Which would be a responsible use of technology used by victims of cyberbullying?
finding ways to strike back at bullies online.
O buying software that allows them to track down bullies.
O changing passwords and screen names regularly.
O pretending to be someone else to hide their identity.
Answer:
Changing password and screen names regularly.
Explanation:
The cyber attacks have been common in this age. The technological advancements have eased our lives but also create hundreds of risks. These risks can include cyber bullying. The best way to keep your self away from being victim of such threat is by changing passwords regularly. This reduces the chance of hacking passwords and cyber bullying.
Answer:
C
Explanation:
I took the quiz :)
When designing a user interface, you can choose between the _______ or ______ layout Group of answer choices
Answer:
command line interface, graphical user interface
Explanation:
User interface design, commonly known as UI design may be referred to a visual layout of the elements which a user interacts with in using a particular website, or some technological product.
It mainly focuses on what the user might need to operate or use the webpage or a product and it ensures that the it has easy accessing elements to control and use the product.
There are two common type of designs of the user interface. They are :
-- command line interface which contains only text
-- graphical user interface containing images and graphics
n macOS, what launch point provides access to almost all the settings needed to administer a macOS system?
Answer:
System preferences.
Explanation:
MacOS is the primary operating system designed and developed for Apple computers (MacBook).
In macOS, system preferences is a launch point that provides access to almost all the settings needed to administer a macOS system. The system preferences allow users to change various settings on their Mac computers such as changing the desktop layout, desktop picture (wallpaper), size and location of the dock, font size, appearance, energy saver etc.
A goal a student plans to achieve by tomorrow is described as a(n) A. extended goal. B. short-term goal. C. normative goal. D. long-term goal.
Answer:
I believe is B
Explanation:
its a short term goal-
Answer:
b
Explanation:
Do the binary numbers “0011” and “000011” have the same value or different values?
Answer:
Yes, they have the same value.
Explanation:
The leading zeros do not change the number at all. So 0011 and 000011 are the same as 11.
Even closed systems are never perfectly closed.
true false
Answer:
True
Explanation:
You can learn through many different textbooks that a closed system is always closed.
What is Chromolithography and did it help logo design?
Answer:
Yes, Chromolithography help logo design. The further explanation is given below.
Explanation:
Chromolithography would be a process by which multi-color designs or prints are made. This style of color printing originated from those in the lithography procedure, and now it encompasses a variety of color-printed lithography. A printing technology procedure that uses completely separate printing utensils to add each color of the components.And the above response is the right one.
The greater the profit motive in an economic system , the greater the likelihood of a.Innovation b.Equity c.Security d.Government controlling the factors of production
Answer:
d. Government controlling the factors of production.
Explanation:
Businesses exist to make profit. There is requirement to provide value for money to the customers in order for a business to achieve success. When a business fails to provide good customer service and exists only to make profits they might fail. In such situation government intervenes to stop the monopoly and save the consumers from the mercy of business.
___ are stem professionals who collect, analyze, and interpret data
Answer:
Statisticians
Explanation:
Statistics is a science, technology, engineering, and math (STEM) related degree that involves acquiring knowledge through data. A statistician sources data through administering questionnaire, taking polls and carrying out experiments. From the collected data, the statistician makes use of statistical concepts to sift through large data sets, develop data interpretation and deduce relevant information from the data and present meaningful conclusion to the relevant bodies in fields such as education, manufacturing, marketing, government and healthcare.
Answer:
statiscians
Explanation:
Operating systems the most common form Microsoft windows in Mac OS discuss the similarities and differences between which two systems
Aside from the way that the two of them have GUIs, nearly everything is extraordinary. On an unadulterated specialized level, there are almost no similitudes.
The pieces are extraordinary. They are even various sorts (darwin is small scale bit while windows piece is half and half portion).
macOS is UNIX-like and generally POSIX consistent. Windows isn't care for anything and not agreeable to POSIX principles.
macOS can run on practically any machine by structure yet they run completely just on a couple because of absence of drivers. Windows can run on practically any machine and isn't intended for just explicit equipment.
The OS level interfaces are extraordinary, which implies drivers are composed contrastingly for them.
They utilize distinctive document frameworks.
The system stack execution are unique despite the fact that the two of them adhere to the IETF/IEEE norms and hence, can intercommunicate.
The manner in which you introduce and uninstall Application is extraordinary.
write down
the three part of a computer
Answer:
monitor motherboard keyboard
Explanation:
:) look with you eyes
3.
The process of displaying the information from the table is called
a. Query
Form
b. Report
. d Wizard
00
Explanation:
the process of displaying the information from the table is called query
hey friend your answer is here I hope it will be helpful you please mark as brainiest answer thank youI don't understand how to write code for this in Java using nested for loops only. The official question is: write a program that produces the following hourglass figure using nested for loops?
Answer:
public class Triangle
{
public static void main( String[] args )
{
show( 5 );
}
public static void show( int n )
{
int i,j,k;
for (i = 0; i < n - 1; i++ )
{
for (j = 0; j < i; j++ )
{
System.out.print( " " );
}
for (k = n - i; k > 0; k-- )
{
System.out.print( "* " );
}
System.out.println();
}
for (i = 0; i < n; i++ )
{
for (j = n - i; j > 1; j-- )
{
System.out.print( " " );
}
for (k = 0; k < i + 1; k++ )
{
System.out.print( "* " );
}
System.out.println();
}
Select the correct answer.
Which finger would you use to type the letter t in the word Wait?
A right-hand little finger
B.left-hand thumb finger
C. right-hand index finger
D. left-hand index finger
Answer: D
Explanation:
Answer:
D
Explanation:
Which of the following is true of how the Internet has responded to the increasing number of devices now using the network? a) The Internet protocols are changed every year to adapt to the new devices that have been connected to the network b) While the number of devices connected to the Internet has grown, the network itself has not grown c) The protocols of the Internet were designed to scale as new devices are added d) The protocols of the Internet are no longer necessary thanks to the large number of devices now connected to the network
Answer:
Its C, they were designed to scale as new devices are added,
Explanation:
The internet has responded to the increasing number of devices by designing the protocols of the internet to scale as new devices are added. Option c is correct.
Internet protocols are rules that enables routing and addresses data packets in such a way that they have the ability to move across various networks and get to their right destinations.
Read more on https://brainly.com/question/23230754?referrer=searchResults
What is a step by step procedure written to carry out a task?
Answer:
A. Algorithm
Explanation:
A computer uses algorithm (a well-defined procedure ) to solve a problem.
Help Pleaseeee? Which tool is used to create the World Wide Web? A. HTML B. Web Coder C. Application Software D. JavaScript
The correct answer would be A, I did it and A was right. :)
Which of the following lists contains the five essential elements of a computer?
Answer:
The five essential elements of an (industrial) computer are chassis, motherboard, durability, longevity, and peripherals.
A _____ is a group of two or more devices/computers connected together to allow for the exchange and information and for the sharing of resources such as printers.
Answer:
Network
Explanation:
When you have devices connected together to pass, share and exchange information; this connection is regarded as network.
Take for instance. you need to get a file from your friend's mobile phone; when you connect your phone to your friend's phone via Bluetooth, Xender or via whatever convenient means of connection; that is a network.
Another instance is when you connect multiple systems in a CBT examination; this connection is also regarded as a network.
Answer:
network
Explanation:
Ergonomics is defined as
O the affordability of office equipment
O the décor in a workplace
O the design and arrangement of items for efficiency and safety
Othe economic benefit of home workspaces
Answer:
B. The design and arrangement of items for efficiency and safety.
Explanation:
Ergonomics is defined as the design and arrangement of items for efficiency and safety.
What is a workspace?Being a human being, there are various facilities that are required by any person at the time of performing any kind of task. While performing any kind of duty or task, there is a place at which that particular work is done.
This place can be termed a workspace, which is a combination of two terms - one is work, and the second is space. It can be defined as a space in which work is performed by an individual with full efficiency and efficacy.
There are various types of designs and arrangements made so that the efficiency and safety of the workspace items can be maintained, as well as for the convenience of the workers as well.
Thus, Ergonomics is defined as the design and arrangement of items for efficiency and safety.
Learn more about workspace from here;
brainly.com/question/24946752
#SPJ2
The basic premise of ___________is that objects can be tagged, tracked, and monitored through a local network, or across the Internet.
Answer:
Radio Frequency Identification (RFID)
Explanation:
A Radio Frequency Identification uses a tag that is made up of of a tiny radio receiver and transmitter, that transmits digital data when it receives an electromagnetic pulse from a nearby RFID reader device. This makes it possible to track an item, animals, or even a person by placing a RFID tag on it, and then monitor the tagged object over a network.
Sometimes when a baby is born they need to be kept in an incubator for a period of time. A manufacturer would like to design a new baby alarm to be used in the incubator. This alarm should only sound if it is switched on AND when the temperature becomes too cold OR the baby starts crying. Using the following: S = alarm switch T = temperature C = baby crying A = alarm a) Draw a truth table from these conditions to show when the alarm sounds. b) From your table produce a Boolean expression to represent the baby alarm c) Build a logic circuit on logic that is capable of carrying out the expression. Screen shot the final circuit.
A Ahfbcb
Explanation:
When looking to ensure your website is easily accessible by mobile users, what should you focus on doing first
Answer:
There are may steps in this procedure but there few steps that do first to access your mobile with your website.
Explanation:
When we are looking in our website and easily accessed by the mobile users, It is easy for them.
There are certain steps that should do first.
First step is that you have to redesign the website color schemeTo optimize your websiteTo create the mobile appNow to shorten the content in website.i need random facts about bill gates.
Where is the quick access toolbar located?
Which features of Word are used to separate numbers and text into columns? Check all that apply.
ruler
Tab key
left tab
right tab
decimal tab
Answer:
ruler and decimal tab
Explanation:
The features of Word are used to separate numbers and text into columns are the ruler and the decimal tab.
In order to split text into columns, the following processes are required:
The user has to open the document.Then, one will select the page layout tab.The user will click on columns command in the page setup group.Then, there is a list of options that's used in splitting the text into columns.Then, the user will select the desired option.In conclusion, the correct options are A and E.
Read related link on:
https://brainly.com/question/8950542
What's a possible sign of
malware?
A. Lots of popups
B. Being redirected in search engines
C. Computer running slowly
D. All of the above
Answer:
All of the above
Explanation:
I got a 100% on everfi ignition :) hope you do too
Lots of popups, being directed in search engines, and the computer running slowly are possible signs of malware. Thus, option D is correct.
What is malware?Malware is a type of malicious software that is designed to infiltrate computer systems, networks, and devices with the intent of causing harm, stealing data, or disrupting normal operations. Malware can take many forms, including viruses, worms, Trojan horses, ransomware, spyware, adware, and other types of malicious code.
Malware can be spread through a variety of methods, including email attachments, infected websites, malicious software downloads, social engineering, and other types of cyber attacks.
Once a system is infected with malware, it can be used to steal personal information, log keystrokes, control devices remotely, send spam, and launch attacks on other systems. Hence, option D is correct.
Learn more about malware, here:
https://brainly.com/question/22185332
#SPJ2
Match the following.A. URL B. Web browserC. Web hostingD. Web pageE. World Wide Web1. A subset of the Internet where Web pages written using HTML can link together and can be displayed by a Web browser.2. A type of software that is capable of searching and retrieving web pages through the World Wide Web on the Internet.3. Uniform Resource Locator; an identifier that combines the domain name and the server location to tell the Web browser where the specific web page is located.4. A service where server stores all the information for a Web page and makes it available for other computers to access.5. A document that is create in Hypertext Markup Language or Extensible Hyper Text Markup Language that can be located by a Web browser and accessed through the World Wide Web.
Answer:
The answer to this question can be defined as follows:
A = 3
B= 2
C= 4
D= 5
E= 1
Explanation:
In this question, the matched point is defined in the attached file. please find it.
Bruce needs to have a drive to rerecord data on the used DVD
Answer:
DVD- RW
Explanation:
What can you do to manually exclude an individual from a recipient list?
O Add a new source list to the document without the recipient.
O Filter the recipients using a specific city or a specific ZIP code.
O Remove the check mark next to the person in Mail Merge Recipients.
O Delete the placeholder address block on the document's preview page.
Answer:
Remove the check mark next to the person in Mail Merge Recipients
Answer:
Option three/letter C.
Explanation: