Using social media, such as text messages and status updates, has helped

users become more

o

A. wordy

O B. succinct

O C. formal

O D. slow

Answers

Answer 1

Answer:

succinct

Explanation:

it means to be brief or short, as most people who text or use social media like twitter have a limited character limit and want to make the most of it.


Related Questions

. Else-if is good selection statement that help us to solve problems in C++,mostly times same problem of same nature can also be solved via switch statement. Which one you prefer to use and why?

Answers

Answer:

Else-If statements

Explanation:

Personally, I prefer using Else-If statements for conditional statements since you can start with and If statement and add to it if necessary. Aside from this, Else-If statements also allow you to add more than one condition to be met by using tags such as and or and not. Switch statements are better in scenarios where you have a set of possible inputs or results and need a specific event to happen for each input/result, but this is not as common of a scenario so Else-If is usually my go-to conditional statement.

True or false: In relational databases, each individual space within a row or column contains exactly one value.

Answers

Answer:

True.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores. This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

A relational database can be defined as a type of database that is structured in a manner that there exists a relationship between its elements.

Hence, in relational databases, each individual space within a row or column contains exactly one value.

Which of the following terms best describes the product development life cycle process?
descriptive
iterative
Static
evaluative

Answers

Answer:

D

Explanation:

Evaluative

When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and frameworks

Answers

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

What is the difference between a programming language and natural (every-day) language?

Answers

Natural languages are used for communication between people

What is the BCC feature used for?

to format email message text in a custom font
to format email message text in a blind font
to send a courtesy copy of an email to someone who does not need to take action
to send an email to someone without revealing that person’s email address to others on the distribution list

Answers

Answer:

to send an email to someone without revealing that person’s email address to others on the distribution list

Explanation:

BAM

To send an email to someone without revealing that person’s email address to others on the distribution list.

What is BCC?

"Blind carbon copy" is referred to as BCC. BCC is a similar method to CC for forwarding copies of an email to additional recipients. When CC is used, a list of recipients is shown; when BCC is used, a list of recipients is not visible.

Because the other receivers won't be able to see that the email has been forwarded to another person, it is known as a blind carbon copy.

Carbon copy is referred to as a "CC" in email communication. When there was no internet or email, you had to sandwich a piece of carbon paper between the paper you were writing on and the paper you wanted to use as your copy in order to make a copy of the letter you were writing.

Therefore, To send an email to someone without revealing that person’s email address to others on the distribution list.

To learn more about BCC, refer to the link:

https://brainly.com/question/29398332

#SPJ6

discuss how sentiment analysis works using big data?

Answers

Answer:

sentiment analysis is the process of using text analytics to mine various of data for opinions. often sentiment analysis is done on the data that is collected from the internet & from various social media platforms.

please help me



Match the technology with the appropriate task.



1. graphics software

2. word processor

3. CAD

4. laptop

5. GPS​

Answers

Complete Question:

Match the technology with the appropriate task.

Column A

1. Graphics software

2. Word processor

3. CAD

4. Laptop

5. GPS

Column B

A. Create a company logo.

B. Get directions to a customer’s office.

C. Type a report.

D. Complete many types of tasks on a computer away from the office.

E. Design a building.

Answer:

1. A

2. C

3. E

4. D

5. B

Explanation:

1. Graphics software: it can be used to create a company logo. Some examples of software applications or programs are Adobe photoshop, Core-draw, illustrator etc.

2. Word processor: it is typically used for typing a text-based document. For instance, type a report. Some examples are notepad, Microsoft Word, etc.

3. CAD: design a building. CAD is an acronym for computer aided design used for designing the graphical representation of a building plan. An example is Auto-CAD.

4. Laptop: complete many types of tasks on a computer away from the office. A laptop is compact and movable, so it can be easily used in any location.

5. GPS: directions to a customer’s office. GPS is an acronym for global positioning system and it is typically used for locating points and directions of a place.

Answer:

1. A

2. C

3. E

4. D

5. B

What are the top ten famous games in the U.S.

Why? cause I wanna know :D

Answers

Minecraft

Fortnite

Rob.lox

GTA V

Rocket league

League of legends

Mario bros

GTA

Among us

Call Of Duty

please help me please help me.​

Answers

Answer:

dont know man thanks for points tho

but it is 209

Explanation:

The ______ clause allows us to select only those rows in the result relation of the ____ clause that satisfy a specified predicate.

Answers

Answer:

1. Where,

2. From

Explanation:

In SQL query language when working on a database, a user can use certain clauses to carry out some functions.

Hence, The WHERE clause allows us to select only those rows in the result relation of the FROM clause that satisfy a specified predicate.

This is because the "Where clause" selects the rows on a particular condition. While the "From clause" gives the relation which involves the operation.

Write a function called quadruple that quadruples a number and returns the result. Then make several calls to the quadruple function to test it out.

For example, if you made a call like

x = quadruple(3)
then x should hold the value 12.

Print the value of x to verify your function works correctly.

(CODEHS, PYTHON)

Answers

def quadruple(n):

   return n*4

print(quadruple(3))

print(quadruple(1))

print(quadruple(2))

I wrote my code in python 3.8. I hope this helps.

/kwɒdˈruː.pəl/ to increase by four times, or to multiply anything by four: In the past ten years, the college's enrolment has increased by a factor of four.

What is the role of quadruple that quadruples a number?

Finding the array's four maximum and four minimum components is another method for locating the quadruple with the highest product. And then supply the maximum of these three product values, which will result in a quadrupled maximum product.

When ordering a quadruple-shot latte, which contains four shots of espresso, you can also use the word quadruple to signify “four times as many.” The suffix quadric-, which means “four,” is the source of the Latin root quadruple, which means “create fourfold.”

Three address codes are also referred to as quadruples. Using pointers to entries in a symbol table as the operands and an enumerated type to represent the operations, quadruples can be accomplished.

Therefore, One operation and up to three operands are divided into four fields in a quadruple.

Learn more about quadruples here:

https://brainly.com/question/7966538

#SPJ2

How many minutes are there from 8:00 am to 1:00 pm?

Answers

Well it’s 5 hours so you take 5 times 60m for each hour and you get 300m

Answer:300 minutes

Explanation:

from 8 to 1 is 5 hours so you do 5*60= 300

Select all the correct answers. Which statement will print the output 10 + 20=30

a. System.out.println("10 + 20 =30" );
b. System.out.println(10 + 20 =30);
c. System.out.println(10 + 20 =""+ (10+20));
d. System.out.println("10 + 20" =10+20);
e. System.out.println(10 + 20 ="" +10 +20);

Answers

Answer:

a

Explanation:

b will print out a boolean, true, i think

c gives an error?? i think

d seems weird

e is weird too

anyway, b,c,d,e all have bad syntax

Answer:

a

Explanation:

Which 2 problems does the Pay down credit card workflow solve for clients? (Select all that apply) It helps clients stay on top of making payments on time It ensures that payments to credit card accounts are categorized correctly It provides a lower rate than most credit cards to qualified small businesses It uses language that non-accountants can understand

Answers

Answer:

B. It ensures that payments to credit card accounts are categorized correctly

D. It uses language that non-accountants can understand

Explanation:

Pay down credit card workflow is a new feature that makes entering records in QuickBooks easier for users. The two prime benefits of this workflow are;

1. It ensures that payments to credit card accounts are well categorized well. Without this feature, users most times find it difficult to enter records correctly or they tend to duplicate entries. This new feature obtains vital information that helps the software to correctly credit the accounts.

2. It uses language that non-accountants can understand. This simplifies the process and makes it easier for the user to enter the right data that would help the software to correctly credit the accounts.

Which are the steps in the process of creating a database

Answers

Answer:

Determine the purpose of your database. ...

Find and organize the information required. ...

Divide the information into tables. ...

Turn information items into columns. ...

Specify primary keys. ...

Set up the table relationships. ...

Refine your design. ...

Apply the normalization rules.

Answer:

identifying fieldnames in tables

defining data types for field names

Explanation:

sorry I'm late. future Plato users this is for you

Which of the following methods can be used to solve the knapsack problem?

a. Brute Force algorithm
b. Recursion
c. Dynamic programming
d. All of the mentioned

Answers

Answer: D. All of those mentioned

Explanation:

The knapsack problem is a problem that typically occurs in combinatorial optimization and is also a 2D dynamic programming example.

We should note that all the methods given in the option such as recursion, brute force algorithm and dynamic programming can all be used to solve knapsack problem.

Therefore, the correct answer is D.

java Elements in a range Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain fewer than 20 integers. That list is followed by two more integers representing lower and upper bounds of a range. Your program should output all integers from the list that are within that range (inclusive of the bounds). For coding simplicity, follow each output integer by a comma, even the last one. The output ends with a newline. Ex: If the input is: 5 25 51 0 200 33 0 50 then the output is: 25,0,33, (the bounds are 0-50, so 51 and 200 are out of range and thus not output). To achieve the above, first read the list of integers into an array.

Answers

Answer:

The program in Java is:

import java.util.Scanner;

public class MyClass {

   public static void main(String args[]) {

     Scanner input = new Scanner(System.in);

     int n;

     n = input.nextInt();

     int [] mylist = new int[n+1];

     mylist[0] = n;

     System.out.print("List elements: ");

     for(int i = 1;i<n+1;i++){

         mylist[i] = input.nextInt();

     }

     int min,max;

     System.out.print("Min & Max: ");

     min = input.nextInt();

     max = input.nextInt();

     

     for(int i=1; i < mylist.length; i++){

         if(mylist[i]>=min && mylist[i]<=max){

             System.out.print(mylist[i]+" ");

 }

}

   }

}

Explanation:

This line declares length of list

     int n;

This line gets length of list

     n = input.nextInt();

This line declares the list/array

     int [] mylist = new int[n+1];

This line initializes the element at index 0 to the length of the list

     mylist[0] = n;

This prompts user for elements of the list/array

     System.out.print("List elements: ");

The following iteration gets list elements

     for(int i = 1;i<n+1;i++){

         mylist[i] = input.nextInt();

     }

This declares the lower and upper bound (min, max)

     int min,max;

This line prompts user for elements of the list/array

     System.out.print("Min & Max: ");

This next two lines get the bound of the list/array

     min = input.nextInt();

     max = input.nextInt();

The following iteration prints the elements in the range

     for(int i=1; i < mylist.length; i++){

         if(mylist[i]>=min && mylist[i]<=max){

             System.out.print(mylist[i]+" ");

 }

}

NEED HELP WILL MARK BRAINLIEST AND 25 POINTS FOR ANSWER Xavier is using a query that includes a LIKE comparison operator with the value of A[a-n)" Which option would
match this operator?

Apple

Aaron

Assist

Azure

Answers

Answer:

This will match the name Aaron

Explanation:

Using square brackets around a range indicates that a single character within the range of the brackets can be match.

In something like the given example

WHERE name LIKE "A[a-n]"

It will match all names that start with a capital A, which is immediately followed by a lowercase a through n.

Which is an example of a technology that has changed the safety of humans?
A) a bicycle

B) a window

C) a rope

D) a baseball bat

Answers

Answer:

B

Explanation:

because they have added more protection from breaking window to keep people safe such as if there were a lot of layers of city

The illegal copying of program​

Answers

Answer:Software piracy

Explanation:

A counter is ?

A. used only outside of the loop

B. none of the above

C. a variable used in a loop to count the number of times an action is performed

D. A person with a pen and paper

Answers

Answer: In digital logic and computing, a counter is a device which stores (and sometimes displays) the number of times a particular event or process has occurred, often in relationship to a clock. The most common type is a sequential digital logic circuit with an input line called the clock and multiple output lines.

what security issues could result if a computer virus or malware modifies your host file in order to map a hostname to another IP address

Answers

Answer:

Man-in-the-middle attack

Explanation:

In this type of attack, the hacker uses the virus or malware to get and change his IP address and hostname to match the address and hostname of the target host computer. The allows the hacker to gain access to information sent to the target IP address first.

Fix the infinite loop so that it counts from 3 down to 1.public class Loop1{public static void main(String[] args){int x = 3;while (x > 0){System.out.println(x);}}}

Answers

Answer:

Include x-- right after the print statement

Explanation:

Given:

The above lines of code

Required

Edit to countdown from 3 to 1

The above code (as it is) prints 3 in infinite times. To make it countdown to 1, we simply include a decrement operation.

Initially, the value of x is 3: int x = 3;

And the condition is that the loop is to be repeated as long as x > 0

All we need to do is to include x-- right after the print statement.

This  operation will reduce the value of x on every iteration as long as the condition is true.

Hence, the complete code is:

public class Loop1{

   public static void main(String[] args){

       int x = 3;

       while (x > 0){

           System.out.println(x);

          x--;

       }}}

During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports?

Answers

Answer:

Following are the solution to the given question:

Explanation:

It sends commands to its Nmap executable platForm, which is used to specified and retrieves the production. The  ZenMap utilizes templates, which are primarily Nmap.

The parameter templates to decide how scans become formed Several ports, like ports, are available: 11, 21, 22, 25, 53, 445, and 3306, all of which run TCP: Linux services, SMTP Postfix, Apache Tomcat/Coyote JSP.

The _____ Tag surrounds all content that will be visible on your web page for all to users to see on that website.

Answers

Answer:

The body tag

Explanation:

HTML has several tags; however, the tag that handles the description in the question is the body tag.

It starts with the opening tag <body> and ends with closing tag </body>

i.e.

<body>

[Website content goes in here]

</body>

Any text, image, object etc. placed within this tag will be displayed in the website

Statistics are often calculated with varying amounts of input data. Write a program that takes any number of non-negative integers as input, and outpu

Answers

Answer:

Explanation:

The following program is written in Java and is a function that asks the user for an input and keeps doing so until a negative value is entered, in which case it calculates the average and max values and prints it to the screen.

public static void average () {

                       int num;

                       int sum = 0;

                       Scanner in = new Scanner(System.in);

                       System.out.println("Enter Number");

                       num = in.nextInt();

                       int count = 0;

                       int max = 0;

                       while(num >= 0)

                       {

                               sum+=num;

                               System.out.println("Enter Number");

                               num = in.nextInt();

                               count++;

                               if(num>=max){

                                       max = num;

                               }

                       }

               System.out.println(sum/count);

               System.out.println(max);

               }

Answer:hi

Explanation:

The distance a vehicle travels can be calculated as follows: distance = speed * time For example: If a train travels 40 miles per hour for 3 hours, the distance traveled is 120 miles.Write a program that asks the user for the speed of a vehicle (in miles per hour) and how many hours it has traveled. The program should use a loop to display the distance the vehicle has traveled for each hour of the time period.

Answers

Answer:

In Python:

speed = float(input("Speed: (mile/hr): "))

time = int(input("Time: (hr): "))

for hour in range(1,time+1):

    distance = speed * hour

    print("Distance: "+str(speed)+"*"+str(hour)+" = "+str(distance))

Explanation:

This prompts the user for speed in mile/hr

speed = float(input("Speed: (mile/hr): "))

This prompts the user for time in hr

time = int(input("Time: (hr): "))

This iterates through the input time

for hour in range(1,time+1):

This calculates the distance covered in each hour

    distance = speed * hour

This prints the distance covered in each hour

    print("Distance: "+str(speed)+"*"+str(hour)+" = "+str(distance))

What will the output of the statements below? System.out.println(9%2); System.out.println(12%6); The output of the first statement is * The output of the second statement is​

Answers

Answer:

You get Exact 30 print of that sentence on a comadore 64

Explanation:

Just simple basic science. hope this helps

Identify and give the application of the following operators.

(a) / (b) //​

Answers

Answer:

This answer depends on what language you're using, but in most languages, "//" is used to precede a one-line remark. "/" is used to divide a number by the other.  For example:

// this is a remark

var foo = x / y;

There are exceptions to both, although the / is almost universally used for division.  One exception would be assembly of course, I don't know if there are any higher level languages that don't use the slash.

Other Questions
It is estimated that 26% of the population of Gingerland have red hair. If 10 residents are chosen at random, what is the probability that... (assume each person is independent)a) exactly 4 of them have red hair?b) less than 5 of them have red hair?c) at least one of them has red hair?d) What is the expected (mean) number of people you will find with red hair in this group of 10? A different bullet has a mass of 0.09 kg. Starting from rest, after its gun's trigger is pulled, a constant force acts on the bullet for the next 0.025 seconds until the bullet leaves the barrel of the gun with a speed of 1,346 m/s. What force acts on this bullet? HELP ME PLEASEEEEEEEEEEEE Lieutenant Patrick O'Bannon defeated the Pasha of Tripoli at ___.ItalyWeehawkenEgyptNew OrleansDerna the captain the chief mate the chief engineer walk around the deck of the ship it takes 4 minutes to the captain to circle the deck of the ship chief mate takes 5 minutes chief engineer takes 6 minutes how many minutes will they meet again at starting point What can potentially happen if you use " non tactile" or non- descriptive language in your writing? Briefly describe the battle of Bunker Hill and what two things did the battle prove. (2) si le digo que(4), no(3)- (7) y,Asunto: ConsejosQuerida madre desesperada:Yo tambin tengo un hijo adolescente y por eso creo quecuenta de cul es su problema. Pienso que no(1)su hijo, como el mo, tiene malos hbitos: estoy segura de quetarde por la maana, no(6) con ropa apropiada para ir a la escuela. Tambin dice Ud.(5) y noque su hijo a veces no va a la escuela y estoy segura de quepor eso, prefiere ir al parque, donde(8) con sus amigos. Tambinme imagino que Ud.(9) triste cuando su hijo no quiere hablarespaol porque Ud. cree que l puede perder parte de su cultura. Pero el noquiere ser diferente de los otros adolescentes, es decir,ser como los chicos de su edad y para l, eso significa, lamentablemente, nohablar espaol.Nosotras, como madres,(11) por la apariencia fisica y elcomportamiento de nuestros hijos, y les decimos que deben hacer. Pero ellos(12) de los consejos que les damos y en parte tienen razn,(13) cuenta de que necesitan ser un poco msabuseatelitarsedarsedespertarsedivertirseequivocarsepeinarsepreocuparsesentirsevestirse(10) pordarsepreocuparsequejarsepues creo que noindependientes.enojarsesentarseCreo que Uds. deben(14) y hablar para poder negociar qu esaceptable e inaceptable para un adolescente. Por ejemplo, Ud. debe prometerhablarle en ingls delante de sus amigos y l debe intentar usar espaol encasa cuando habla con Ud. Pero intente no(15) con su hijo;escchelo, y creo que la situacin va a mejorar en su hogar.Le deseo mucha suerte, Solve for x.-1+4x5= 3 What is Y=3x^2+6x+10 in vertex form. how to complete tanya tiene el pello Which factor most contributed to the United States becoming a mor multicultural society during the late 1700s and early 1800s. In which direction must the graph of f(x) = |x| be shifted to produce the graph of g(x) = |x 3|?A. leftB. downC. upD. right Which of the following sentences uses the comma correctly? What would you, like to do today, Kristoff? What would, you, like to do today Kristoff? What would you like to do today, Kristoff? What would you like to do, today Kristoff? What do you guys think of this drawing I made of Talltail/Tallstar from Warrior cats? Solve for x. show work. 8+b/-4=5 what is 1/4 of 12 pleas i need help which best dfines the southern code during the slavery era The sum of two integers is 5. Their difference is 11. What arethe two integers?A) 3 and 14B) -3 and 8C)2 and 3D) -14 and - 3 ANSWER ASAPP!!! How did students' behavior change overthe course of the exercise?A )"Superior" students stayed the same,while "inferior" students became shyerand less willing to speak in class.B ) "Superior" students became moreconfident and unfriendly, while"inferior" students became moreyielding and distant.C ) All of the students became hostile andunfriendly toward each other.regardless of which group theybelonged to.D ) All of the students accepted theexercise at first, but the "inferior"students refused to participate in theexercise on the second day.