communication is an endless process . Explain

Answers

Answer 1

in the process of communication it's easy to understand each other


Related Questions

what is multimedia software​

Answers

Answer: A program that plays or records audio files or playing or recording video files. Audio of famous speeches is a multimedia software

Explanation:

5. Power Trio
by CodeChum Admin

Multiplying two numbers is a piece of cake, but how about multiplying three of them, either being a negative of positive number? With programming and proper code, these tasks are easy to handle.

You're a programmer, right? Then code this one for me!

Input
A line containing three numbers (positive or negative, may have decimal places) separated by a space.
1.6·-2·-1

Output
A line containing a decimal/float with one decimal place.
3.2

Answers

Answer:

from decimal import *

li = list(map(Decimal,input().split()))

result = li[0]*li[1]*li[2]

print(abs(result))

Explanation:

The proper or programming code to handle that multiplies three numbers is as follows:

from decimal import *

value = list(map(Decimal,input().split()))

result = value[0]*value[1]*value[2]

print(abs(result))

Code explanation:

The code is written in python.

From the decimal module we have to import *. The decimal module incorporates a notion of significant places so that 1.3*1.2 = 1.56The variable value is used to store the list of the decimal inputThe variable result multiplies the three numbers in the list Finally we print the absolute value of the result.

learn more on python here: https://brainly.com/question/19175881

What are different method of selecting items??​

Answers

Answer:

Hold down the "Ctrl" key and the "Shift" key. Press the right arrow key to select the word to the right, or press the left arrow key to select the word to the left. Select one character at a time by holding down the "Shift" key and and using either arrow key (right or left).

Explanation:

follow= return follow

What are the revised version of water mill and horse cart

Answers

Answer:

A watermill or water mill is a mill that uses hydropower. It is a structure that uses a water wheel or water turbine

Explanation:

1. What is meant by data losing its value?

2. Explain what is meant by an automatic backup

3. Explain how phishing and pharming trick a user into giving up personal data

4. Explain how anti-virus software may help to prevent distributed denial of service attacks

5. Explain why computer security is more effective when anti-virus software end firewalls are used

6. Describe how a proxy server can help keep data safe

7. Explain the difference between symmetric and asymmetric encryption

8. Describe what a protocol is and how protocols help protect data

Answers

Explanation:

1.Data loss occurs when valuable or sensitive information on a computer is compromised due to theft, human error, viruses, malware, or power failure. It may also occur due to physical damage or mechanical failure or equipment of an edifice.

2.Automatic backup is a type of data backup model that requires little or no human intervention in backing up and storing data from a local network/system to a backup facility. Automating the backup process saves time and complexity required to manually back up a computer, network or IT environment.

3.A phishing attack is basically social engineering and identity theft that generally targets users with the aim to con them into revealing their personal and confidential information. In this technique, hackers send spoofed emails in the name of a legitimate source to victims and trick them into clicking on a malicious link or attachment to acquire their personal information. 

In many instances, these phishing scams use software or security vulnerabilities to install malicious software in the targeted user’s device. In any case, the human factor remains the key element in the successful phishing attempts of these cyber crooks. 

4.Equip your network, applications, and infrastructure with multi-level protection strategies. This may include prevention management systems that combine firewalls, VPN, anti-spam, content filtering and other security layers to monitor activities and identity traffic inconsistencies that may be symptoms of DDoS attacks.

5.While antivirus software helps to protect the file system against unwanted programs, a firewall helps to keep attackers or external threats from getting access to your system in the first place. Other threats travel from computer to computer without the knowledge of the user.

6.Proxy servers act as a firewall and web filter, provide shared network connections, and cache data to speed up common requests. A good proxy server keeps users and the internal network protected from the bad stuff that lives out in the wild internet.

7. The basic difference between these two types of encryption is that symmetric encryption uses one key for both encryption and decryption, and the asymmetric encryption uses public key for encryption and a private key for decryption.

8. A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design.

MARK ME BRAINLIEST!!!PLSSSSS

que cambios le harias a Chrome

Answers

Nada, porque em Chrome tiene todo los respuestas y Soluciones que necesitas.

time 20,36,48
answer please!!

Answers

Answer:

Pls subscribe my channel on yt

Name- CREATIVITY WITH MS

pls help me reach 500 subscribers

your subscription really matters

After subscribing pls make sure to comment also

I will give you 10 thanks and also if you have a channel I can subscribe it also

Write the pseudocode to this flowchart.

Answers

Answer:

I don't understand

Explanation:

a) Viết chương trình tính tổng từ 20 – 50

b) Viết chương trình tính tổng từ a – b, với a, b nhập từ bàn phím. Yêu cầu: a
không phải thông báo lỗi.

cứu tôi 2 câu này sài lệnh lặp

Answers

Answer:

Program viet_chuong_trinh_tinh_tong;

Uses Crt;

Var i,s:integer;

Begin

Clrscr;

i:=20;

While (i>=20) and (i<=50) do

Begin

s:=s+i;

i:=i+2;

End;

Writeln(S);

Readln;

End.

Explanation:

From her stack of photographs, Alice has to pick images that a photographer shot using the sports mode. Which images would she pick?

Answers

Answer:

1. horses

2. train/ metro

3. child

a simple C program to find the logarithm of any number in any base.....​

Answers

Answer:

tera bur mast hai jwjvszvVbzNjz

How can I fix this?

I’m on school Wi-Fi and “your connection isn’t private” keeps popping up every time I try to look up something, can someone please help!

Answers

Answer:

Try these

Reload page.

Clear Browsing Data.

Restart Router.

Avoid Incognito Mode.

Check Computer Date and Time.

Disable VPN.

Explanation:

What is mean by SEO?

Answers

Answer:

SEO = Search Engine Optimization

Answer:

Search Engine Optimization

Explanation:

Is the process used to optimize a website's technical configuration, content relevance and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, search engines rank them better.

Which wireless standard runs on both the 2.4 and 5 GHz frequencies?

Answers

Answer:

Approved in 2009, Wi-Fi 4 enables operation in both the 2.4 and 5 GHz frequencies, a game changer at the time. It was the first standard to use MIMO (Multiple In, Multiple Out) and offered better speed, 300 Mbps, better range, more resistance to interference and backward compatibility with Wi-Fi 2 and

Hope this is helpful to you.......

What allows an individual to avoid capital outlay?
paying cloud by the month
paying cloud by the year
paying cloud by the hour
paying cloud by the day

Answers

The daily payment for cloud services would be most reasonable. Hence option A is correct.

Capital Outlay refers to the expenditure or payment for the acquisition cost of capital assets.

In this case, the assets whose cost of purchase is being avoided by expenditure on cloud services is IT Server Hardware and Software which can be outsourced to companies that provide Cloud as a Service.

Cloud Services is the provision of Cloud computing services on a pay-per-use basis.

One of the advantages of this service is that it mostly consists of self-service on-demand. Hence, no need for the physical asset which usually is very costly.

Learn more about Capital Outlay in the link below:

https://brainly.com/question/832717

Could someone write the code for this in java? I cannot use java.util random(but i can use scanner). also, i cannot use switch or case.


Program Rock.java contains a skeleton for the game Rock, Paper, Scissors. Add statements to the program as indicated by the comments so that the program asks the user to enter a play, generates a random play for the computer, compares them and announces the winner (and why). For example, one run of your program might look like this:


Enter your play: R, P, or S


r


Computer play is S


Rock crushes scissors, you win!


Note that the user should be able to enter either upper or lower case r, p, and s. Add a loop to make sure the user only enters an R, P, or S. The user's play is stored as a string to make it easy to convert whatever is entered to upper case. Use if statements to convert the randomly generated integer for the computer's play to a string.


public class Rock


{


public static void main(String[] args)


{


String personPlay; //User's play -- "R", "P", or "S"


String computerPlay; //Computer's play -- "R", "P", or "S"


int computerInt; //Randomly generated number used to determine


//computer's play


// Add the code for each action beneath the comment. // more than one line may be needed in some cases // Get player's play -- note that this is stored as a string


// Make player's play uppercase for ease of comparison


// Generate computer's play (0,1,2) – use (int) (Math.random() * 3) to


// generate a random play


// Translate computer's randomly generated play to string // using mutually exclusive conditional statements


// Print computer's play


// See who won. Use nested ifs instead of &&.


}


}


People hardly ever play Rock, Paper, Scissors one game at a time. They play matches that are best 2 out of 3, best 3 out of 5, etc. Change your program to prompt the user for the odd number of games they want to play and use a loop to make sure it is an odd number. Then, add a loop to your program to play the game multiple times. Keep track of who wins, and make sure the loop stops when either the computer or the user has accumulated enough wins. Ties do not count in either the game total or the win totals – so a best 2 out of 3 match requires 3 games to be played where someone wins 2 times.

Answers

Program Rock.java contains a skeleton for the game Rock, Paper, Scissors. Open it and save it to your directory.

Add statements to the program as indicated by the comments so that the program asks the user to enter a play,

generates a random play for the computer, compares them and announces the winner (and why). For example, one run

of your program might look like this:

$ java Rock

Enter your play: R, P, or S

r

Computer play is S

Rock crushes scissors, you win!

Note that the user should be able to enter either upper or lower case r, p, and s. The user's play is stored as a

string to make it easy to convert whatever is entered to upper case. Use a switch statement to convert the randomly

generated integer for the computer's play to a string.*/

// ****************************************************************

// Rock.java

//

// Play Rock, Paper, Scissors with the user

//

// ****************************************************************

import java.util.Scanner;

import java.util.Random;

public class Rock

{

public static void main(String[] args)

{

String personPlay; //User's play -- "R", "P", or "S"

String computerPlay; //Computer's play -- "R", "P", or "S"

int computerInt; //Randomly generated number used to determine

//computer's play

Scanner scan = new Scanner(System.in);

Random generator = new Random();

System.out.println ("Enter R for Rock, P for Paper, S for Scissors: "); //Get player's play -- note that this is stored as a string

personPlay = scan.next();

personPlay = personPlay.toUpperCase();

computerInt = generator.nextInt(3);

switch (computerInt)

{

case 0:

{

computerPlay = "R";

break;

}

case 1:

{

computerPlay = "P";

break;

}

case 2:

{

computerPlay = "S";

break;

}

default:

{

computerPlay = "will not happen";

}

}

System.out.println ("Computer plays: " + computerPlay);

if (personPlay.equals(computerPlay))

{

System.out.println("It's a tie!");

}

else if (personPlay.equals("R"))

{

if (computerPlay.equals("S"))

System.out.println("Rock crushes scissors. You win!!");

else if (computerPlay.equals("P"))

System.out.println ("Paper eats rock. You lose!!");

}

else if (personPlay.equals("P"))

{

if (computerPlay.equals("S"))

System.out.println ("Scissor cuts paper. You lose!!");

else if (computerPlay.equals("R"))

System.out.println ("Paper eats rock. You win!!");

}

else if (personPlay.equals("S"))

{

if (computerPlay.equals("P"))

System.out.println ("Scissor cuts paper. You win!!");

else if (computerPlay.equals("R"))

System.out.println ("Rock breaks scissors. You lose!!");

}

else

{

System.out.println ("Invalid user input.");

}

}

}

// Enter R for Rock, P for Paper, S for Scissors:

// P

// Computer plays: P

// It's a tie!

Give an example (other than clothes) where the must-have feature could be APPEARANCE.​

Answers

Answer:

Assuming you are talking about UI or something graphical on a computer screen we'll just say the must-have features (in terms of appearance) are:

The UI/Web/Graphical Designers basic knowledge of color theory so they don't end up putting #0000FF text on a #FF0000 backgroundA good font (if there is text) that looks nice with the colors usedA proper aesthetic to the software (I.E. Spotify's green on black modern/techno aesthetic)

The design of mobile phones is an example of a must-have feature that is in appearance.

What are the features of appearance?

Features of appearance mean the visual qualities of an object or product.

Such as:

- Color

- Shape

- Texture

- Finish

- Branding

We have,

One example where the must-have feature could be appearance is in the mobile phones design

Many consumers prefer mobile phones that not only have the latest technology and features but also look sleek and stylish.

Companies invest heavily in the design of their mobile phones to make them visually appealing to consumers.

The appearance of the phone can often be a deciding factor in the purchasing decision, even if the phone has similar features to a competitor.

Thus,

The design of mobile phones is an example of a must-have feature that is in appearance.

Learn more about appearance here:

https://brainly.com/question/15851729

#SPJ2

If ADD = 81, BAD = 49, and CAD = 64, then what is the value of ACA?

Answers

Answer:

its 72

Explanation:

i know it because i did it and thats how i know it


[If you were the queen of the world .... What would you change ?]


Can anyone help me i want 5 slides powerpoint

Answers

Answer:

poverty and bad roads and help the needy

A computer uses
to follow a set of instructions

Answers

Answer:

A set of instructions that directs a computer's hardware to perform a task is called a program, or software program.

Answer:

which is called a program

Explanation:

is a formal document containing detailed information about the destruction of your
A
data.

Answers

Where is the formula

Which of these lines of code will generate a random number between 1 and 50? A. input("1-50") B. print("1-50") C. import random D. num = random.randint(1,50)

Answers

Answer:

D. num = random.randint(1,50)

Explanation:

The option given above will assign a random integer in the range of 1 through 50 to the variable number is: "number = random.randint(1, 50)"

What is a random integer in programming?

This is a random sequence of integers that may be used to imitate things like shuffling a deck of cards or creating distinct behaviors every time a program runs. The RND function in BASIC generates random numbers. This yields a value between 0 and 1.

Random number creation is a technique that generates a series of numbers or symbols that cannot be realistically anticipated better than by random chance, generally using a random number generator (RNG).

Therefore, The option given above will assign a random integer in the range of 1 through 50 to the variable number is: "number = random.randint(1, 50)"

Learn more about random integers:

brainly.com/question/15247918

#SPJ3

Which two wireless technologies are used in IoT?

Answers

Answer:

If you like my answer you can put me in brainlist.

Explanation:

LPWANs. Low Power Wide Area Networks (LPWANs) are the recent development specifically designed for the requirements for IoT. ...

Cellular (4G and 5G) ...

Zigbee and Other Mesh Protocols. ...

Bluetooth and BLE. ...

Wi-Fi. ...

RFID.

Hope this is helpful to you.....

Wifi and Bluetooth .

What is the difference between packaged and tailored software ​

Answers

Answer:

Packaged software is a collection of programs that perform similar functions or have similar features to meet various goals and objectives. e.g Microsoft Office While tailored software is software specially developed for some specific organisation or other user. e.g Amazon, Netflix.

state two advantage of using the internet

Answers

Answer:

Seemless communication with other parts of the world

Being able to share files easily

Explanation:

Answer:

communicate with family.

Able to get information from the internet.

True or False
User Interface brings together concepts from interface design, visual design, and information architecture.

Answers

Answer:

true

Explanation:

qqqqqqqqqqqqqqqqqqqq

The ________ join clause is based on all the columns in the two tables that have the same datatype. ​

Answers

The Natural join clause

write a function to swap two variables using a third variable ​

Answers

Answer:

Explanation:

Assign var1 value to a temp variable: temp = var1.

Assign var2 value to var1: var1 = var2.

Assign temp value to var2: var2 = temp.

three types of query​

Answers

It is commonly accepted that there are three different types of search queries:

Navigational search queries.

Informational search queries.

Transactional search queries.

a digital camera is an_____​

Answers

Answer:

A digital camera is a hardware device that takes photographs and stores the image as data on a memory card. Unlike an analog camera, which exposes film chemicals to light, a digital camera uses digital optical components to register the intensity and color of light, and converts it into pixel data.

Explanation:

its a hardware device.

Other Questions
Margie volunteered to supply heart-shaped sugar cookies for her third-grade class' Valentine's Day party. Her mom will use premade cookie dough in a tub and buy pink frosting and sprinkles, too. Margie would like to give one cookie to each of her 26 classmates. One tub of cookie dough makes 20 cookies and costs $9.95. The frosting will cover 30 cookies and costs $4.59. The package of sprinkles covers up to cookies 60 and costs $2.29. When Margie's sister, Nicole, hears about the cookies, she asks her mom if they can bake one cookie for each of the students in her class, too. Nicole is in fifth grade and she has 31 students in her class. How much will the ingredients cost for both of the classes? Im stuck on this question in art. could something help me? solve, y=8x-2, in order to put on a graph PLEASE HELP METhe Battles of Lexington and Concord were the first battles of the American Revolution, helping to convince the colonists that they could win the war.Question 9 options: True FalseQuestion 10 (1 point) The Battle of Saratoga is where the American forces at Valley Forge defeated British, convincing the French to support the war Question 10 options: True FalseThe Battle of Yorktown is where the American and French forces trapped the British, thus ending the Revolutionary War.Question 11 options: True FalseQuestion 12 (2 points) What were the advantages that the colonists had during the American Revolution. Select all of the correct answers!Question 12 options:they had better artillerymore experienced soldiersthey were more familiar with the landmore belief in their cause what's the sum of 14 12 8 6 help ur friend out would ya mate? Mark is a plumber. He charges $28 per job plus S20 per hour. If thetotal labor bill for a job was $58, how many hours did Mark work? de cinq cents millions in number form Sixth grade math please in K12Item 3Divide.5892 18327327 1/18327 1/3327 7/18 Help is apricated how did the Iraq war impact the united states The radius of a circle is 20 cm. Find its area in terms of . Trong th nghim v giao thoa sng trn mt nc gm hai ngun kt hp S1S2 cch nhau 15 cm vi dao ng vi tn s 30Hz. Tc truyn vng 48 cm/s.a. Tm khong cch gia hai cc i gn nhau nht.b Tm s im dao ng vi bin cc tiu gia S1S2.c. Trong vng giao thoa im M trn mi nht cch S1S2 ln lc cc khong MS1 =1,5 cm v MS2=7,9 cm. M l cc i hay cc tiu v l ng th bao nhiu so vi ng trung trc ca S1S2. Gip mnh gii vi mi ngi. Cm n rt nhiu Which shows the integers inorder from greatest to least?o) 8,-9,-10, 11p) -1, 48, -50, -97q) 23,0, -4,-52r) -63,-59,-16,0Pls answer asap Are the figures below similar? Explain.O A. Yes, there is a similarity transformation: translation, then rotation.OB. Yes, there is a similarity transformation: translation, then dilation.OC. No, there is not a similarity transformation between the figures.O D. Yes, there is a similarity transformation: translation, rotation, then dilation. Maureen is a lawyer who used to charge her clients $460 per hour. Maureen recently reconsidered her rates and ultimately decided to charge $414 per hour. What was the percent of decrease in the billing rate? compare the four ways of regulating the internet help!! giving brainliest PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS A cellphone charger has a transformer with 2000 turns in the primary coil which converts 240v a.c to 6v a.c and a rectifier that converts 6v a.c to 6v d.c. what do the letters a.c and d.c stand for?how many turns are in the secondary coil of the transformer