out.print("Enter the number of points you earned on the pre-lab: ");
 preLabPts = scan.nextInt();
 System.out.print("What was the maximum number of points you could have earned? ");
 preLabMax = scan.nextInt();
 System.out.print("Enter the number of points you earned on the lab: ");
 labPts = scan.nextInt();
 System.out.print("What was the maximum number of points for the lab? ");
 labMax = scan.nextInt();
 System.out.print("Enter the number of points you earned on the post-lab: ");
 postLabPts = scan.nextInt();
 System.out.print("What was the maximum number of points for the post-lab? ");
 postLabMax = scan.nextInt();
 System.out.println();

 // Calculate the average for the out of class work
 outClassAvg = (preLabPts + postLabPts) / (preLabMax + postLabMax) * 100;

 // Calculate the average for the in-class work
 inClassAvg = labPts / labMax * 100;

 // Calculate the weighted average taking 40% of the out-of-class average
 // plus 60% of the in-class
 labGrade = OUT_WEIGHT * outClassAvg + IN_WEIGHT * inClassAvg;

 // Print the results
 System.out.println("Your average on out-of-class work is " + outClassAvg + "%");
 System.out.println("Your average on in-class work is " + inClassAvg + "%");
 System.out.println("Your lab grade is " + labGrade + "%");
 System.out.println();
 }
 }

 

A(n) _____ occurs when a visitor requests a page from a web site.'

Answers

If everything goes right, A file transfer occurs.

The question is so broad, I don't know what you're looking for. How does httpd work? How does HTTP work? I don't know.

What does it mean that the media could be bias?

Answers

Media bias is the bias or perceivedbias of journalists and news producers within the mass media in the selection of events and stories that are reported and how they are covered. ... There are a number of national and international watchdog groups that report on bias in the media.

What does API stand for

Answers

API stands for Application programming interface.

API stands for "Application programming interface". API (Application Programming Interface) is defined as a computing interface that defines the interaction between multiple software intermediaries.

What is API?

API stands for "Application programming interface".

API in computer helps computer technology interact with each other

API (Application Programming Interface) is defined as a computing interface that defines the interaction between multiple software intermediaries.

API key is the specific identifier use authenticate the developer user and call programs for the API.

The API keys often serve as a specific identifier and a secret token for authentication and which usually have a set of access rights to the API associated with it.

It is used to authenticate a project with an API instead of a human user. Different platforms can execute and use API keys in different ways.

Learn more about API here;

https://brainly.com/question/17257153

#SPJ2

What is the main scientific weakness in watson and crick's paper?

Answers

When writing a scientific paper, it's ethical to refer to those who helped you in your paper and to cite all the references you used in order to give credits to the owners of these references.

In Watson and Crick's paper, they did not refer to those who assisted them in their research neither gave them credit. This is somehow considered as stealing someone's work and referring it to yourself.
This was the major scientific error in their paper.
One weakness of their paper is that much of the work was drawn by Crick's wife and she was not credited. They also do not answer the concern of what makes complementary nucleotides rotate in space, thereby producing a DNA spiral.

When you save a file to the cloud, it means your file was stored _____. Question 1 options: on the internet on your hard drive on your computer's RAM on a flash drive

Answers

Answer:

Option a. On the internet

When you save a file to the cloud, it means your file was stored on the internet.

Explanation:

Cloud storage can be defined as the remotely working service model that manages, maintains, backups all the data and make it available to the users over the network all the time.

This means all the data is accessed and modified when needed, without the availability of some specific hardware device. Moreover cloud computing expels the problem of  low space on the drive.

Storage on cloud computing is much easier and secure now-a-days and has many advantages including mobility and all time access and fear free environment regarding loosing of data.

i hope it will help you!

The linux command _______ can be used to list the current disk devices connected to the computer.

Answers

The linux command fdisk -1 can be used to list the current disk devices connected to the computer

You can block logical ports from invaders and make your computer invisible to others on the internet by installing ________. a firewall a packet sniffer antivirus software a packet filter

Answers

A firewall is the best choice. This will help protect your computer from being seen on a network and being invaded by snoopers who are wanting to do damage to your system or files. Having a firewall is the first line of defense against hacking and sabotage.

Ascii is the encoding standard used to represent _____ in digital form.

Answers

It is needed to represent character encoding, so letters and numbers.

ASCII is the encoding standard used to represent keyboard characters in digital form.

What is ASCII?

The most used character encoding system for text data in computers and on the internet is ASCII (American Standard Code for Information Interchange). Unique values exist in normal ASCII-encoded data for 128 alphabetic, numeric, or special extra characters and control codes.

The ASCII character encoding is based on wireless character encoding. In 1963, the American National Standards Institute established it as a computer standard.

As per the question,

ASCII is the encoding standard used to represent keyboard characters in digital form.

For example, the code for the letter "A" is 65, and the code for the digit "1" is 49.

Thus, the required fill-in-the-blank would be "keyboard characters".

To learn more about the keyboard characters click here:

https://brainly.com/question/14882003

#SPJ5

What is the name of a popular high-level computer programming and scripting language that is the name of a snake?

Answers

The name of the programming language is PYTHON.
Python is a popular, high level programming language that is used for general purpose programming. Python is objected oriented  and it uses dynamic typing for memory management. The programming language was created in the late 80's by Guido Van Rossum.

A bookmarking site is a website that enables members to manage and share media such as photos, videos, and music. true or false

Answers

The answer is False. 

What color typically indicates the speaker port on a sound card?

Answers

The answer to this question would be: Lime green

The lime green color code is for audio output for speaker or headphones. Color coding is greatly helpful to make sure that the port you are using is correct. Using the color you can determine what kind of input or output the port is for. There is a few others color coding like pink for analog microphone input, or light blue for audio input of analog line.
Lime Green was color typically indicates the speaker port on a sound card

How do I download the Microsoft word on my Hp probook

Answers

If it’s a tablet there should be an app if not then go to Microsoft and find a apk to download or use google sheets it’s just as good without the need of a flash drive since it’s saved to the cloud
You should use Google Sheets

hope this helps

A _____ is a computer virus that replicates and spreads itself, not only from file to file, but from computer to computer via e-mail and other internet traffic.

Answers

Trojan horse
....................

Is a small file that a web server writes to the disk drive of the client computer, containing information about the user?

Answers

Is a Cookie is a small file that a web server writes to the disk drive of the client computer, containing information about the user?

Ethan is responsible for writing the dialogue in a movie. Which role is he playing? Ethan is playing the role of a(n).....''BLANK''..... and is responsible for writing the dialogue in the movie.

Answers

Screenwriter! A screenwriter's role is to pen the script for a film.

Answer:

Screenwriter

Explanat

What actually changes the value excel stores to a user determined number of decimal places?

Answers

The ROUND function can be used to do this. The function, in its final argument, has a section that allows for the exact number of digits that the returned value should be truncated at, which will set the exact number of decimal digits stored in that cell.

Chords based on scale degrees create appropriate harmonies for a piece of music. True False

Answers

I think the answer to this is True.
The answer would be true

Which of the following statements is the least abstraction of the World Wide Web?

A. a bunch of Web pages

B.documents, images, and other data you can access by providing a URL (Web address)

C.the Internet

D.Wikipedia, Facebook, and other cool sites

Answers

B.documents, images, and other data you can access by providing a URL (Web address)

What feature sets Macs apart from other operating systems?

desktop
Finder
mouse
GUI

Answers

Desktop, a mac doesn't have a separate power system
Trick question!

Desktop and mouse are NOT a part of the operating system. They are operating system although mac is the only one to use a one button mouse

The GUI and finder feature are only used with apple but the apple operating system is built on top of the unix operating system. Similar to Linux and other systems that do have similar features but just with different names.

If the question was what sets apple systems apart from others it would be the mouse with the one button.

Anti-bullying laws in most states are designed to provide

A. guidelines for appropriate online behavior.
B. reasons for why people bully others online.
C. schools with ways to punish online bullying.
D. advice for preventing online bullying.

Answers

i would put it as c but that what i think 

Okay. Anti-bullying laws aren't exactly designed to specifically say why people bully others online nor to give advice for preventing online bullying.. Therefore, B and D are out. It doesn't fully give guidelines for appropriate online behavior, but more of reasons with helping schools find ways to punishing those who bully online. The answer is C.

The motherboard is considered the "brain” of a computer because it controls
a computer’s speed.
performs specific tasks.
connects a system’s components.
processes stored information.

Answers

Its connect a system’s components .

Answer:Its connect a system’s components .

Explanation:

took test on edge 2020

A data set with 1,000 records will have ____ differences between the ordered records

Answers

Final answer:

The calculation for the total number of differences between ordered records in a dataset of 1,000 records results in 999,000 differences, utilizing the formula for combining each record once without duplicating comparisons.

Explanation:

The question asks about the number of differences between ordered records in a dataset of 1,000 records. When considering a linear sequence of 1,000 records, each record can be compared to all other records to determine the difference. Therefore, to find the total number of differences, we consider each record being compared to every other. To calculate this, the formula (n-1) + (n-2) + ... + 1 can be employed, where n is the total number of records, which simplifies to n(n-1)/2. For 1,000 records, this calculation gives us 999,000 differences if each record is compared to every other record once. It's crucial to understand that this calculation assumes that the comparison between two distinct records constitutes a single difference, ignoring the magnitude of the difference and focusing on the count of comparatives.

Which of the following is important when using technology? A) Governance B) Credentialing C) Ethical conduct D) Preparation

Answers

It is important to have some sort of preparation when using technology. In order to use technology it will take a large amount of time to prepare and understand what the peace of equipment, (technology) is able to unfold.

Important factors while using technology are:

A) Governance

B) Credentialing

C) Ethical conduct

D) Preparation

Briefly,

A)

Governance: Governance refers to the establishment of rules, regulations, and policies that guide the appropriate and responsible use of technology.

It involves creating structures and processes to ensure that technology is used in a fair and equitable manner, and that any potential risks or issues are properly managed.

B)

Credentialing: Credentialing involves obtaining and maintaining the necessary qualifications and certifications to use specific technologies or perform certain tasks.

It can include obtaining degrees, certifications, or licenses that demonstrate a person's expertise and competence in using technology effectively and safely.

C)

Ethical conduct: Ethical conduct is crucial when using technology. It involves behaving in a responsible and moral manner, respecting the privacy and rights of others, and using technology for positive purposes.

Ethical conduct includes things like avoiding plagiarism, respecting intellectual property rights, and being mindful of the impact of technology on individuals and society.

D)

Preparation: Preparation is indeed important when using technology. It involves acquiring the necessary knowledge and skills to effectively utilize technology. This can include learning how to operate specific devices, understanding software applications, and staying updated with the latest technological advancements.

Know more about technology,

https://brainly.com/question/9171028

#SPJ6

Powerpoint increased the weight of a line in ____ increments.

Answers

One-fourth increments

What command should you use to determine the fqdn of a computer with ip address 172.31.209.5?

Answers

I use host -a

dig and nslookup could do it, I forget the switches and arguments.

Computer-aided design software is used primarily by:

Answers

Is used primarily by Students and Engineers.
Other Questions
A surgical team was operating in a rural hospital without a backup electrical generator. the power went out. to provide light for the surgery, they collected all the cell phones in the hospital and turned them on. the operation was able to proceed because the surgical team avoided ________ and ________ the problem In American society, romantic love is considered the main reason for people to marry. On the other hand, in some societies, romantic love is considered a form of obsession or madness. In fact, even in many societies where "true love" is not considered a form of insanity, arranged marriages are still the norm. For example, in many cultures it's believed that marriage is basically an economic arrangement. Thus, a farmer needs a wife both to bear children and to share the farm work while raising new "hands" as additional farm labor. In other societies, marriage is mainly about cementing connections between families. Indeed, most marriages between members of European royal or aristocratic lineages were primarily aimed at creating trust, loyalty, and mutual obligations between privileged and powerful families. What is the main idea in this paragraph? A.Marriage is usually a family affair.B.True love is a sound basis for marriage.C.Different societies have different ideas about the purpose of marriage.D.Arranged marriages are more practical than those based on romantic love. Healthy epithelial tissues are important to a strong __________ system Which important complex is formed due to complimentary binding at the enzyme active site? A.) Enzyme product complex B.) Enzyme substrate complex C.) Substrate product complex The regions of the ocean characterized by smooth ocean floor are called: Liam bought a picture frame that cost $12 plus 8% sales tax. He wrote the expression 1.08(12) to find his total cost.Which expression is equivalent to the total cost?(12+0.08)1212 + 0.081+0.08(12)(1+0.08)12 What is an action verb? Shown here is a frequency distribution for the rise in tides at 30 selected locations in the U.S.Find the variance and standard deviation FeCl2 Express your answers as ions separated by a comma. THE MIND HAS NO LIMITS, BUT TIME DOES.....try, and break your limits.Read the introduction to Joels personal narrative, "The Jazz Band."I __________ for the school jazz band my freshman year, my sophomore year, and my junior year. I didnt make it until I was a senior. Thats four tryouts! I __________ four nerve-racking tryouts, but it was worth it.Fill in the blanks in order.audition . . . . enduredaudition . . . . endureauditioned . . . . endureauditioned . . . . endured Describe how social actions that leverage social networking sites such as facebook and twitter have led to greater equality and social justice in the us where is areolar tissue located Please hurry!Determine the x- and y-intercepts of the graph of y=1/3 x + 3 Then plot the intercepts to graph the equation. Raul, a salesperson for the lovely landscapes landscaping company, is working with a longtime customer who is interested in either cutting back on the services or getting a better price due to the tight economy. raul tells his manager, "i want to take care of the customer with the best value. so what do you think is the best package to offer in this situation?" raul and his manager are trying to utilize the In Chapter 12 of The Scarlet Letter, what brings Reverend Dimmesdale to the scaffold at night? A. He feels drawn to the scaffold by some otherworldly power. B. He wishes to stand where Hester stood to atone for his own sins under the cover of darkness. C. The scaffold is the best place to view the stars at night, so he goes there to clear his head. D. He is there to mock Hester's torment. Does whater boil at a temperature below 100c at higher altitudes Land acquired through the Mexican Cession is located today inA.the northeastern US.B.the northwestern US.C.the southeastern US.D.the southwestern US how many known writers penned general epistles Which answer identifies the participial phrase and the word it modifies in this sentence? The candle flickering on the table provides the only light in the room. The participial phrase flickering on the table modifies candle. The participial phrase provides the only modifies table. The participial phrase The candle modifies flickering. The participial phrase in the room modifies light. Hurry please!! Use any model you choose to solve the story problem. Zoey found that box of dog food was left in the pantry. She shared this food equally among her 4 dogs. What fraction of the full box of dog food did each dog get? Steam Workshop Downloader