When working on a selection sort method, what are the things you need to remember about the three methods you need to code?
element in an array from a given element n to the end of the array.
First, you need a method that finds the position of the
Second, you need a method that
the contents of two elements in an array. Third, you need a method that uses the above two
methods to perform the sort.

When Working On A Selection Sort Method, What Are The Things You Need To Remember About The Three Methods

Answers

Answer 1

First, you need a method that finds the position of the smallest element in an array from a given element n to the end of the array. Second, you need a method that swaps the contents of two elements in an array. Third, you need a method that uses the above two methods to perform the sort.

What is the array  about?

When working on a selection sort method, you need to remember the following about the three methods you need to code:

The first method should be a method that finds the position of the smallest element in an array from a given element n to the end of the array. This method should iterate through the array starting from the given element n and compare each element to the current minimum value. If an element is smaller than the current minimum value, it should update the minimum value and its position.

The second method should be a method that swaps the contents of two elements in an array. This method should take in the array and the positions of the two elements to be swapped as inputs, and should use a temporary variable to store the value of one element before swapping the values of the two elements.

Learn more about array from

https://brainly.com/question/28061186
#SPJ1


Related Questions

when planning a turn, you must signal ____ ahead of the turn.

Answers

Before making a turn changing lanes, you must indicate properly. The lit signals found in the majority of automobiles are the safest sort of signal.

What ought to be done in advance of turning always?

Prior to making a turn or lane change, signal. It's crucial that other motorists are aware of your intentions. You must give at least 100 feet (30 m) of advance notice while making a turn or changing lanes, as required by law.

What hand signals should you use when turning?

Point with the index finger of your left hand or stretch your left arm out to the side. Correct Turn: Your left arm should be extended, palm facing ahead, elbow bent forward. Stop/Slow Down: Lean to the left.

To know more about signals turning visit:-

https://brainly.com/question/27938466

#SPJ4

How might dead reckoning navigation be beneficial when programming self-driving vehicles?

Answers

Answer:

Dead reckoning navigation can be beneficial when programming self-driving vehicles because it allows the vehicle to determine its location based on its previous movements, even when GPS signals are not available. This can be useful in areas where GPS signals are weak or blocked, such as in a parking garage or a tunnel, and ensure that the vehicle can continue to navigate safely and efficiently.

write a function swapvectorends() that swaps the first and last elements of its vector parameter. ex: sortvector = {10, 20, 30, 40} becomes {40, 20, 30, 10}. code writing challenge activity demo

Answers

The function swap vector ends() switches the start and last elements of the vector input. Example: The code for sort vector = "10, 20, 30, 40" becomes "40, 20, 30, 10".

What do you mean by function()?

A collection of programme instructions that collectively carry out a single task is known as a function or subroutine in computer programming. When a task needs to be completed, this device can be utilised in programmes.

In the libraries that are available for many different programmes, programmes can define functions either internally or externally. In different programming languages, a function may also be referred to as a procedure, subprogram, method, or routine. Technically speaking, each of these terms has a distinct definition, and each language has its own nomenclature. A general term that is occasionally used is "invocable entity."

#include

#include

using std;

int main ( ) {

vectorsortVector(4);

int i = 0;

sortVector.

at(0) = 10;

blackVector.at(1) = 20;

blackVector.at(2) = 30;

blackVector.at(3 ). ) = 40 ;

SwapVectorEnds ( blackVector );

}

cout <

return 0;

}

Learn more about  swap vector ends()

https://brainly.com/question/19756685

#SPJ4

A student shared material from a website that looked free to use. Unfortunately, the author of that website has use copyrighted material without permission. The student received a notice to take down the material. What did the student receive?

an API notice


a packet interruption notice

a open-source software violation (OSSV) notice

a Digital Millennium Copyright Act (DMCA) notice

Answers

Answer: a open-source software violation (OSSV) notice

Explanation:

Answer: D. a Digital Millennium Copyright Act (DMCA) notice

Explanation: The DMCA is a U.S. copyright law that protects original works of authorship. It provides a mechanism for copyright holders to request the removal of copyrighted material that has been used without permission.

Receiving a DMCA notice means that the student is being alerted to a copyright infringement and is required to remove the copyrighted material from their website or any other platforms.  Failure to comply with a DMCA notice can have legal ramifications.

Learn more about DMCA here: https://brainly.com/question/31664154.

fill in the words to complete each step in liquid spill cleanup.

Answers

Physically eliminating or neutralising pollutants that have accumulated on people and equipment is the process of decontamination.

What significance do safety regulations have?

Workplace safety regulations are crucial because they safeguard staff members, clients, and the company's reputation. Enforcing safety regulations can minimise workplace accidents and injuries while increasing productivity. Reducing risks can enhance the working environment and boost employee happiness.

What are the three procedures for handling a spill?

The general steps for responding to a hazardous material spill include: RESCUE – Clear the spill site. Offer assistance, including the use of eyewash stations and safety showers. Once you've been properly decontaminated, seek immediate medical attention.

To know more about pollutants visit:-

https://brainly.com/question/15708835

#SPJ4

the admin at universal containers is setting up permissions for internal sales users. in addition to assigning the salesforce cpq user permission set, for which objects do the users need read, create, edit, delete permissions?

Answers

They contain a small group of permissions that are crucial for the safety of Salesforce CPQ data.

We created Access sets to be assigned directly to users without any cloning or modifying, in contrast to the majority of CPQ admins who copy and then edit basic access sets for org users. Users' functional access is increased via permission settings without having to modify their profiles. Depending on the Salesforce edition, users can have several permission sets even if they can only have one profile. Regardless of their profiles, you can assign different sorts of users different permission sets. Regardless of a user's primary job function, you can create permission sets to allow access to logical groupings of people. Let's imagine, for instance, that you have a number of users who must transfer and delete leads.

Learn more about permissions here-

https://brainly.com/question/14178838

#SPJ4

plsss helppp me with thisss plsss

Answers

Answer:

Here is an example of what you're asking in Python.

import random

def buildList(x):

   # Create an empty list to store the random integers

   random_list = []

   # Use a for loop to generate x random integers

   for i in range(x):

       # Append a random integer between 100 and 199 to the list

       random_list.append(random.randint(100, 199))

   return random_list

# Get the number of random integers from the user

x = int(input("Enter the number of random integers to generate: "))

# Call the buildList function to generate the random integers

random_integers = buildList(x)

# Print the list of random integers

print(random_integers)

Explanation:

This script uses the 'random.randint()' function from the built-in 'random' module to generate a random integer between 100 and 199, and then it saves the generated random integers in a list. The script also prompts the user for the number of random integers to generate and calls the buildList function with the user input. Finally, it prints the list of random integers.

intro to computer programming chapter 2 discussion questions what is the difference between a scene method and a class method?

Answers

Answer:

A scene method, also known as an instance method, is a method that is associated with an instance of a class and operates on the data of that instance. On the other hand, a class method is related to the class itself and works on the class's data. In other words, a class method is a method that is called on the course rather than on an instance of the class. The critical difference between the two is that a class method operates on the class level, while a scene method operates on the instance level.

Explanation:

Interference with wireless devices is happening much more often than in the past. For instance, unlicensed walkie-talkies used on TV sets have interfered with police radios, and British air traffic control transmissions have been interrupted by transmissions from nearby baby monitors. As you think about these issues, address the following questions: If devices that use unlicensed radio frequencies interfere with each other, whose fault is it

Answers

You will only experience interference when the wireless operator is speaking and you may be able to comprehend only a portion of the discussion if your gear is responding to adjacent transmitters like a radio equipment or CB installation.

What causes interference in frequency?

Baby monitors, wireless phones, amateur and personal two - way radios, oscillating amplifiers, and other transmitters on the same or comparable frequency with the one you're receiving can all produce radio frequency (RF) interference.

What does wireless communication interference mean?

An interference in telecommunications occurs when a signal is altered in a disruptive way while it travels across a communication channel among its source and recipient.The phrase is frequently used to describe the addition of undesirable signals to a signal that is otherwise good.

To know more about Interference visit:

https://brainly.com/question/16098226

#SPJ4

which of these is a secure website hosted by a school that provides information about a course and access to assignments, quizzes, tests, discussion boards, communication options, and grades?A learning management system

Answers

One of these learning management systems is a secure website that is maintained by a school and offers access to assignments, tests, quizzes, discussion forums, communication options, and grades for a course.

Which of the following would be an appropriate salutation to use in an email to a teacher?

Always begin your email with "Dear" or "Hello" and then your professor's name and position (Dr. XYZ, Professor XYZ, etc.). If you're unsure of their official title, a safe choice is usually always to use "Professor" after their last name.

What do you name online classes that use a learning management system to replicate a classroom setting?

An online setting that mimics a real classroom is called a virtual classroom. Most lessons are synchronous.

To know more about secure website visit:-

https://brainly.com/question/28269688

#SPJ4

assuming you are in your home directory, what is the correct syntax to copy the file ~/copy this.txt to a subdirectory named hold?

Answers

The appropriate syntax for copying a file cp copy_this.txt ~/hold.

What is the subdirectory called?

Under a root domain, a subdirectory is a kind of website hierarchy that uses folders to arrange information on a website. The terms "subdirectory" and "subfolder" are synonymous and can be used interchangeably. Subdirectories, or content subfolders, assist in dividing aspects of your main website into smaller chunks.

The URL structure of each subfolder always comes after the parent domain, and they all share the same top-level domain (TLD) of your website. The subdomain technique distributes your keywords across several different domains, whereas the subdirectory strategy concentrates them on a single domain. In other words, the subdirectory approach improves the root domain authority.

To know more about subdirectory, visit:

https://brainly.com/question/18382021

#SPJ4

vpn connection failed due to unsuccessful domain name

Answers

The fact that the VPN connection failed due to a failed DNS resolution indicates that there are DNS problems with Cisco VPN. By fiddling with your DNS settings, you can get around this solution. Additionally, this problem can be resolved by changing the content of important files.

What is the DNS Setting

The term "Domain Name System" (DNS) is used. By comparing human-readable domain names (like wpbeginner.com) with the distinctive ID of the server hosting a website, it is a mechanism that enables you to access websites.

Imagine the DNS system as the phone directory for the internet. Instead of listing names and phone numbers for individuals, it lists domain names together with the matching identifiers known as IP addresses. On a user's device, typing a domain name

To know more about DNS Settings Visit here

https://brainly.com/question/28562001

#SPJ4

help pls
Consider the following code:

x = 17
y = 5
print(x % y)
What is output?
1
3
3.4
2

Answers

The output of the code would be D. 2

What is a Code Output?

This refers to the end result that is gotten when a set of code is compiled and run and then the result is given in the IDE.

The operator % is the modulus operator, which returns the remainder of dividing the left operand by the right operand. In this case, the left operand is x, which is 17, and the right operand is y, which is 5.

When 17 is divided by 5, the quotient is 3 with a remainder of 2. Therefore, the expression x % y evaluates to 2, which is the output of the print() statement.

Read more about code output here:

https://brainly.com/question/28874533

#SPJ1

writing queries in sql to compile data from a database is related to the physical level of databases

Answers

Writing queries in SQL to combine data from a database is related to the physical level of databases ---- True

Your database's physical design maximizes performance while preserving data integrity by avoiding redundant data.

In SQL, what is a physical database?

Your database's physical design maximizes performance while preserving data integrity by avoiding redundant data. The entities become tables, instances become rows, and attributes become columns during physical design.

What is a database's physical level?

The internal level is yet another name for it. The physical level explains how the database actually stores data. This data is stored as bits on external hard drives at the lowest level, and at a slightly higher level, it can be said to be stored in files and folders.

Learn more about  SQL Database :

brainly.com/question/23475248

#SPJ4

in the communication process, the messages always pass through the filters of both the sender and the receiver. what are some common types of filters in communication?

Answers

Filtering is a barrier to effective communication that takes place when a sender purposely manipulates information so the receiver will see it more favorably

A filter is something that can delete, distort, or generalize message we're trying to share. And filters are in place for both the sender and receiver in every single conversation.

5 barriers to communications are:

Work environment.People's attitudes and emotional state.Time zone and geography.Distractions and other priorities.Cultures and languages

learn more about filters in communication at

https://brainly.com/question/25645043

#SPJ4

(b) how many different programs can be arranged if the comics must perform between bands? there are only different programs if the comics must perform between the bands.

Answers

Computer programs include MS Word, MS Excel, Adobe Photoshop, Internet Explorer,

A series of instructions written in a programming language for a computer to follow is referred to as a computer program. Software, which also contains documentation and other intangible components, comprises computer programs as one of its components. A program is a noun that refers to a collection of instructions that process input, manipulate data, and produce a result. It is also referred to as an application or software. As an illustration, the word processing tool Microsoft Word enables users to generate and write documents. A set of instructions supplied to a computer is known as a program. A program instructs a computer on how to carry out an action or a task efficiently and correctly.

Learn more about program here-

https://brainly.com/question/14618533

#SPJ4

A school is developing a program to keep track of information about students and their class schedules. In which of the following instances would a data abstraction be most helpful?

Answers

Answer:

A data abstraction would be most helpful in the instance where the school is developing a program to keep track of information about students and their class schedules. This is because data abstraction allows for the hiding of complex implementation details and the manipulation of data through a simplified interface. This allows the program to be more organized and efficient, as well as easier for users to understand and interact with. In this case, data abstraction can be used to create a user-friendly interface for entering and viewing student information and class schedules, while also ensuring that the underlying data is stored and processed in a consistent and secure manner.

A data abstraction would be most helpful in the instance where the school is developing a program to keep track of information about students and their class schedules.

What does the Data abstraction?

Data abstraction has been allows for the hiding of the complex implementation as well as the details and the manipulation of data through the simplified interface. This has allows the program to be more organized along with the efficient.

It is easy for the users to understand and interact with. In this case, data has abstraction which can be used to create a user-friendly interface for the entering as well as viewing the student information and the class schedules, while it has also ensuring that the underlying data has been stored and processed in the consistent and the secure manner.

Data abstraction has been the process of reducing the specific set of the data to a condensed illustration of the total. Generally, abstraction has the process of the stripping something of its characteristics in order to reduce it to its core components.

Therefore, A data abstraction would be most helpful in the instance where the school is developing a program to keep track of information about students and their class schedules.

Learn more about data abstraction on:

https://brainly.com/question/30626835

#SPJ2

what compensates for operating system inadequacies? purchasing updated software antivirus software agile fixes system updates

Answers

system updates compensates for operating system inadequacies

What is Operating system?

Operating system can be defined a type of system software that controls how computer hardware and software resources are used and offers basic services to other software applications.

Operating systems that use time-sharing plan activities to make the most of the system's resources. They may also contain accounting software to allocate costs for processing mass storage, printing, and many other resources.

The operating system serves as a bridge between software and computer hardware for physical features including input, output, and memory allocation. From mobile phones, web servers and supercomputers, many devices that house a computer have operating systems.

to know more about Operating system, visit

https://brainly.com/question/22811693

#SPJ4

System updates correct deficiencies in the operating system. New software included in operating system updates helps keep your computer up to date.

Option E is correct

What is an operating system?

An operating system is a piece of system software that directs how computer hardware and software resources are used and provides other software applications with fundamental services. Activities are planned in time-sharing operating systems to make the most of the system's resources. Accounting software may also be included to allocate costs for printing, mass storage, processing, and other resources.

When it comes to physical features like input, output, and memory allocation, the operating system acts as a link between software and the hardware of the computer. Operating systems can be found on a wide range of computers, including mobile phones, web servers, and supercomputers.

Incomplete question :

What compensates for operating system inadequacies?

A.AntiVirus Software

B.Patch Fixes

C.System Updates

D.Buying updated software

E.System updates

Learn more about operating systems :

brainly.com/question/22811693

#SPJ4

A chip uses pins A, B, C, and D to detect four bit numbers. What decimal number is represented by the following output signals?

Answers

A chip uses pins A, B, C, and D to detect four bit numbers. What decimal number is represented by the following signal inputs. The decimal number represented is 6.

What is the chip about?

The number represented by the pins A, B, C, and D depends on the encoding scheme used by the chip. For example, if the chip uses binary encoding, then the decimal number would be the binary number represented by the state of the pins, where A is the most significant bit and D is the least significant bit.

However, if the chip uses a different encoding scheme, such as Gray code, the decimal number would be different. To determine the decimal number, we would need to know the encoding scheme used by the chip.

In the above case, You need to add the values of the pins that contains 5V, so  it will be: 4+2 =6.

Learn more about chip from

https://brainly.com/question/29257949

#SPJ1

See full question below

A chip uses pins A, B, C, and D to detect four bit numbers. What decimal number is represented by the following signal inputs? Enter

your answer as an integer.

The decimal number represented is ______.

You have an Azure subscription named Subscription1 that contains a resource group named RG1. In RG1, you create an internal load balancer named LB1 and a public load balancer named LB2. You need to ensure that an administrator named Admin1 can manage LB1 and LB2. The solution must follow the principle of least privilege. Which role should you assign to Admin1 for each task

Answers

Moving IP addresses and storage accounts is possible. Virtual networks can't move around. There is no lock on RG1. There is a delete lock on RG2.

How can I see the time and date that the resources in RG1 were created?

The RG1 file contains resources that were distributed through templates. The time and date that the resources in RG1 were created must be verified. Solution: Click Resource providers after selecting the subscription from the Subscriptions blade.

How can we stop virtual machines from being created in RG1 only?

Only in RG1 must virtual machine building be stopped. Which should you employ? To specify requirements for resource attributes both during deployment and for already deployed resources, utilize Azure policies. Cloud Policy.

To know more about azure subscription visit:-

https://brainly.com/question/30148163

#SPJ4

describe the zimmerman telegram. explain its effect on u.s. public opinion.

Answers

The telegraph, together with American fury at Germany's resumption of unlimited submarine warfare, was regarded as possibly Britain's biggest intelligence coup during World War I and served as the decisive factor in convincing the United States to enter the conflict.

What was written in the Zimmermann telegram, and how did it function?

German Foreign Minister Albert Zimmermann sent von Woodard a telegraph in January 1917 pledging Mexico territory in return for aiding the German cause. The telegraph was deciphered by British cryptographers.

How did this Zimmermann telegram affect America's decision to join World War One?

It exposed a planned military partnership between Germany and Mexico.

To know more about u.s. public opinion visit:

https://brainly.com/question/365026

#SPJ4

Acumatica – The Most Advanced Warehouse Inventory Management Software
What is Acumatica WMS?

Answers

Barcode scanning for warehouse and inventory transactions enhances Order Management and Inventory Management in Acumatica WMS.

The Acumatica System is what?

Acumatica is business management software with everything an expanding company might need, from simple online accounting to complete ERP features. You only license the modules you now require from Acumatica ERP, and you can add more later.

A material flow-based, business process-oriented, rules-driven integrated warehouse management system is what Acumatica WMS is. The program enables material flow visibility for all warehouse activities and processes and seamlessly connects throughout the whole supply chain.

Acumatica is business management software with everything an expanding company might need, from simple online accounting to complete ERP features. You only license the modules you now require from Acumatica ERP, and you can add more later.

To know more about Acumatica WMS visit:-

https://brainly.com/question/30077129

#SPJ4

At what layer of the OSI model do routers operate?
Base
Network
Physical
Data Link

Answers

Of the OSI Model, the Network Layer A Layer 3 device that is frequently used is the router.A router, which functions at Layer 3, examines the IP & IPX addresses for incoming data packets.

What does Layer 3 mean?

The network layer, or Layer 3, is most frequently referred to as the layer wherein routing occurs.The primary function of a router is to transfer packets between networks.Network-to-network communications are possible thanks to Layer 3 protocols and technology.

What lies in OSI layer 3?

The network layer is located at Layer 3 of the Open Systems Interconnect (OSI) model's seven layers.Forwarding for incoming packets of data of varying duration takes place at Layer 3.The operations and steps that lead to data transfers between connection sites are part of this network layer.

To know more about OSI model visit:

https://brainly.com/question/29693072

#SPJ4

What is a phishing technique in which cybercriminals misrepresent themselves and solicit information over the phone.

Answers

Additionally, cybercriminals call you and ask for your personal information. Vishing is another name for phishing over the phone.

What are smishing, phishing, and pharming?

Vishing, smishing, email, and even social media are all methods used to deceive you into giving information or opening links that can infect your computer with malware. The terms spear-phishing and whaling may also be familiar to you. A targeted form of phishing is spear phishing.

What type of phishing scam is over the phone?

In phone phishing, the phisher phones the user and requests that they dial a number. The objective is to obtain personal data from the bank account over the phone. A phony caller ID is typically used in phone phishing.

To know more about phishing visit:-

https://brainly.com/question/15203764

#SPJ4

Input Sanitation and validation questions.
Explain the differences between input sanitation and input validation

Answers

The difference between input sanitation and input validation is validation checks if the input meets a set of criteria and sanitization modifies the input to ensure that it is valid.

What is input sanitation?

Input sanitization verifies entered data and eliminates anything that could be potentially harmful. On an online form, this is a good illustration. A hacker might use a SQL injection attack to try to access a website's data.

The process of checking input received by the application against a standard set within the application is known as input validation. I

Therefore, input sanitation alters the input to ensure that it is valid, in contrast, to input validation, which determines whether the input satisfies a set of requirements.

To learn more about input validation, refer to the link:

https://brainly.com/question/29779946

#SPJ1

the most common source of database failures in organizations is: group of answer choices inadequate budget. lack of planning. failure to implement a strong database administration function. inadequate hardware.

Answers

Inadequate database administration is the most frequent cause of database failures in businesses.

The correct option is D.

What do database failures entail?

The inability of a database to carry out the required transaction or data loss from the database are both considered failures. Each type of failure that a DBMS is susceptible to requires a unique management strategy.

What types of database failures are typical?

Hardware issues Memory faults, disc crashes, faulty sectors, disc full errors, and other issues with the hardware can occur. Inadequate (poor) quality control during manufacture, overloading (using components with insufficient capacity), and mechanical component wearout can also be blamed for hardware failures.

To  know more about database failures visit:

https://brainly.com/question/14536748

#SPJ4

The most common source of database failures in organizations is:

A) lack of planning.

B) inadequate budget.

C) inadequate hardware.

D) failure to implement a strong database administration function.

A school with 600 students wants to produce some information from the results of the four standard tests in Maths, Science, English and IT. Each test is out of 100 marks. The information output should be the highest, lowest and average mark for each test and the highest, lowest and average mark overall. All the marks need to be input. A Write a program to complete this task. B Explain how you would test your program

Answers

Each test has a score of 100. Each state's highest, lowest, and average marks, as well as the overall highest, lowest, and average marks, ought to be included in the information.

Describe your method for testing your program.?

Software is tested by testers using test plans, test cases, or test scenarios to guarantee its completeness. Exploratory testing, in which testers investigate the software for flaws, is another type of manual testing. The evaluation and verification of whether a software product or application performs as intended is known as software testing. Bug prevention, lower development costs, and improved performance are all benefits of testing.

Testing of basic functionality. Check that each button on every screen works first. a code review. Numerous issues can be discovered by looking at the source code with fresh eyes. static code inspection , Tests on units. ,Performance testing for one person.

Learn more about Program :

brainly.com/question/27359435

#SPJ4

which css property specifies a background image to appear in the background of the element. this can be a static file or a generated gradient.

Answers

The correct answer is One or more background images are put on an element via the background-image CSS property.

An HTML element can have a style or behaviour assigned to it using CSS. Color, border, margin, font-style, and transform are a few examples. The text colour to be used is specified via the CSS colour attribute. The typeface to be used is specified using the CSS font-family attribute. The text size to be utilised is specified by the CSS font-size attribute. The use of CSS Command makes it easier to segregate and show a document's informative material. It makes it easier to maintain the code, eliminate duplication, and utilise the same material in many styles.

To learn more about CSS property click the link below:

brainly.com/question/30116889

#SPJ4

Which among these business processes are convenient for automation?

High volume journal entries - 15K per day which spikes at month ends

KYC of banking customers

Knowledge FAQ for opening a bank account

Legal documents scan and extracting insights

Answers

Back-office procedures in Finance and or Administration, Human Resource management, IT, Procurement, and the front office processes like customer service and support are typically operations that have these traits and are commonly appropriate for automation.

Which makes automation easier?

Back-office procedures in Finance and or Administration, Hr, IT, Procurement, and the front office processes like support and customer service are typically operations that have these traits and are commonly appropriate for automation.

What are the four categories of manufacturing automation?

Fixed automation, programmable automated, flexible automation, and integrated automation are the four different categories of automation systems.

To know more about business processes visit:

https://brainly.com/question/30199283

#SPJ4

differences between ancient means of communication and modern means of communication​

Answers

Answer:

The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging

Answer:

The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging.

The only real difference is the speed of it. Other than that, only the delivery methods have changed. Communication itself is the same, as far as I can see.

Explanation:

Other Questions
despite the rapid growth of technology, digital devices fail to impact the industry. true or false in the equation 3(x-1)=2x+c, for what value of c will x = 3? Explain your reasoningBrainliest Answer is the given value a root of the equation or not?1. 8x-4= 2; 32. 4y + 5 = y-7; -4 7) Search engines are used to find a specific entry in a database.TrueFalse you have built a regression model to predict future crops of tomato based on a range of growing conditions. the model seems to fit well to the training data, but when any new data is tested it performs very poorly. how would you typically describe a model where this occurs? when comparing rural and urban populations in the united states, rural populations have higher rates of which of the following? How many moles of calcium atoms do you have if you have 2.77 10 atoms of calcium. (The mass of one mole of calcium is 40.08 g.) Isaac purchased a new car in 2004 for $16, 900. The value of the car has been depreciating exponentially at a constant rate. If the value of the car was $1,400 in the year 2012, then what would be the predicted value of the car in the year 2017, to the nearest dollar? After buying a Mini Cooper, Kate began paying more attention to advertisements for Mini and spent more time on websites reading about how much Mini drivers love their cars because she was sympathetic to these messages and found them pleasant. This is an example of ________.A) selective attentionB) selective exposureC) perceptual defenseD) perceptual blockingE) perceptual organization Based on her survey which advertising mediums will work best publicize Leslies in the store specials according to symbolic interactionists, when individuals meet someone who does not conform to their existing stereotype, they frequently . group of answer choices ignore any behavior that contradicts the stereotype. modify some aspects of the stereotype they hold ignore the person completely. abandon the stereotype and accept the person for who he or she is can someone give me the answer asap an aemt is an individual who is certified by the department and is minimally proficient in performing which of the following skills? write a system of linear equations whose solution is (6,19) Which of the following involved conficts between European settlers and Native Americans?King Philip's WarBacon's Rebellionthe Pueblo Revoltall of these Read the excerpt from The Republic by Plato.Let us then consider, first of all, what will be their way of life, now that we have thus established them. Will they not produce corn, and wine, and clothes, and shoes, and build houses for themselves?How does the speakers use of a rhetorical question affect his argument?The question shows that the people do not enjoy their simple lives. The question shows that the people selfishly hoard resources. The question shows that the people consider the most basic things to be luxuries.The question shows that the people in a good society will have everything they need. Trojan HorsesRevisit the permissions on the /shared_data/accounting.txt file. Bob is unable to read this file, but he would very much like to know its content.Bob knows Alice is a fool for ASCII art, and so he creates the /shared data/bob/fun script. View and take a screenshot of this file's contents with an appropriate command (as Bob). Your output should look fun/maybe be some ASCII art.As Bob, can you modify that script so that if Alice (or Harry) run the script, it will make a copy of the accounting.txt file in a manner that allows Bob to see the content? In other words, when Alice runs the file, Bob gets access to the filePlay around with the permissions and see how far you can get, as Bob, in gaining access to Alice's accounting.txt file. You might want to check the permissions on the /shared_data directory check out the ls command options for the appropriate flag to do this. _____ are discovered through research or data analysis and can be used to inform an email strategy. which two were considered great enlightenment thinkers whose political ideas helped inspire the american revolution.A. MontesquieuB. Oliver CromwellC. John NewtonD. John LockeE. Thomas Jefferson During a splenectomy, a surgeon carefully dissects the peritoneal ligament containing the splenic vessels at the hilum of the spleen. Which of the following peritoneal ligaments is being dissected by the surgeon?- hepatoduodenal ligament- lienorenal ligament- transverse mesocon- gastrolienal ligament