Answer:
The pseudocode is as follows:
Input Qty
Discount = 0%
If Qty>= 100:
Discount = 15%
Print Discount
Explanation:
This gets the quantity of bags
Input Qty
This initializes the discount percentage to 0%
Discount = 0%
This checks if the quantity is greater than or equal to 100.
If Qty>= 100:
If true, the discount percentage is set to 15%
Discount = 15%
This prints the calculated discount percentage
Print Discount
See attachment for flowchart
Can a 64-bit client communicate with a 32-bit database server?
In Power Center, a 64-bit Oracle database client and a 32-bit client can both connect to a 64-bit database server.
Explain about the Power Center?Power centers are sizable outdoor shopping malls that typically house three or more big-box retailers. Smaller shops and eateries that are free-standing or positioned in strip malls and encircled by a shared parking lot can be found among the more establishments in a power center.
Informatica Excellent GUIs are available for Power Center's administration, ETL design, and other functionality. It also has access to a variety of data sources, including relational data, mainframe data, data from third parties, and so forth.
Power Center is an enterprise data integration platform for the cloud that supports enterprises across the data integration life cycle. Users of the platform may control data integration projects, enterprise scalability, operational confidence, and data integration agility.
To learn more about Power Center refer to:
https://brainly.com/question/24858512
#SPJ4
Develop a program working as a soda vending machine. The program should show the product menu with price and take user input for product number, quantity and pay amount. The output should show the total sale price including tax and the change. Organize the program with 4 functions and call them in main() based on the requirements.
Answer:
Explanation:
The following vending machine program is written in Python. It creates various functions to checkItems, check cash, check stock, calculate refund etc. It calls all the necessary functions inside the main() function. The output can be seen in the attached picture below.
class Item:
def __init__(self, name, price, stock):
self.name = name
self.price = price
self.stock = stock
def updateStock(self, stock):
self.stock = stock
def buyFromStock(self):
if self.stock == 0:
# raise not item exception
pass
self.stock -= 1
class VendingMachine:
def __init__(self):
self.amount = 0
self.items = []
def addItem(self, item):
self.items.append(item)
def showItems(self):
print('Items in Vending Machine \n----------------')
for item in self.items:
if item.stock == 0:
self.items.remove(item)
for item in self.items:
print(item.name, item.price)
print('----------------\n')
def addCash(self, money):
self.amount = self.amount + money
def buyItem(self, item):
if self.amount < item.price:
print('You can\'t but this item. Insert more coins.')
else:
self.amount -= item.price
item.buyFromStock()
print('You chose ' +item.name)
print('Cash remaining: ' + str(self.amount))
def containsItem(self, wanted):
ret = False
for item in self.items:
if item.name == wanted:
ret = True
break
return ret
def getItem(self, wanted):
ret = None
for item in self.items:
if item.name == wanted:
ret = item
break
return ret
def insertAmountForItem(self, item):
price = item.price
while self.amount < price:
self.amount = self.amount + float(input('insert ' + str(price - self.amount) + ': '))
def calcRefund(self):
if self.amount > 0:
print(self.amount + " refunded.")
self.amount = 0
print('Thank you!\n')
def main():
machine = VendingMachine()
item1 = Item('Kit Kat', 1.5, 2)
item2 = Item('Potato Chips', 1.75, 1)
item3 = Item('Snickers', 2.0, 3)
item4 = Item('Gum', 0.50, 1)
item5 = Item('Doritos',0.75, 3)
machine.addItem(item1)
machine.addItem(item2)
machine.addItem(item3)
machine.addItem(item4)
machine.addItem(item5)
print('Welcome!\n----------------')
continueBuying = True
while continueBuying == True:
machine.showItems()
selected = input('select item: ')
if machine.containsItem(selected):
item = machine.getItem(selected)
machine.insertAmountForItem(item)
machine.buyItem(item)
a = input('buy something else? (y/n): ')
if a == 'n':
continueBuying = False
machine.calcRefund()
else:
continue
else:
print('Item not available. Select another item.')
continue
if __name__ == "__main__":
main()
100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.
I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :
- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9
I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?
Help is very much appreciated. Thank you for your time!
Answer: 266299 669922 292629 969622 Also just saying did you backup your files to the cloud? If not you can buy a usb-c flash drive or a lighting cable flashdrive. Best Luck.
Explanation:
The information technology (IT) department of a real-estate group cosponsored a data warehouse with a County governement. In the formal proposal written by the IT team, costs were estimated at 8,000,000/- the project’s duration was estimated to be eight months, and the responsibility for funding was defined as the business unit’s. The IT department proceeded with the project before it even knew if the project had been accepted. The project actually lasted two years because requirements gathering took nine months instead of one and a half, the planned user base grew from 200 to 2,500, and the approval process to buy technology for the project took a year. Three weeks before technical delivery, the IT director canceled the project. This failed endeavor cost the organization and taxpayers 25,000,000/-.
Why did this system fail?
Why would a company spend money and time on a project and then cancel it?
What could have been done to prevent this?
What do we call a statement that displays the result of computations on the screen?
O A. result statement
OB.
O C.
O D.
OE.
screen statement
output statement
answer statement
input statement
Result statement call a statement that displays the result of computations on the screen.
Thus, Results statements a statement listing the syllabuses taken and the grades given for each candidate. Results statements are printed on stationary with a watermark in full color.
The qualifications and syllabi grades displayed in each statement are explained in the explanatory notes. Results broken down by choice, component, and curriculum for teaching staff.
A summary of all the results for your applicants is provided in the results broadsheet for teaching staff. A summary of the moderation adjustments for each internally assessed component is included in the moderation adjustment summary reports for teaching staff.
Report on the moderation for each internally assessed component for instructional personnel, where appropriate.
Thus, Result statement call a statement that displays the result of computations on the screen.
Learn more about Result statement, refer to the link:
https://brainly.com/question/26141085
#SPJ1
describe usage about hand geometry biometric?
Biometrics for hand geometry recognition are less obvious than those for fingerprint or face recognition. Despite this, it is nevertheless applicable in numerous time/attendance and physical access applications.
What is Hand geometry biometric?The concept that each person's hand geometry is distinct is the foundation of hand geometry recognition biometrics.
There is no documented proof that a person's hand geometry is unique, but given the likelihood of anatomical structure variance across a group of people, hand geometry can be regarded as a physiological trait of humans that can be used to distinguish one person from another.
David Sidlauskas first proposed the idea of hand geometry recognition in 1985, the year after the world's first hand geometry recognition device was commercially released.
Therefore, Biometrics for hand geometry recognition are less obvious than those for fingerprint or face recognition. Despite this, it is nevertheless applicable in numerous time/attendance and physical access applications.
To learn more about Hand geometry biometric, refer to the link:
https://brainly.com/question/12906978
#SPJ9
Drag each tile to the correct box.
Match the job title to its primary function.
computer system engineer
online help desk technician
document management specialist
design and implement systems for data storage
data scientist
analyze unstructured, complex information to find patterns
implement solutions for high-level technology issues
provide remote support to users
The correct match for each job title to its primary function:
Computer System Engineer: Design and implement systems for data storage.
Online Help Desk Technician: Provide remote support to users.
Document Management Specialist: Implement solutions for high-level technology issues.
Data Scientist: Analyze unstructured, complex information to find patterns.
Who is a System Engineer?The key responsibility of a computer system engineer is to develop and execute data storage systems. Their main concentration is on developing dependable and effective storage options that fulfill the company's requirements.
The primary duty of an online help desk specialist is to offer remote assistance to users, addressing their technical concerns and resolving troubleshooting queries.
The main responsibility of a specialist in document management is to introduce effective measures to address intricate technological matters pertaining to document security, organization, and retrieval.
Read more about data scientists here:
https://brainly.com/question/13104055
#SPJ1
PLEASE FILL IN THE BLANK
With a bit depth of __ I can support 8 grayscale variations of black and white images.
Answer: Thre correct answer is 3 bit
Explanation:
Using binary, a 3-bit value can support 8 variations in grayscale:
1 000
2 001
3 010
4 011
5 100
6 101
7 110
8 111
Which of the following would be used to communicate a high level description of a major change
A Change Proposal would be used to communicate a high-level description of a major change that involved significant cost and risk to the organization. Thus option D is correct.
What are a cost and risks?The price of mitigating risk and suffering losses. The sum of all costs associated with a firm's activities that are linked to risk, such as retention costs and associated less any charges
To convey a high-level summary of a patch, utilize a change proposal. Typically, the service portfolio method produces this encouragement and inspiration, which is then forwarded to deal with different situations for approval.
Therefore, option D is the correct option.
Learn more about cost and risks, Here:
https://brainly.com/question/2149007
#SPJ1
The question is incomplete, the complete question will be :
Which of the following would be used to communicate a high-level description of a major change that involved significant cost and risk to the organization?
1) Service Request
2) Change Policy
3) Risk Register
4) Change Proposal
Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.
Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.
Writting the code:Assume the variable s is a String
and index is an int
an if-else statement that assigns 100 to index
if the value of s would come between "mortgage" and "mortuary" in the dictionary
Otherwise, assign 0 to index
is
if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)
{
index = 100;
}
else
{
index = 0;
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
David Karp is credited with the invention of which microblogging service?
Answer:
On February 19, 2007, the first version of the Tumblr microblogging service was founded by David Karp and Marco Arment. They launched a more complete version in April 2007.
Explanation:
More than 100 million blogs will be online in 2007. The count continues to double every 5.5 months. About half of the blogs created are ever maintained after being created. And fewer than 15% of blogs are updated at least once a week. (Technorati)
….Yeah, it’s still a blog. But it’s a new philosophy. It’s free of noise, requirements, and commitments. And it’s finally here.
let me know if that is good enough
Advanced airbag systems are being introduced thatgroup of answer choices a. protect both front-seat and back-seat passengers. b. have sensors that respond to crash severity. c. are voice-activated. d. all answer choices are correct.
Advanced airbag systems are being introduced so that option D all answer choices are correct.
Advanced Airbag Systems:
Advanced front airbags, also known as dual stage airbags, were the next generation system. Depending on the situation, we can decide whether you need to use, reduced power, or not use it at all. According to NHTSA, advanced airbags are designed to minimize the risk of injury for children and small adults.
Airbags are a big part of this trend. According to the National Highway Traffic Safety Administration (NHTSA), frontal airbags reduce driver fatalities by 29% and passenger fatalities by 32% in frontal collisions. If we look at a new car today, we will see that there are different types of airbags, such as front airbags, side torso airbags, and side airbags. Some vehicles are also equipped with rear airbags.
In the near future, there will be further development of 'active safety' such as: Pre-collision and lane departure warning systems to avoid accidents, rather than "passive safety" such as airbags and crumple zones that minimize injuries in an accident.
Sensors, processing and "by-wire" technology have advanced very rapidly in recent years, says John Hanson, his manager at Toyota's National in charge of Advanced Technology Business Communications. This will enable manufacturers to develop a range of high-level driver assistance features to improve accident avoidance and mitigation, he said.
Looking ahead, automakers will start incorporating predictive sensors that work in airbags, says Zuby. “Airbags could deploy just before a crash and take even less energy than they do today,” he says. This can further reduce injuries from airbag deployment.
Learn more about Advanced Airbag Systems here:
brainly.com/question/29775381
#SPJ4
Which core business etiquette is missing in Jane
Answer:
As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:
Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.
Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.
Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.
Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.
Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.
It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.
The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least
The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least 65 percent transfer efficiency.
What is the transfer efficiency
EPA lacks transfer efficiency requirement for auto refinishing spray guns. The EPA regulates auto refinishing emissions and impact with rules. NESHAP regulates paint stripping and coating operations for air pollutants.
This rule limits VOCs and HAPs emissions in automotive refinishing. When it comes to reducing overspray and minimizing wasted paint or coating material, transfer efficiency is crucial. "More efficiency, less waste with higher transfer rate."
Learn more about transfer efficiency from
https://brainly.com/question/29355652
#SPJ1
Which two disciplines should you study if you are considering a career in robotics 
The use of robotics is a “multi-purpose” (i.e., combining computer engineering with mechanical engineering and electrical engineering).
If one wants to work as a robotics software engineer, he needs to have a bachelor’s degree in Computer Science. If a person is interested in designing robotic parts, he needs a degree in Mechanical Engineering or Electrical Engineering.
Since its beginning, robotics has always been a multidisciplinary discipline, combining engineering, cognitive sciences, computer science, and, in recent years, social science and humanities.
To learn more about engineering, refer to the link:
https://brainly.com/question/31140236
#SPJ1
suppose you have a language with only the three letters a; b; c, and they occur with frequencies .9, .09, and .01, respectively. the ciphertext bcccbcbcbc was encrypted by the vigen`ere method (shifts are mod 3, not mod 26). find the plaintext (note: the plaintext is not a meaningful english message.)
The correct answer is One letter in the ciphertext corresponds to several letters in the plaintext; a character appears in a language. makes frequency analysis more effective...
Cipher, by definition, is an algorithm that transforms plain text into ciphertext. It is the unintelligible result of a cryptographic method. Ciphertext can also sometimes be referred to by the word "cypher." It takes a key to translate ciphertext into plain text before it can be deciphered. The output of encryption techniques, often known as cyphers, is ciphertext. When a person or device lacking the cypher cannot read the data, the data is said to be encrypted. To decode the data, they or it would require the cypher. By the kind of input data, cyphers can be divided into two categories: block cyphers, which encrypt blocks of data with a set size, and stream cyphers, which encrypt streams of data continuously.
To learn more about ciphertext click on the link below:
brainly.com/question/30143645
#SPJ4
If you were to sort the Title field in tblBooks in a Descending order, in ms access which author would be at the top of the list? A. Linda Rode B. Robert Howard C.Isaac Asimov D. Roger D. Abrahams
If the Title field in the tblBooks table is sorted in descending order in MS Access, the author at the top of the list would be Linda Rode. So, the correct option is A.
Sorting the Title field in descending order means arranging the titles in reverse alphabetical order.
Out of the given authors, Linda Rode would be at the top of the list because her last name, "Rode," comes first alphabetically when compared to the other authors' last names. The other authors' last names are Howard, Asimov, and Abrahams.When sorting in descending order, the records are listed from Z to A or highest to lowest, depending on the sorting field. In this case, since we are sorting the Title field, which is a text field, the sorting would be in reverse alphabetical order.Therefore, Linda Rode, with her last name starting with "R," would appear at the top of the list. So, the correct choice is option A.
For more questions on author
https://brainly.com/question/32116759
#SPJ8
To calculate the difference of any two numbers
Answer:
To calculate the difference of any two numbers we use a sign which is minus " - " to find the difference we place the greater number first and the smaller number after the minus sign
like if we want to find difference between 3 and 5
we will put the greater number 5 before the minus and 3 which is the smaller number after the minus
5 - 3
so we will get the result 2
1. Write a python program that uses the following initializer list to find if a random value entered by a user is part of that list. V = [54, 80, 64, 90, 27, 88, 48, 66, 30, 11, 55, 45] The program should ask the user to enter a value. If the value is in the list, the program should print a message that contains the index. If it is not in the list, the program should print a message containing -1. Hint: The values in the list are integers, so you should also get the value from the user an integer. We can assume the user will only enter integer values. Sample Run Search for: 64 64 was found at index 2
Suppose we define a WaitlistEntry as follows:
typedef struct{
int iPriority; /* Priority of the student to be enrolled */
int iStudentID; /* ID of the student */
}
WaitlistEntry;
Below are different implements of a function to create a WaitlistEntry from given iPriority and iStudentID data. Some of these implementations are flawed. Identify them and describe what is wrong with them briefly:
WaitlistEntry createWL( int iPriority, int iStudentlD )
WaitlistEntry w,
w.iPriority iPriority;
w.iStudentlD iStudentlD;
return w;
a. correct
b. incorrect, leaks memory
c. incorrect, syntax error
d. incorrect, data will be overwritten by next function call
Answer:
You have syntax errors, but I don't know if it happened when you posted this question, nevertheless
Explanation:
Correct code:
WaitlistEntry createWL( int iPriority, int iStudentID ) { // Opening Brace
WaitlistEntry w; // Should be ; not ,
w.iPriority = iPriority; // Assign Missing
w.iStudentID = iStudentID; // Assign Missing
return w;
} // Closing Brace
// Also note: iStudentID this actually has an 'l' which is LD. Not ID, this is why I assume these errors happened when posting the question.
Please help ASAP!
Combined with a set number of steps to determine size, what number of degrees would you use for turn degrees to command a sprite to trace a triangle with three equal sides?
A. 90, 90
B. 45, 45
C. 90, 180
D. 120, 120
Answer:
GIVE this man Brainliest!
Explanation:
Assignment 10 - 1/0 Streams and Files Create a C++ a program that will compute the average word length (average number of characters per word) for a text file. The text file should be chosen by the user when the program is executed. • a blank space • a comma • a period • the beginning of a line • or the end of a line Your program should define a function that is called with the input-file stream as an argument. This function should also work with the stream cin as the input stream, although the function will not be called with cin as an argument in this program. Use the following text as a test for your program. Create a separate text file and paste the following paragraph into that file. Seeing, now, that there were no curtains to the win dow, and that the street being very narrow, the house opposite comman ded a plain view into the room, and observing more and more the inde corous figure that Queequeg made, staving about with little else but h is hat and boots on; I begged him as well as I could, to accelerate his toilet somewhat, and particularly to get into his pantaloons as soon as possible. He complied, and then proceeded to wash himself. At th at time in the morning any Christian would have washed his face; b ut Queequeq, to my Use the following text as a test for your program. Create a separate text file and paste the following paragraph into that file. Seeing, now, that there were no curtains to the win dow, and that the street being very narrow, the house opposite comman ded a plain view into the room, and observing more and more the inde corous figure that Queequeg made, staving about with little else but h is hat and boots on; I begged him as well as I could, to accelerate his toilet somewhat, and particularly to get into his pantaloons as soon as possible. He complied, and then proceeded to wash himself. At th at time in the morning any Christian would have washed his face; b ut Queequeg, to my amazement, contented himself with restricting his a blutions to his chest, arms, and hands. He then donned his waistcoa t, and taking up a piece of hard soap on the wash-stand centre table, dipped it into water and commenced lathering his face. I was watching to see where he kept his razor, when lo and behold, he takes the harpoon from the bed corner, slips out the long wooden stock, unsheathes the head, whets it a little on his boot, and striding up to the bit of mirror against the wall, begins a vigorous scraping, or rather harpoon ing of his cheeks. Thinks I, Queequeg, this is using Rogers's best cut lery with a vengeance. Afterwards I wondered the less at this o peration when I came to know of what fine steel the head of a harpoon is made, and how exceedingly sharp the long straight edges are alway s kept.
Answer:
dgvky
Explanation:
Which of the following methods of using PHP to connect to a MySQL database only provides an object-oriented interface?mysql extensionmysqli extensionPDO MySQL driver extensionnone of these
Answer:
PDO MySQL driver extension
Explanation:
which statements are true? Select 4 options. Responses A function can have no parameters. A function can have no parameters. A function can have a numeric parameter. A function can have a numeric parameter. A function can have only one parameter. A function can have only one parameter. A function can have a string parameter. A function can have a string parameter. A function can have many parameters. A function can have many parameters.
Answer:
A function can have a numeric parameter.
A function can have many parameters.
A function can have only one parameter.
A function can have a string parameter.
Explanation:
The____ feature in the Camera Raw dialog box can be used to bring out any deep colors in an image.
Answer: elg
Explanation:
A client has the right to receive ethically conducted research. Discuss this statement with examples.
A client has the right to receive ethically conducted research. This means that the researcher should adhere to the principles of scientific research, which includes honesty, objectivity, integrity, and respect for human subjects. In addition, the researcher should ensure that the research is conducted in a safe and responsible manner.
What is research?
Research is defined as "creative and methodical activity done to improve the body of knowledge." It entails the objective gathering, organising, and analysis of data in order to improve comprehension of a subject or issue. A research effort could build on prior contributions to the field. Research may duplicate portions of earlier projects or the project as a complete to verify the accuracy of instruments, processes, or experiments.
Documentation, discovery, interpretation, as well as the research and development (R&D) of methods & systems again for advancement of human knowledge are the main goals of basic research (as opposed to applied research). Research methodologies are based on epistemologies, which differ greatly within and between the humanities and sciences.
To learn more about research
https://brainly.com/question/25257437
#SPJ13
Given integer variables seedVal, smallestVal, and greatestVal, output a winning lottery ticket consisting of three random numbers in the range of smallestVal to greatestVal inclusive. End each output with a newline.
Ex: If smallestVal is 30 and greatestVal is 80, then one possible output is:
65
61
41
how do i code this in c++?
Answer:
Explanation:
Here's an example code in C++ that generates a winning lottery ticket consisting of three random numbers in the range of smallestVal to greatestVal:
#include <iostream>
#include <cstdlib>
#include <ctime>
using namespace std;
int main() {
int seedVal, smallestVal, greatestVal;
cout << "Enter seed value: ";
cin >> seedVal;
cout << "Enter smallest value: ";
cin >> smallestVal;
cout << "Enter greatest value: ";
cin >> greatestVal;
// Seed the random number generator with the user-input seed value
srand(seedVal);
// Generate three random numbers in the range of smallestVal to greatestVal
int lottery1 = rand() % (greatestVal - smallestVal + 1) + smallestVal;
int lottery2 = rand() % (greatestVal - smallestVal + 1) + smallestVal;
int lottery3 = rand() % (greatestVal - smallestVal + 1) + smallestVal;
// Output the winning lottery ticket
cout << lottery1 << endl;
cout << lottery2 << endl;
cout << lottery3 << endl;
return 0;
}
This code prompts the user to enter a seed value, the smallest and greatest values for the range of the lottery numbers. It then seeds the random number generator with the user-input seed value, generates three random numbers using rand() % (greatestVal - smallestVal + 1) + smallestVal to ensure the numbers fall within the range of smallestVal to greatestVal, and outputs the results on separate lines with a newline character.
a really excellent way of getting you started on setting up a workbook to perform a useful function.
Templates a really excellent way of getting you started on setting up a workbook to perform a useful function.
What is the workbook about?One excellent way to get started on setting up a workbook to perform a useful function is to begin by defining the problem you are trying to solve or the goal you want to achieve. This will help you determine the necessary inputs, outputs, and calculations required to accomplish your objective.
Once you have a clear understanding of your goal, you can start designing your workbook by creating a plan and organizing your data into logical categories.
Next, you can start building the necessary formulas and functions to perform the required calculations and operations. This might involve using built-in functions such as SUM, AVERAGE, or IF, or creating custom formulas to perform more complex calculations.
Read more about workbook here:
https://brainly.com/question/27960083
#SPJ1
Help plz
Which of the following statements are true about cyberbullying:
1. Cyberbullying uses electronic communication to bully a person.
11. Cyberbullying is a crime in many states.
III. Instances of cyberbullying do not affect the digital footprint of the victim.
IV. Cyberbullying hurts real people even though we can't always see their reactions
online.
I and IV
O ll and III
O 1, 11, and IV
All of the above
The following statements are true about cyberbullying: Cyberbullying uses electronic communication to bully a person. Cyberbullying hurts real people even though we can't always see their reactions.
What is cyberbullying?The use of mobile phones, instant messaging, e-mail or social networking sites to intimidate or harass someone is known as cyberbullying.
The correct answer is "I and IV." Statement I is true because cyberbullying is defined as using electronic communication to bully a person.
Statement IV is also true because even though we may not be able to see the victim's reactions online, cyberbullying can still have real-life consequences and can hurt the victim emotionally or mentally.
Statement II is false because cyberbullying is a crime in many states, and statement III is also false because instances of cyberbullying can affect the victim's digital footprint.
Hence, the correct statements are "I and IV".
To learn more about cyberbullying click here:
https://brainly.com/question/8142675
#SPJ2
3. Based on the code you created in this Unit, propose a way to re-use most of the code
(with different information in the variables like "city" and "rates) for a part of a similar app
that isn't related to parking at all. The app can be small-scale or large scale, but should be clearly connected to the code you’ve writted (you can defend your proposal if the connection is not immediately obvious).
One possible way to reuse the code for a similar app is to modify it for a hotel booking system. Instead of parking rates for different cities, the modified app could display room rates for different hotels in various cities.
The basic structure of the code can be kept the same, with adjustments made to the variable names, input fields, and calculations. The "city" variable can be replaced with a "hotel" variable, and the "rates" variable can be replaced with a "room rates" variable.
The user input can be modified to ask for the desired hotel and room type, and the app can display the available room rates for that selection.
To learn more about the booking system, follow the link:
https://brainly.com/question/28315659
#SPJ1