When it comes to cyberbullying, “power imbalance” is the term used for

Answers

Answer 1

Answer:

no

Explanation:

because

Answer 2

Answer:

intimidating someone online with threats

Explanation:

Just did the quiz on edg


Related Questions

Assume you use Bubble Sort to sort a list with 15 elements (i.e.n= 9). Exactly howmany comparisons do you use (in the worst case)?

Answers

Answer:

Worst case is 55 but it really does depend on the numbers

Explanation:

1/2n squared -1

So that would be 7.5 squared -1

In what stages of development process is a programmer or team most likely to intervoew a potential user of an app?A. investigating and reflecting B. designing C. prototyping D. testing

Answers

Answer:

D. testing

Explanation:

The testing stage is that stage where the developed application is put in the hands of potential users so as to gauge their experience with the product. Usually, a prototype that has the basic features of the main or original product is given to the potential user of an app. He is allowed to use the application for some time and is then later interviewed by the programmer to know what his experience was like when using it.

Through this means, any faults detected can be corrected by the programmer. This would also make the finished app better suited for the target users.

What did networks of the 1960s use to connect computers?

telephone lines

wireless technology

television signals

telegraph cables

Answers

Answer:

id say telephone lines or cables

The answer is Telephone lines

What are the oop concept of java

Answers

Answer: OOP concepts in Java are the main ideas behind Java’s Object Oriented Programming. They are abstraction, encapsulation, inheritance, and polymorphism. Grasping them is key to understanding how Java works. Basically, Java OOP concepts let us create working methods and variables, then re-use all or part of them without compromising security.

HOPE THIS HELPED IS NOT SORRY.

OOP stands for Object Oriented Programming. In Java, we create classes to represent different things. For instance:

public class MyClass {

   public static void main(String args[]) {

     Car cr = new Car();

     cr.createCar("Ford", "Green", 2000);

     cr.printInfo();

   }

}

class Car{

   private String model, color;

   private int year;

   

   void createCar(String md, String cl, int yr){

       model = md;

       color = cl;

       year = yr;

   }

   void printInfo(){

       System.out.println("Car Info:");

       System.out.println("Model: "+model);

       System.out.println("Color: "+color);

       System.out.println("Year: "+year);

   }

}

We create a car object derived from the Car class with whatever properties we want and then we can display the properties of our car with the printInfo() method.

This is just one example of the OOP concept of Java.

Which of the following is the strongest password?
O A. ttwEwtcaoaSm
O B. Thisismypassword
O C. 12345654321
O D. 8)oscysbydel%2

Answers

Answer:

Probably D

Explanation:

In what I have learned, I was taught that a strong password needs all of the following: Lowercase letters, Uppercase letters, Numbers, and Symbols, but the only one that has almost all of these, is D, because it has 2 numbers, 10 lowercase letters, and 1 symbol, the rest are just too obvious, (except for A)       -_-

But other than that, I hope this is right, but if it is not i am very very sorry! :(

The strongest password is ttwEwtcaoaSm. The correct option is A.

What is a password?

A password is a secret string of characters or symbols that is used to prove identity or gain access to a resource or computer system.

Passwords are used to safeguard sensitive data such as personal information, financial information, and online accounts.

A strong password is a difficult-to-guess or crack combination of letters, numbers, and symbols.

To maintain security, it is recommended that you use unique and complex passwords for each account and change them on a regular basis.

The strongest password is ttwEwtcaoaSm, which combines upper and lowercase letters, numbers, and special characters and is not a common phrase or word.

Thus, the correct option is A.

For more details regarding password, visit:

https://brainly.com/question/28114889

#SPJ7

Write a printAllBooks function to display the contents of your library. This function should:

Have two parameters in this order:
array books: array of Bookobjects.
int: number of books in the array (Note: this value might be less than the capacity of 50 books)
This function does notreturn anything
If the number of books is 0 or less than 0, print "No books are stored"
Otherwise, print "Here is a list of books" and then each book in a new line

Answers

Answer:

void printAllBooks(Book [] listOfBooks, int numberOfBooks){

   bool flag = false;

   if(numberOfBooks == 0){

       cout<< "No books are stored";

   } else{

       cout<< "Here is a list of the books \n";

       for (int i =0; i < numberOfBooks; ++i){

           cout<< listOfBooks[i];

       }

   }

}

Explanation:

The void keyword in the "printAllBooks" function is used for a function that has no return statement. The function accepts two parameters, "listOfBooks" which is the array of book objects, and "numberOfBooks" which is the size of the array of objects. The function uses a for loop statement to print out the book in the array if the numberOfBooks variable is greater than zero.

A merge field can be used multiple times in the same document.

A. True
B. False

Answers

TRUE, Yes you can you just have to redo the request for the identical information on the same spot in the same document.

Write a program that will read in id numbers and place them in an array.The array is dynamically allocated large enough to hold the number of id numbers given by the user. The program will then input an id and call a function to search for that id in the array. It will print whether the id is in the array or not.

Answers

Answer:

#include <stdio.h>

#include <stdlib.h>

int main() {

  int n, i, *p, s;

  scanf("%d", n);

  p = (int*) malloc(n * sizeof(int));

  if(p == NULL) {

     printf("\nError! memory not allocated.");

     exit(0);

  }

  printf("\nEnter elements of array : ");

  for(i = 0; i < n; ++i) {

     scanf("%d", p + i);  

  }

  scanf("Enter Id to be searched: %d", s);

  for(j = 0; j < n; ++j) {

     if (s == *(p+j)){

         printf("ID number is in the array at position %d", j);

     }else{

         printf("Error: ID number does not exist.");

     }  

  }

  return 0;

Explanation:

The C program source code inputs integer values to dynamic array size, and the search variable is looked for in the array using a for loop. If the search term exists, then the index position is printed on the screen, else an error message is displayed on the screen.

what are 3 software programs for mobile computing?

Answers

Answer:

1.Communication Devices

2.Mobile hardware

3.Mobile software and apps

(smartphones, laptop, etc)

WHAT DOES THE JEFFY SAY?

Answers

Hi and higaggahahahhaah

Answer:

Jeffy overhears Mario use the word and begins saying f. Mario scolds Jeffy and tells him to not say the word, but Jeffy resumes using it regardless.

Explanation:

Put the steps you would use to insert and label an endnote in order.

Answers

Answer:

2nd- step 1, 3rd- step 2, 1st- step 3, 4th- step 4

Explanation:

1. locate the reference tab

2. click the insert endnote option

3. type your endnote label

4. type the text you want the endnote to follow

An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that contains confidential information. Question 1
True
False

Answers

Answer: True

Explanation: Anything that is an IT threat is something that can compromise the integrity of the company or software and if that someone who stole a laptop has the information on it can get the information then there is a real risk that is faced to the company that owns that information.

Answer: True
Since a security threat is endangering the computer

Which view in the View tab of the ribbon is the easiest place to add a header or a footer? Normal view Custom Views Page Layout view Page Break Preview

Answers

Answer:

Page Layout view

Explanation:

Answer:

C. Page layout view

Explanation:

Most IT security threats originate with hackers.
Question 3 options:
True
False

Answers

The answer is True they do originate with hackers


What should be done to make sure the AutoSum feature will use the correct range?
-Click the AutoSum button, and then click the green check mark in the formula bar.
-Select the cell at the beginning of the range, and then right-click the AutoSum button.
-Add spaces between the cells in the range, and then click the AutoSum button.
-Select the cell at the end of the range, and then click the AutoSum button.

Answers

Answer:

Its D

Explanation:

Define a function hyp(leg1, leg2) that returns the length of the hypotenuse of a right triangle
Hint: number**0.5 takes the square root of a number, number**2 squares a number

Answers

I've included my code in the picture below. Best of luck.

The following data (in increasing order) for the attribute age: 13, 15,
16, 16, 19, 20, 20, 21, 22, 22, 25, 25, 25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46,
52, 70.
(a) Use smoothing by bin means to smooth these data, using a bin depth of 3. Illustrate
your steps. Comment on the effect of this technique for the given data.
(b) How might you determine outliers in the data?
(c) What other methods are there for data smoothing?

Answers

Answer:

Explanation:

Step-by-step explanation:

13, 15, 16, 16, 19, 20, 20, 21, 22, 22, 25, 25, 25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46, 52, 70.

a) Smoothing by bin means

Each bin has depth of 3

Dividing data into bins

so, Bin 1= 13, 15, 16

Bin 2=  16, 19, 20

Bin 3=  20, 21, 22

Bin 4= 22, 25, 25

Bin 5= 25, 25, 30

Bin 6= 33, 33, 35

Bin 7 = 35, 35, 35

Bin 8= 36, 40, 45

Bin 9=  46, 52, 70

Now, smoothing data by bin mean

so, Bin 1= 13, 15, 16 = (13+15+16)/3 = 15 Bin 1 = 15,15,15

Bin 2=  16, 19, 20 = (16+19+20)/3 = 18 Bin 2 = 18,18,18

Bin 3=  20, 21, 22= (20+21+22)/3 = 21 Bin 3 = 21,21,21

Bin 4= 22, 25, 25 = (22+25+25)/3 = 24 Bin 4 = 24,24,24

Bin 5= 25, 25, 30 =(25+25+30)/3 = 27 Bin 5 = 27,27,27

Bin 6= 33, 33, 35 = (33+33+35)/3 = 34 Bin 6 = 34,34,34

Bin 7 = 35, 35, 35 = (35+35+35)/3 = 35 Bin 7 = 35,35,35

Bin 8= 36, 40, 45 = (36+40+45)/3 = 40 Bin 8 = 40,40,40

Bin 9=  46, 52, 70=(46+52+70)/3 = 56 Bin 9 = 56,56,56

This technique is used to smooth the data. Data may have noise, using binning techniques we can remove noise from the data. It helps in providing more accurate results

b) How might you determine outliers in the data?

Outliers are the data that are abnormal to other data points. Outliers can be found by Box and whisker chart (box plot). Inter Quartile range can also be used to identify outliers

c)  What other methods are there for data smoothing?

Other methods of smoothing data are

a) binning by boundaries

b) Exponential smoothing

c) Random walk

Smoothing by bin means with a bin depth of 3 involves dividing the data into bins of size 3, and replacing each value in the bin with the mean of the bin.

What is bin depth?

According to the definition of equal depth binning, it divides the range into N intervals, each containing approximately the same number of samples.

The steps are as follows:

Bin 1: 13, 15, 16 → (13 + 15 + 16)/3 = 14.67

Bin 2: 16, 19, 20 → (16 + 19 + 20)/3 = 18.33

Bin 3: 20, 21, 22 → (20 + 21 + 22)/3 = 21

Bin 4: 22, 25, 25 → (22 + 25 + 25)/3 = 24

Bin 5: 25, 25, 30 → (25 + 25 + 30)/3 = 26.67

Bin 6: 33, 33, 35 → (33 + 33 + 35)/3 = 33.67

Bin 7: 35, 35, 35 → (35 + 35 + 35)/3 = 35

Bin 8: 35, 36, 40 → (35 + 36 + 40)/3 = 37

Bin 9: 45, 46, 52 → (45 + 46 + 52)/3 = 47.67

Bin 10: 70 → 70

(b) Data outliers can be identified using a variety of methods, including:

Z-score: For each data point, compute the Z-score, and consider any data point with a Z-score greater than 3 or less than -3 to be an outlier.The Tukey method: Calculate the data's interquartile range (IQR), and consider any data point that is more than 1.5 times the IQR below or above the first quartile to be an outlier.Visual examination: Plot the data and look for any values that seem out of place with the rest of the data.

(c) Other data smoothing methods include:

Moving average: Replace each data point within a specified window with the average of itself and its neighboring data points.Fit a polynomial to a moving window of data points and replace each data point with the value of the polynomial at that point using the Savitzky-Golay filter.Exponential smoothing: Assign each data point exponentially decreasing weights, with more recent data points receiving higher weights, and replace each data point with a weighted average of itself and the previous smoothed value.

Thus, this way, determine outliers in the data.

For more details regarding smoothing by bin, visit:

https://brainly.com/question/12982171

#SPJ2

Which of the following Power BI tools is best suited for editing data before import?
A.)Power Pivot
B.)3D Maps(Power map)
C.)Power query editor

Answers

Answer:

C.)Power query editor

Explanation:

Power Query Editor is a tool in MS Excel 2010 which allows the user to locate, edit and load external data before importing it.

It imports data from different sources, joins, appends data and shapes data according to requirements.

In a flowchart of a function, the starting terminal symbol states the name of the function, along with any ________ that the function has.

Answers

Answer:

Parameters.

Explanation:

A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).

In a flowchart of a function, the starting terminal symbol states the name of the function, along with any parameters that the function has.

Which Tab contains the font style attributes?

Answers

The home tab.

This tab contains the most-used Word features, such as tools for changing fonts and font attributes, customizing paragraphs, using styles, and finding and replacing text.

what feature is available to add a suggestion in the margin of someone else's document?​

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

The correct question is:

what feature is available to add a suggestion in the margin of someone else's document. The given features in this question are:

AnnotationCommentsHighlight and Bookmark

The correct answer to this question is the Comments.

Because you can add comments in someone else's document and only Comments features in word document allow you add comments on the someone else's document.

While the other options are not correct because:

The Annotation works with grammar or writing, Highlight feature allows you to mark important information or text in your document. while Bookmark allows you to save your space in a document.

Execution speed of a program on a computer processor varies with the language a programmer uses to code it. Select the correct option that
compares machine language with other languages.
The execution speed of machine language is
[___] than the execution speed of other languages.

Options:

slower
no different
faster

Answers

Answer:

faster

Explanation:

i took the test

Answer:

The answer is FASTER.

Explanation:

From PLATO!

What is one advantage of using object-oriented programming?
A.
increases coding time
B.
makes debugging the code easier
C.
takes longer to plan
D.
has a longer learning curve
E.
creates single file code

Answers

I think that the answer is B

One advantage of using object-oriented programming makes debugging the code easier. The correct option is B.

What is object-oriented programming?

Programming in the object-oriented (OOP) manner identifies classes of objects that are closely related to the methods (functions) with which they are associated. It also covers the concepts of attribute and method inheritance.

Objects can be used in a variety of ways. Due to its modularity, extensibility, and reusability, object-oriented programming improves software development productivity when compared to traditional procedure-based programming techniques.

Functional programming, at its most basic, employs immutable data to instruct the program exactly what to do.

Therefore, the correct option is B. makes debugging the code easier.

To learn more about object-oriented programming, visit here:

https://brainly.com/question/11023419

#SPJ2

PLEASE HURRY 30 POINTS
Which of the following statements describes the way networks are set up?

LANs are made up of LANs.

WANs are made up of WANs.

LANs are made up of WANs.

WANs are made up of LANs.

Answers

Wans are made up of lans

Answer:

WANs are made you of LANs

Explanation:

Describe the Pointer with example?​

Answers

Answer:

A pointer is a variable that stores the address of another variable. Unlike other variables that hold values of a certain type, pointer holds the address of a variable. For example, an integer variable holds (or you can say stores) an integer value, however an integer pointer holds the address of a integer variable.

Answer: A pointer is a variable that stores the address of another variable. Unlike other variables that hold values of a certain type, the pointer holds the address of a variable. For example, an integer variable holds (or you can say stores) an integer value, however, an integer pointer holds the address of an integer variable.

Explanation:

Choose the function required to have the code have the output shown.
>> alist = [10, 23, 'bye', 4.6]
>>> aList.
vo
4.6
>>> aList
[10, 23, 'bye']
A) pop B)remove C) clear

Answers

The function that will be required to have the code with the output 4.6 and the aList will be [10, 23, 'bye'] is pop.

Code explanation:

The code is written in python.

alist = [10, 23, 'bye', 4.6]

According to the python code, we used the variable "aList" to store a list. The list has a length of 4. It contains integers, float and string.

Using the pop function, the last value of the list will be removed.

The pop function removes the last value in a list.

alist.pop() removes 4.6 and it is printed out .

Then when we ask for our list, the list is printed out without the last value(4.6).

learn more on function here: https://brainly.com/question/15782435

Answer: pop

Explanation: got it right on edgen

PLEASE HURRY AND BE SERIOUS

Which of the following statements describes the way networks are set up?

LANs are made up of LANs.

WANs are made up of WANs.

LANs are made up of WANs.

WANs are made up of LANs.

Answers

Answer:  D: WANs are made up of LANs.

Explanation:

Answer:

answer is D WANS are made up of LANS

Explanation:

please hurry

How are computers connected to one another?

through networks

through printers

through laptops

Answers

Answer:

networks

Explanation:

internet

Answer:

i know u dont need help anymore but the guy who said networks is correct

Explanation:

e

What characteristics do mentally healthy people exhibit? Check all that apply.

exercise 30 minutes a day
make their own decisions
are comfortable with other people
get overwhelmed by emotions
handle problems when they arise
make the best out of every situation

Answers

Make there own decisions

Handle problems when they arise

Make the best out of every situation

Maybe, are comfortable with people, but I’m not sure.

Hope this helps!!

Answer:

make their own decisions

are comfortable with other people

handle problems when they arise

make the best out of every situation

Explanation:

uses of diodes in the society​

Answers

Answer:

The application areas of diodes include communication systems as limiters, clippers, gates; computer systems as logic gates, clampers; power supply systems as rectifiers and inverters; television systems as phase detectors, limiters, clampers; radar circuits as gain control circuits, parameter amplifiers, etc.

Explanation:

Explanation:

I should understand this answer

Other Questions
Someone help me with this Easy 15 points! Please put an explanationHow many atoms of oxygen are left after synthesizing oxygen molecules? What is the value of x when 6x-20+4x+20 This story takes place in a field a field is a example of a? Decisions. plot:character:setting Thank you! Marge wants to save money on a new skateboard. At the store near her,the skateboard she wants is listed at a regular price of $250. On Saturday,the store will have a sale and discount the skateboard by 30%. Shopperswho buy a skateboard that same Saturday before 9AM will also receive anadditional 10% off the sale price. How much will Marge pay, without tax,when she buys the skateboard that Saturday before 9AM?O $175O $75O $17.50O $157,50 Which statement is a scientific law?Scientists use genes to explain why evolution happens.Genes are long patterns that are similar to computer codes.A persons traits are controlled by different forms of a gene.The discovery of genes changed how scientists think about life.**PLEASE heLP i NEED THESE ANSWERSSSSSSSS* And it's not f'(x) = (0.1x - 1)^2 + 1) The bedroom of our house is 1,200 cubic meters. We know that there are 3.410^9particles of dust per cubic meter. Write how many particles of dust are present in the bedroom of our house. Which accurately labels the lysosome?WXYZ Approximately, what percentage of the community needs to be vaccinated in order for Herd Immunity to prevent a highly contagious disease likemeasles?O 75%O 65%0 95%O 85% what is equivalent to 2 (m-4) + 1 Say hey certain manufacturing industry has 63.1 thousand jobs in 2008, but is expected to decline at and average annual rate of 1.7 thousand jobs per year from 2008 to 2018. Assuming this holds true, what will be this industrys percent change from 2008 to 2018? a. 70%b. -27%c. -17%d. -75% 3. What temperature and density changes occur in a fluid or gas material that cause convection to occur? Tien bought movie tickets for herself and two of her friends. She paid $8.50 for each ticket. If Tien has $14.50 left, how much money did she have before she bought the movie tickets 15% of what number is 12 Anna is 4.5 years older than Kyle. Three times Anna's age, added to six timesKyle's age is 36. How old are Anna and Kyle what is a foxes abilty and its speed what is an artic fox and what does a fox do The chart shows the time, initial velocity, and final velocity of three riders.A 4-column table with 3 rows. The first row labeled rider has entries Gabriella, Franklin, Kendall. The second row labeled time with entries 10 seconds, 8.5 seconds, 6 seconds. The third column labeled initial velocity has entries 55, 50, 53.2. The fourth column labeled final velocity has entries 32, 50, 67.Which best describes the riders' final velocities ?Gabriella is speeding up at the same rate that Kendall is slowing down, and Franklin is not accelerating. Gabriella is slowing down at the same rate that Kendall is speeding up, and Franklin is not accelerating. Gabriella and Franklin are both slowing down, and Kendall is accelerating. Gabriella is slowing down, and Kendall and Franklin are accelerating. 2. Marks mother compares him to a stubborn mule because MarkA. tries to walk with his arms and legs.B. does not do his part to help Denise.C. wants his mother to buy him a mule.D. is determined to finish his work. What is in control of "twisting" the ventricular walls in order to squeeze out all the blood into the aorta or pulmonary trunk? Group of answer choices purkinje fibers AV nodes SA nodes pacemaker cells