How can internet affect business area? 


Answers

Answer 1
The communication between customers and businesses increases customer satisfaction and businesses are able to connect to the customers. it lets businesses go further to expand their service or product which can increases profit.

Related Questions

how to find radius of the base examples ​

Answers

Answer:radius is half the diameter

Explanation:

How do I create a videogame

Answers

Answer:

-Learn how to code

-Make Character

-Design

-Go to classes

-Go on video game platforms and make an video game(rblx is the best in my opinion)

-Play video games and see the scripts

-Decide what type of video game your making(horror, family game, battle game, etc.)

Explanation:

Answer:

By using programming languages such as Lua And JavaScript because they are the best for programming videogames

What is the first thing animators need to determine when beginning a project?



a Editing locations



b Length of the film or project



c Setting



d Characters

Answers

Answer:c

Explanation:

If you had three extra siblings, what would be your birth order and what personalities would you like them to have?

Answers

Answer:

mixed personalities l

that will be cool

Answer:

I already have 4 step brothers, 2 real brothers, 1 step sister, and a half sister, so 3 more people would be a lot. If I got to pick their personalities and gender, I would want 1 more sister and 2 more brothers. I would watn a more alt brother, a more fem brother, and an indie sister. Kinda just an aesthetic type for them.

Which part of project management considers if employees will work at home or in the office?

Analysis
Resources
Scope
Time

Answers

Answer:

i think its time

Explanation: you have to manage your time for the project and you wouldnt think of all the other things.

Answer: It might be resources because not everyone at home will have the same books, etc that is used in a project while making it.

Explanation:

Which background-repeat value represents this div?
repeat

repeat-y

repeat-x

no-repeat

Answers

Answer:

repeat-y ................ ..

put each sentence in the correct place please :)

Answers

the first image matches with the last sentence.

the second image (fireworks) match with the first sentence.

the third image (rocket) matches with sentence two.

and the last image matches the third sentence.

Answer:

sentence 1 -> picture in box 2

sentence 2 -> picture in box 3

sentence 3 -> picture in box 4

sentence 4 -> picture in box 1

Anyone know the logic notation of this following logic circuit?

Answers

Answer:

Concept: Logic Circuit

You have two variables A and B A and B go to the XOR logic command.B goes to the NOT operator Lastly the result of both XOR & NOT go to the OR operator Please rate positively and give brainlist

What is Microsoft Windows?

Answers

Microsoft Windows is, computer operating system (OS) developed by Microsoft Corporation to run personal computers (PCs).

A common error by beginning programmers is to forget that array subscripts start with ________.
a. 0
b. the number of elements in the array
c. spaces
d. 1

Answers

Answer:.

Explanation:

what class are you in?
can you help me in connection?

Answers

Answer:personal computer:)

Explanation:

objets will never appear to have more than one vamishing point
true or false

Answers

Answer: it’s True

Explanation:

8.10 Code Practice Question 3

Can someone please help cause this has me lost I took a picture of the question because that would be too much to try and type.

I’m sorry if the quality is bad I tried to get a good angle!

Answers

terms = ["Bandwidth", "Hierarchy", "IPv6", "Software", "Firewall", "Cybersecurity", "Lists", "Program", "Logic",

        "Reliability"]

def swap(arr, in1, in2):

   w = arr[in1]

   arr[in1] = arr[in2]

   arr[in2] = w

print(terms)

swap(terms, 5, 1)

swap(terms, 2, 4)

swap(terms, 3, 5)

swap(terms, 5, 6)

swap(terms, 6, 8)

swap(terms, 8, 9)

print(terms)

This is how I interpreted the question. If I need to make any changes, I'll do my best. Hope this helps though.

The program is an illustration of lists and list manipulation

Lists

Lists are variables that are used to hold multiple values in one variable name

Python Program

The program in Python, where comments are used to explain each line is as follows:

#This defines the swap function

def swap(arr, pos1, pos2):

    myList = arr[pos1]

    arr[pos1] = arr[pos2]

   arr[pos2] = myList    

#This initializes the list

terms = ["Bandwidth", "Hierarchy", "IPv6", "Software", "Firewall", "Cybersecurity", "Lists", "Program", "Logic", "Reliability"]

#This prints the list elements

print(terms)

#This swaps the second and the sixth list elements

swap(terms, 5, 1)

#This swaps the third and the fifth list elements

swap(terms, 2, 4)

#This swaps the fourth and the sixth list elements

swap(terms, 3, 5)

#This swaps the sixth and the seventh list elements

swap(terms, 5, 6)

#This swaps the seventh and the ninth list elements

swap(terms, 6, 8)

#This swaps the ninth and the tenth list elements

swap(terms, 8, 9)

#This prints the list elements

print(terms)

Read more about lists and list manipulations at:

https://brainly.com/question/24941798

I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I try to check it, it comes up with a Traceback error.

My code:

b = float(input("Enter Temperature: "))

Traceback (most recent call last):
File "./prog.py", line 7, in
EOFError: EOF when reading a line

Answers

Answer:

The error is because you wrapped the input in float. First record the input and then modify it.

Explanation:

b =  input("enter temp:")

b = float(b)

What are the two negative impacts of computer technology to the society?​

Answers

One negative is that people are getting very impatient. This is because people are getting used to things instantly coming up onto their screens. Another negative is that people are being manipulated more easily. Nowadays anyone can be an expert if they sound smart enough. Then they can spread their lies quickly to millions of people.

What do you mean by word-wrap?

Answers

Answer:

it is also know as line breaking

Explanation:

is breaking a section of text into lines so that it will fit into the available width of a page, window or other display area

Define watcher block

Answers

Answer:

Happens when you are watching a series / film / drama / etc. but can not retain the attention span to watch for long periods of time. As well as the shortened viewing time, the ability to retain what has been viewed is impaired.

Explanation:

The Block Watcher puts the power of a microprocessor to work analyzing the current feed to the rails. This detector has been designed to eliminate many of the installation problems associated with the installation of signal systems. ... Then connect the detector output switch to your signal system.

Write a program that inputs a text file. The program should print the unique words in the file in alphabetical order. Uppercase words should take precedence over lowercase words. For example, 'Z' comes before 'a'. I am stuck on this python assignment. Don't need the answer asap, just some explaining of how to write code to do that. I know about the built in sort function

Answers

Answer:

Read the file and save it to a variable as a string, split the string variable and cast it to a set object using the set function to get the unique words in the file. Then use the max function with the key attribute to use regular expression module "re" to compare the first letter of each item to return in a list comprehension or append to a list.

Explanation:

The open function is used to import a file in python, the split string method splits the string to a list of items and the set function removes any duplicates of a word or item.

Using the for loop statement, iterate over the items and compare and return the items in alphabetical order with the 're' search method getting the item with uppercase letters with higher precedence than lowercase.

Question #5
Multiple Choice
Suppose this is your user-defined data type.
class player:
life = 3
magic = False
name = "
Which statement creates an instance of your data type?
O myPlayer = player()
O myPlayer.player()
O myPlayer = new player()
O myPlayer = player

Answers

Answer:  myPlayer = player()

Explanation: correct edge answer 2020

Answer: myPlayer = player()

Explanation: got it right on edgen

PLEASE HURRY!!
Look at the image below!

Answers

The answer would be 2&5 because this is correct
The answer should be 2&5 I’m not 100% sure on this but it makes the most sense

James wants to create a web page where he can write two paragraphs of text. The first paragraph of text should be colored red and the
second blue. Which snippet of code show the principle behind how James creates this page?

Answers

Answer:

The first code does it

Explanation:

Each of the attached code snippet is divide into two parts.

The CSS partThe html part

From the four code snippets, the first one answers it.

The syntax to format the paragraph of an html text using css is:

p#paragraph-id{

color:color-name

}

Analysing each element

p# -> This implies that a paragraph is to be formatted

paragraph-id -> This represents the id of the paragraph

{} -> The open and close curly braces house the properties to be formatted

color:color-name -> implies that the color of the element be changed to color-name (e.g. red or blue)

In the body tag of the html code, the first paragraph has an id of para1 and the second has para2 as its id.

i.e. <p id = "para1">......

So, the first paragraph will be formatted red while the second will be blue

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network

Answers

Answer: vulnerability scanners

Explanation:

The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.

Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.

hey plz help, and thanks

Answers

Answer:D im pretty sure

Explanation:im sorry if get it wrong So sorry ok just sorry

D maybe??? Sorry if it’s wrong

please help, thank you

Answers

Answer:

radish spinach swiss chard

Explanation:

radish, swiss Chard, spinach

What routing protocol is the most popular distance-vector routing algorithm used to determine the best routes within a network

Answers

Answer:

RIP

Explanation:

RIP is a routing protocol that stands for Routing Information Protocol. It is a distance-vector routing algorithm which uses a hop count for routing its metric. RIP is the most popular and frequently used on internet. RIP uses hop count, which means it goes from low hop count to high hop count.

Therefore, it is the Routing Infomation Protocol which is the most popular distance-vector routing algorithm used to determine the best routes within a network.

What is a resistor?
O A switch
O A light bulb
O A battery

Answers

Answer:

A Battery would be the correct awncer

Imagine you're in charge of managing an annual fest at your school. You have to select students and assign them different tasks. Write a short essay on the qualities and traits you would be looking for while selecting students. Explain why you think these qualities and traits are important. Also, describe how the lack of such qualities and traits would affect the work.

Answers

Answer:

Quality traits are important in many ways. A persons traits identifies them of how they treat you or how you might treat them. It is important to find good working people for the job. For example if one student is good at a specific task I might put them in that task or if another is good at stocking shelves or finding books I might put them in the library to help students find books. It is important as a supervisor to find people that listen and follow instructions not people that mess around and are unorganized. These qualities and traits are important to see the real potential of the employees. Finding the right people for the job will help the school and you as the supervisor to manage these employees. Making a application or employment sheet will help to find the right people making a sheet with some questions and have the potential employees fill it out to find their traits and skills.

Explanation:

Sorry I didn't have much background information on what you wanted me to write hope this works you can edit and change stuff though.

Also run this through Grammarly's plagiarism tester to see if it is plagiarism!

which of the following types of correspondence is used to inform the reader of new information such as a policy change

Answers

Answer: Memo

Explanation: Have a good day, pls mark me brainliest <3

ASCII is a common format for the representation of characters in writing code. How many characters can be represented in the standard ASCII encoding

Answers

Answer:

A total of 128 characters can be represented in the standard ASCII encoding.

Explanation:

The American Standard Code for Information Interchange (ASCII) was created to make an international standard for encoding the Latin letters. In 1963, ASCII was received so data could be deciphered between PCs; speaking to lower and upper letters, numbers, images, and a few orders.

Since ASCII is encoded using ones and zeros, the base 2 number framework, it uses seven bits. Seven bits permits 2 to the power of 7 = 128 potential blends of digits to encode a character.

ASCII consequently ensured that 128 significant characters could be encoded.

Match the terms with their definitions

Answers

Answer:

Malware goes with the third definition, single sign-on goes to the fourth definition, phishing goes to the second definition, and clickjacking goes to the first definition.

Hope this helps! :)

Malware = a term used for software designed to damage your computer or steal your personal information

Single sign-on = when you use a single credential to log into multiple websites

Phishing = when random links mislead you into giving your password or other vital information to an unscrupulous website or person

Clickjacking = when you unknowingly click a malicious link, thinking it to be a legitimate link
:)
Other Questions
the answer is yes or no ? Write the explicit formula for the sequence shown below3, -3, -9, -15 If you were a Native American of Texas, would you rather live in one of the houses found in the Gulf region or one of the houses found in the Plains reason? In your answer, discuss the benefits and drawbacks of living in the dwelling you chose as it relates to the other dwellings. What canwe do to decrease our disruption of the nitrogen Cycle? you are driving at 18m/s down Lyndale avenue. A car backs out a driveway 25 meters in front of you. You continue at that speed while your brain processes the danger which takes 0.25 seconds. You then slam on the brakes and your car has an acceleration of -5.4m/s^2. Do you stop before reaching the driveway(and hitting the car)? Show your work. This is a two-part problem with constant speed and braking. Which of the following words can be more than one part of speech?dancehelpfireAll of the choices are correct. Jonah realize even though shes crushing the cans in the amount of material in the can is unchanged which of the following describes the reaction that is taking place Find the value of x x = (Q - A)(Q - B)(Q - C) .. (Q - Z) The female reproductive and endocrine systems work interactively for which main purpose? Car A travels 170 miles in 4 hours. car B travels 306 miles in 4 hours. car C travels 550 miles in 11 hours. Which car has the fastest average speed? please help me find the remaining words.......will give brainliest! EXPERTS OR ACES PLEASE ANSWER THIS FAST DUE IN 2 MIN 50 POINTS Lisa is playing a video game in which she takes care of cats and dogs. She takes care of 4 cats for every 1 dog. If Lisa takes care of 12 cats in the game, how many animals dose she take care of altogether? graph the image of triangle UVW after a reflection across the line x = -1 PLEASEEE ANSWERRRR RI GHT NOWWWITS DUE AT 10:00 Underline and identify the figure of speech below I have given you directions to my house one million times Which idea presented in the selection does the photograph and caption next to paragraph 3 best support?People like to buy produce that is sold at a reduced priceAn initial step in Sainsburys plan is to sell appealing food to its customers.Unwanted produce can be a nutritious source of food for farm animals.Sainsburys donates fresh produce to local organizations that help people in need.This is the paragraph 3Offering shoppers the freshest and most appealing products possible is a good start. Attractive food sells the best. At the end of each day, each grocery store reduces the prices of fruits, vegetables, meats, and dairy products. Cheaper food sells even better. Whatever edible food is left goes to charities for distribution to people who need it. Free food goes into bellies rather than the ground. Sainsburys gives away large amounts of food to farmers to feed animals as well. Animals do not care if lettuce is wilted. What can archeologists learn from the artifacts they find (1 /a+ 1/b) (a+b-c)+(1/b+1/c) (b+c-a) + (1/c+1/a)(c+a-b) plz solve this question Explain the contrast between ichabod and van brunt Based off my profile how do you spell my name?A). TisonB). TsionC). TisnoD). ZionC). TysonD). Tyson Chicken Nuggets