What are the benefits of digital media?

Answers

Answer 1

Answer:

- easy to access

- day to day information updates worldwide

- convenient

- versatility

- accuracy

- cost....etc

Explanation:


Related Questions

____ storage is not recommended for long-term archiving because the storage media can degrade over time

P/E
Optical
Hard Drive
RAID​

Answers

Hard Drive is not recommended for long-term archiving because the storage media can degrade over time,

What type of storage is recommended for long term data retention?

The long method used to long-term retention is the use of cloud. Cloud-based are known to be a form of cold storage that is made up of intelligent storage software.

Note that Hard Drive is not a long term kind of storage in the above context and as such, PE storage is not recommended for long-term archiving because the storage media can degrade over time,

Learn more about storage from

https://brainly.com/question/1317328

#SPJ1

When an interviewer asks "tell me about yourself", you should tell them about your childhood past. please select the best answer from the choices provided t f

Answers

In the interview when the candidate is asked about yourself then telling about childhood past is not correct. Therefore the given statement is false.

What is an interview?

An interview is an interaction or a conversation between an employer and the interested candidate. In the conversation the interviewee is asked about their education, family background, and work experiences.

When an interviewer ask about tell me about yourself, then the interviewee should not tell about their childhood past, rather the interviewee should give few information about their family, education, and working.

Therefore, the given statement is false.

Learn more about interview, here:

https://brainly.com/question/13073622

#SPJ1

_____ is a basic required Hypertext Markup Language (HTML) element. Group of answer choices

Answers

Answer:

header

title

nav

main

Explanation:

An HTML element is a component of an HTML document that tells a web browser how to structure and interpret a part of a HTML document. so without the basic element the browser will not be well structured

Which programming best practice does saving code snippets help you achieve?

O using consistent indentation and formatting

O documenting all changes and tracking revisions

O avoiding repetition of the same code in a program

O avoiding having to re-create code that you or another programmer has already written

Answers

Answer:

When it comes to formatting your code (not just strings), the Python programming community has spent a long time establishing and documenting best practice.

Missing: tracking ‎| Must include: tracking

4. Are instructions designed to ensure that your manufacturing processes are consistent, timely and repeatable.
A. Management
B. Quality
C. SOP
D. SWI

Answers

Answer:

SWI

Explanation:

SWI (Standardized Work Instructions) are instructions designed to ensure that your manufacturing processes are consistent, timely and repeatable

What year does futurist ray kurzweil believe ai will meet human intelligence?.

Answers

The year 2029 is the consistent date I've predicted, when an artificial intelligence will pass a valid Turing test — achieving human levels of intelligence.

“By 2029, computers will have human-level intellect,” Kurzweil said in a discussion with SXSW. The singularity is that moment in time when all the advancements in technology, especially in artificial intelligence (AI), will lead to appliances that are more intelligent than human beings.

What is human intelligence? Human intelligence is a cognitive quality that consists of the abilities to understand from knowledge, adapt to new conditions, understand and handle conceptual concepts, and use proficiency to manipulate one's circumstances.In order to capture the full spectrum of abilities and talents that individuals possess, Gardner theorizes that individuals do not have just an academic capacity, but have many kinds of intelligence, including musical, interpersonal, spatial-visual, and linguistic intelligences.Although current definitions of espionage vary considerably, professionals generally agree that intelligence involves mental capabilities such as logic, reasoning, problem-solving, and planning

To learn more about human intelligence, refer to:

https://brainly.com/question/9786721

#SPJ2

Select the three areas in which it would be most important for an instructional designer to be trained. psychology psychology computer applications computer applications educational theory educational theory business management business management sales and marketing sales and marketing]

Answers

The three areas in which it would be most important for an instructional designer to be trained are Psychology, Educational Theory and Computer applications.

Here is why those areas are important

Psychology: Understanding how people learn and how to design instruction that meets their needs is essential for instructional designers. Knowledge of cognitive psychology, educational psychology, and human development can inform the design of effective learning experiences.

Educational theory: Instructional designers need to have a solid foundation in educational theory to understand the principles of effective teaching and learning. Knowledge of learning theories, instructional design models, and assessment and evaluation can inform the design of instruction that is effective and meaningful.

Computer applications: As technology becomes increasingly important in education, instructional designers need to have a strong understanding of computer applications and programming languages. This can include software for creating and editing multimedia, learning management systems, and programming languages for creating interactive and engaging learning experiences.

Learn more about instructional designer here:

https://brainly.com/question/31104154

#SPJ1

Calculate the standard deviation for the following data set: Data set: 4, 14, 6, 2, 7, 12

Answers

Answer:

4.2328083664001

Explanation:

standard deviation is the square root of the variance. It is one of the measures of dispersion, that is a measure of by how much the values in the data set are likely to differ from the mean

Standard deviation formulas

The formula for the standard deviation of a sample is:

$ s =\sqrt{\frac{1}{n-1} \sum_{i=1}^n (x_i-\bar{x})^2$

where n is the sample size and x-bar is the sample mean.

The formula for the standard deviation of an entire population is:

$ \sigma =\sqrt{\frac{1}{N} \sum_{i=1}^N (x_i-\mu)^2$

where N is the population size and μ is the population mean.

Question an administrator of a linux network is writing a script to transfer a list of local host names, contained in a file called hostnames, directly into the syslog file. predict the cli command the admin is likely to use to accomplish this. a.

Answers

The Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."

What is a Linux command?

A Linux command simply refers to a software program that is designed and developed to run on the command line, in order to enable an administrator of a Linux network perform both basic and advanced tasks by entering a line of text.

In this scenario, the Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."

Read more on Linux commands here: https://brainly.com/question/25480553

#SPJ1

Fill in the Blank
Complete the code.
from random import randint
# Generate and save a random number.
correct = randint(1,10)
# Initialize the variable to count the number of guesses.
attempts = 0
# Create a loop that continues until the user guesses the number.
keepGoing = True
_______________ keepGoing:
# Get a guess from the user and update the number of guesses.
guess = input("Guess an integer from 1 to 10: ")
guess = int(guess)
attempts = attempts + 1
# Compare the guess to the correct answer.
if guess == correct:
# Tell the user the guess was correct.
print("You were correct!")
keepGoing = False
else:
if guess < correct:
print("Guess higher.")
else:
print("Guess lower.")

Answers

while

Explanation:

I just did this question

Answer: while

Explanation:

from random import randint

# Generate and save a random number.

correct = randint(1,10)

# Initialize the variable to count the number of guesses.

attempts = 0

# Create a loop that continues until the user guesses the number.

keepGoing = True

while keepGoing:

# Get a guess from the user and update the number of guesses.

guess = input("Guess an integer from 1 to 10: ")

guess = int(guess)

attempts = attempts + 1

# Compare the guess to the correct answer.

if guess == correct:

# Tell the user the guess was correct.

print("You were correct!")

keepGoing = False

else:

print("You were wrong.")

# Continue the loop until the user is correct.

# Tell the user how many guesses were required.

print("You guessed the number in",attempts,"attempts.")

You modified the program to give the user a hint by changing the "else" part of the if block.

​ if guess == correct:

# Tell the user the guess was correct.

print("You were correct!")

keepGoing = False

else:

if guess < correct:

print("Guess higher.")

else:

print("Guess lower.")

(Synchronized threads) Write a program that launches 1000 threads. Each thread adds a random integer (ranging from 1 to 3, inclusive) to a variable sum that is initially 0. You need to pass sum by reference to each thread. In order to pass it by reference, define an Integer wrapper object to hold sum. Run the program with and without synchronization to see its effect.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that organizes and synchronizes the programs that will run on the computer.

Writting the JAVA code as:

import java.util.concurrent.ExecutorService;

import java.util.concurrent.Executors;

public class Main

{

Integer sum=new Integer(0);

Main(){

ExecutorService e=Executors.newFixedThreadPool(1000);

final Sum s = new Sum();

for(int i=0;i<1000;i++){

e.execute(s);

}

e.shutdown();

while(!e.isTerminated()){

}

System.out.println(sum);

}

public static void main(String[]args){

new Main();

}

class Sum implements Runnable{

public void run() {

m();

}

public void m(){

sum=sum+1;

}

}

}

See more about JAVA at brainly.com/question/12978370

#SPJ1

the force of impact is

Answers

Answer:

the force of impact is the force generated when objects meet

What is the correct syntax for defining an __init__() method that sets instance-specific attributes upon creation of a new class instance

Answers

The right syntax for defining an __init__() method that sets instance-specific attributes upon creation of a new class instance is def __init__(self): pass.

What Is syntax ?

Syntax is known to be the way or arrangement of  any given words and phrases to create a kind of proper sentences.

Note that The correct syntax for defining an __init__() method that sets instance-specific attributes upon creation of a new class instance is def __init__(self): pass.

Learn more about syntax  from

https://brainly.com/question/831003

#SPJ2

4.8.4 Better Sum
Write a program that asks the user for two numbers. Using a for loop, add all of the numbers from the first to the second.


For example if the first number is 6 and the second number is 8 the result is 21 (6 + 7 + 8).


Print out the results when you are finished.

write in python

Answers

import sys

x = input("enter number 1: ") #ask for user input

y = input("enter number 2: ")

output = "" #the output string

try: #try integering them (this also has error message and will check if input is valid)

x = int(x)

except:

print("error! number 1 was not a number :(")

sys.exit() #leave

try:

y = int(y)

except:

print("error! number 2 was not a number :(")

sys.exit()

if x == y: #check they are not the same

print("both numbers are the same")

else: #do the thing

if y > x: #otherwise swap the order

for i in range (x, y + 1): #+1 for inclusive

output = (output + str(i) + " ")

else:

for i in range (y, x + 1):

output = (output + str(i) + " ")

print(output) #so it's all in one line

why should you delete files from your computer

Answers

deleting files can free up space and prevent hackers from accessing your sensitive files

Answer:

Why should you delete files from your computer

Explanation:

You should delete files permanently from your computer because removing that data completely opens up space on your hard drive and improves overral PC performance

A hashing approach: group of answer choices will often support constant time storage and retrieval of keys. only works if the keys are integral. is guaranteed to provide o(1) storage and retrieval of keys. is typically very space efficient. none of these is correct.

Answers

In technology, the hashing approach transforms the character into the other values. It is guaranteed to provide O(1) storage and retrieval of keys. Thus, option C is correct.

What is a hashing approach?

A hashing approach is a programming technique that is used to convert the range of the key values into the indexes and is majorly used in the hash tables.

The hash functions take the O(1) and retrieve making them fast to work with. It always does not necessarily work if the keys are integrated and are also is not much space sufficient.

Therefore, the option C. hashing approach is a guaranteed technique.

Learn more about hashing approach here:

https://brainly.com/question/14397218

#SPJ1

What documents are needed for real id in california.

Answers

When applying for a REAL ID, the document needed are:

A Proof of your identity (such as U.S. birth certificate, valid U.S. passport, permanent resident card, etc.An evidence of Social Security number ( such as Social Security card, W-2 form, etc.).

What is an ID?

An Id is known to be a tool or something that is often used in the identification of a person.

Therefore, When applying for a REAL ID, the document needed are:

A Proof of your identity (such as U.S. birth certificate, valid U.S. passport, permanent resident card, etc.An evidence of Social Security number ( such as Social Security card, W-2 form, etc.).

Learn more about ID from

https://brainly.com/question/16045720

#SPJ1

A radio station records an interview with a computer scientist using a computer and audio recording software. Explain how sampling is used to store audio recordings.

Answers

The way sampling is used to store audio recordings are:

Sound capture.converting digital signal.sound wave capture, etc.

How is sampling used to store audio recordings?

In this process,  sound is taken in by the use of a microphone and so it is later converted into a digital signal.

Note that an analogue-to-digital converter is often used to taken in or capture a sound wave at frequent  time intervals. This recording is then regarded as a sample and the data is stored in a file for future use.

Learn more about interview  from

https://brainly.com/question/8846894

#SPJ1

Which of the examples is part client side code

Answers

Answer:

a prompt for special characters in a username

Explanation:

in JavaScript, Python  a user input is a client sided code

The spelling checker included with word processing software compares words in a document with an electronic dictionary that is part of the operating system. Group of answer choices True False

Answers

Answer:

True

Explanation:

IF you go onto word you can see "add to dictionary" and you can also look up definitions that pull up a online dictionary, proving my point.

A one page document that introduces you, your skills and background and asks for an interview is an example of what type of document? career portfolio resume cover letter job application

Answers

Answer:

That would be a cover letter.

Explanation:

Hope this helps!

Cover letter is the type of document, as A one-page document that introduces you, your skills and background and asks for an interview. Hence, option C is correct.

What is a Cover letter?

A cover letter for your job application is one page long and attached. Its purpose is to provide you with a brief overview of your professional background.

A CV gives detailed information about your professional past and educational credentials, whereas a cover letter is a brief document that summarizes your reasons for applying for the job.

Yes, a cover letter should go with your introduction. Give your name, the job you're applying for, and the source of your information. For instance, I'm Henry Candidate and I'm submitting my application for the open Account Manager position listed on LinkedIn.

Thus, option C is correct.

For more information about Cover letter, click here:

https://brainly.com/question/10626764

#SPJ5

What are the options for video playback in a PowerPoint presentation? Check all that apply. looping the video adjusting the volume trimming and adding fades starting the file automatically rerecording sections of the file rewinding the file automatically

Answers

Answer:

loop feature

Explanation:

What are the options for video playback in a PowerPoint presentation? Check all that apply. looping the video adjusting the volume trimming and adding fades starting the file automatically rerecording sections of the file rewinding the file automatically

Answer:

a,b,c,d,f

Explanation:

What is the capacitive reactance of a circuit with a .57uf capacitor with a 320hz, 240vac signal applied

Answers

From the calculation, the capacitive reactance is 872 ohms.

What is reactance?

The term reactance refers to the opposition offered to the flow of current by a circuit element that is not a resistor.

The capacitive reactance is obtained from the formula;

Xc= 1/2πfc

f = frequency

c= capacitance

Substituting values;

Xc= 1/2 * 3.142 * 320 * 0.57 * 10^-6

Xc = 872 ohms

Learn more about capacitive reactance:https://brainly.com/question/17129912

#SPJ1

Answer:

The capacitive reaction is 872ohms

A good algorithm should have which three components?
OA. Commands, inputs, and outputs
OB. Clarity, readability, and sequencing
OC. Steps, order, and outcomes
OD. Clarity, simplicity, and brevity

Answers

A good algorithm should have these three components: C. steps, order, and outcomes.

What is an algorithm?

An algorithm simply refers to a standard formula which is made up of a set of finite steps and instructions that are executed on a computer system, in order to enable a software solve a particular problem under appropriate conditions.

In Computer technology, there are three (3) components that a good algorithm should have these include the following:

StepsOrderOutcomes

Read more on algorithm here: brainly.com/question/24793921

#SPJ1

_____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space.

Answers

dhcfff is doing a better job of work today and she is going on the phone and she’s not going home so she’s not doing well she is so

What three-key sequence will bring up the task manager or allow a user to log off or restart the computer?.

Answers

Answer:

Ctrl + Alt + Del

Explanation:

Ctrl + Alt + Del are the three sequence that will bring up the task manager or allow a user to log off or restart the computer.

What is the task manager?

A task manager is a system monitor tool in operating systems that provides information on the processes and programs running on a computer, as well as the machine's overall state.

Ctrl, Alt, and Del keys on a computer running the Microsoft Windows operating system that a user may press at the same time to end an application task or reboot the operating system.

Administrators may use Task Manager to terminate programs and processes, alter processing priorities, and configure processor affinity as needed for optimal performance. Furthermore, Task Manager enables the system to be shut down or restarted, which may be required if it is otherwise busy or unresponsive.

Therefore, these three keys are Ctrl + Alt + Del.

Learn more about the task manager, refer to:

https://brainly.com/question/13718327

#SPJ2

What is the full form of Computer?

Answers

Answer:

Computer is just made up of hardware and software components.

Explanation:

Sorry if I didn't get your question well

ou need to add security for your wireless network. You would like to use the most secure method. Which method should you implement

Answers

The most secure method used to add security for the wireless network is WPA 2.

What is wireless network?

The internet can be used at the nearby location range by using the wireless network.

WPA 2 is the protection required for the wireless network so that only some identified people will use that network.

Thus, the most secure method used to add security for the wireless network is WPA 2.

Learn more about wireless network.

https://brainly.com/question/26235345

#SPJ1

Nasim has a smart phone data plan that costs $25 per month that includes 9 GB of data, but will charge an extra $20 per GB over the included amount. How much would Nasim have to pay in a month where he used 5 GB over the limit

Answers

Answer:

$125

Explanation:

Charge for 9GB  + Charge for 5GB over limit

$25 + 5 x $20 = $125

The _____ is the name we give to the huge network of interconnected computers that collectively form this entity

Answers

Answer:

Internet

Explanation:

Other Questions
What figure of speech is predominant in stanzas I - VIII? (On the Morning of Christ's Nativity)metaphorsimileassonancepersonification Please Help I Don't Understand! Please hurry DAILY NEWSCongress PassesTitle IX EducationAmendmentsWhich of the following would make the most appropriate subheading for thisnewspaper article?A. Minority Schools Receive Billions in CompensationB. Democrats Organize Nationwide ProtestsC. Feminists and Women's Groups Claim VictoryOD. Schools Receive Fine Arts Programs What is the meaning of the underlined term? battle or mutiny change or transformation type of rotation style of leadership Place commas where needed in these sentences. 1) Darius the king set one hundred and twenty princes over his kingdom. 2) Yes Daniel was over them all because he possessed an excellent spirit. How did the Han pay for the military? Elizabeth works for a local restaurant at the end of her shift she is required to write in the time that you arrive in the time she is leaving so that she can be paid appropriately today Elizabeth was 15 minutes late for work what would be the most ethical thing for Elizabeth to do Please Help I Don't Understand QuestionYou made a cone-shaped paper funnel to get all of the glitter back in the original container. It has a slant height of 12 inches and a radius of 8 inches. About how many square inches of paper is used to make the cone? Answer gets brainlistIf x=3 and y=-2, the value of -2xy is A 10 B -48 C -96 D 40 Which quote from the text reveals the central idea of the section ""the view of a son of liberty""? A farmer creates a rectangular pen using part of the wall of a barn for one side of the pen and a total of 130 feet of fencing for the remaining 3 sides, as shown in the diagram. Write and equation which gives the area of the pen, A, as a function of x, the length of fence parallel to the barn A rock is dropped from a garage roof from rest. the roof is 6.0 m from the ground. determine the velocity of the rock as it hits the ground. A family plan for a cell phone has a monthly base price of $75 plus $10.99 for each additional family member added beyond the primary account holder. The linear function to model the monthly cost C(x) (in $) of a family for x additional family members added is C(x)= The equation of a curve is y = x + 4x. Show that the value of y increases when x increases. is a decreasing function. the shape of a protein molecule is determined by what? Which segment does NOT intersect line AG? Please help. in "In th curls" the author discusses the extreme sport of surfing Amalia and Alec are studying the growth of a plant over time. They measure the height of the plant at the end of each week for several weeks and display the data in a scatter plot. They then find the equation for the best-fit line to be y=2.5+ 1.25xX=the number of weeks that have passedY = the height of the plantHow tall will with plant be after 7 weeks? 3. Find sin A and cos B exactly.BaC64A