PLEASE HELP!!! THIS IS DUE TODAY! WILL MARK BRAINLIEST!
Five Rules of Digital Citizenship and provide one example for each rule
please help me! i'm begging you!!

Answers

Answer 1

Answer:

-be nice

-be respectfull

-dont bully

-if u see somthing say somethung

-dont use same password for everything

Explanation:


Related Questions

which one of the following is not considered a quantitative risk assessment technique?

Answers

Quantitative risk assessment is a method of assessing the risks associated with a particular project or activity. It involves the use of numerical values and statistical analysis to determine the probability and potential impact of various risks.

There are several quantitative risk assessment techniques that can be used to evaluate risk. These techniques include probabilistic risk assessment (PRA), fault tree analysis (FTA), event tree analysis (ETA), and Monte Carlo simulation.
Probabilistic risk assessment (PRA) is a technique that is used to quantify the probability and impact of potential risks. It involves the use of mathematical models to evaluate the likelihood of various scenarios and to estimate the potential consequences of those scenarios.Fault tree analysis (FTA) is another quantitative risk assessment technique that is used to identify the potential causes of a particular risk. FTA involves breaking down a complex system into smaller components and evaluating the potential failure modes of each component.

To know more about Quantitative risk assessment visit:

brainly.com/question/31565073

#SPJ11

How have search engines like Google, Bing, and Yahoo! revolutionized the ability to do research? They are more difficult to access than the library. They provide only information from reliable sources. They provide immediate access to information on the web. They take longer than using a card catalog but provide only expert sources.

Answers

Answer:

because it is easy to access not hard not all things from the internet are reliable they don't always have expert sources

Explanation:

Search engines like Google, Bing, and Yahoo! have revolutionized research.

The best answer choice for this is that "they provide immediate access to information on the web".

The other choices would be wrong because...

Answer choice A, would be incorrect due to the fact that using the search engines makes it easier to access information than a library as you do not need to walk around the library looking for a book to provide you the answers to your question.

Answer choice B, would be false since the web doesn't always provide only reliable information from creditable sources. In fact, quite a few of the sources on the web that come up, are not helpful or do not assist the user in answering their questions.

Answer choice D, would be wrong since using the search engine to find information is quicker than using a card catalog, and also it does not only provide expert sources since any source of information could pop up when the user searches for it.

People are not interested in what you do _____. I think, more and more, they're not even really interested necessarily in how you look on paper, like a

Answers

Incomplete question. However, I inferred you are referring to the best word that likely completes the blank space.

Answer:

or don't do;

Explanation:

So, this statement could rightly read;

"People are not interested in what you do or don't. I think, more and more, they're not even really interested necessarily in how you look on paper, like a...."

A____is the smallest unit of measurement used to describe computer processing and storage. Enter the answer in the box

Answers

Answer:

the smallest unit of measurement used for measuring data is a bit

A bit




Ckfhdhxtb tu j tu hg DF Uc

How is an assembly converted to a binary code?

Answers

The process of converting an assembly to a binary code involves writing the assembly code in a text editor, using an assembler to translate it into machine code, and using a linker to create an executable file.

An assembly is converted to a binary code through a process called assembly language compiling or assembly language translation.

First, the assembly code is written in a text editor and saved with an .asm file extension. Next, an assembler, which is a type of software, is used to translate the assembly code into machine code, also known as binary code.

The assembler reads each line of the assembly code and converts it into the corresponding binary code, which is a series of 1s and 0s that can be understood by the computer's central processing unit (CPU). The resulting binary code is saved as an .obj file.

Finally, the .obj file is linked with other object files and libraries to create an executable file, which can be run on the computer. This linking process is done by a linker, another type of software.

Learn more about  binary code here:

https://brainly.com/question/16612919

#SPJ11

pls help me with this question

pls help me with this question

Answers

Stack, just took this on schoololgy

What are important acronyms we use when we talk about the internet? this is for computer science.

Answers

Answer:

Lol

Brb

Btw

Gtg

Explanation:

I hope this helps

Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.

Answers

Answer:

Following are the letter to this question:

Explanation:

Dear Raju:

For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.  

For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.

And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.  

If you determine that option fits your needs, let me learn and I'll support you there.

Yours sincerely,

Dev

Can you please help me? I give you a brainlest
! ​

Can you please help me? I give you a brainlest !

Answers

1.
2.satin stitch
3.lazy daisy stitch (detached chain )
4.chain stitch
5. cross stitch
6. french knot
7.
8.split stitch
9.
10. back stitch
the others i can’t tell.

Which of the following is NOT a responsibility of an IT project manager?

A.
writing code

B.
managing the budget

C.
managing the schedule of the project

D.
assigning work to team members

Answers

Answer:

I think that The answer is A.

Explanation:

A project manager needs to be a leader which is assigning work, managing the schedule, and manage the budget.

In the name, it says Manager.
This is how I know that.

The one that is not a responsibility of an IT project manager is writing code. The correct option is A.

What is IT project manager?

The unique IT objectives of enterprises must be planned, organized, resourced, budgeted, and successfully carried out by IT project managers. Examples of such initiatives include the creation of apps and software.

One of the most difficult occupations is project management since no day is ever the same and you must use all of your project management abilities to address every issue.

Additionally, when an issue arises, your team will turn to you first. They might assume you have all the solutions to their questions. A project manager must be a leader who manages the budget, schedule, and job assignments.

Therefore, the correct option is A. writing code.

To learn more about IT project managers, refer to the link:

https://brainly.com/question/15404120

#SPJ2

Which of these is NOT a usual result of having friends at work?

increased job satisfaction


increased company loyalty


increased motivation


increased absences​

Answers

answer:
increased absences
explanation:
if you’re absences is a lot then you will not be able to have friends because you won’t get a chance to talk with them that much

Which of these purchases is most likely to be paid for with a credit card
A. Soda
B. Lotto ticket
C. Parking fee
D. Plane ticket

Answers

Answer:

plane ticket?

Explanation:

upon compiling the data, the researcher identifies a problem due to the fact that neither data source uses a unique id number for each student. which of the following best describes the problem caused by the lack of unique id numbers? responses students who have the same name may be confused with each other. students who have the same name may be confused with each other. students who have the same grade point average may be confused with each other. students who have the same grade point average may be confused with each other. students who have the same grade level may be confused with each other. students who have the same grade level may be confused with each other. students who have the same number of absences may be confused with each other.

Answers

Students who have the same name may be confused with each other is the best statement that best describes the problem that happened due to the fact that neither data source uses a unique id number for each student.

Define data source.

The term given to the connection established from a server to a database is Data Source. When constructing a database query, the name is frequently utilized. There is no requirement that the database filename and the data source name match.

A DSN of the school may be configured for a database file with the name friends.mdb, for instance. In a nutshell, a data source is the place, physical or digital, where the relevant data is kept in a data table, data object, or other storage type.

To learn more about data source, use the link given
https://brainly.com/question/19410005
#SPJ1

You are creating a program for the school's
upcoming theater production. You would like to
include a picture of the cast on the cover of the
program. Which of the following factors do you
need to consider? Choose all that apply.

•image compression

•image file format

•image resolution

•image scalability

Answers

Answer:

Image file format

Image resolution

Image scalability

Explanation:

Answer:

Image File Format

Image resolution

Image Scalability

The next answer is BMP !

Explanation:

1. It defines the amount of white space that appears at the top, bottom, left, and right edge of
our document.
d clipboard.​

Answers

Answer:

Margin is the correct answer to the given question .

Explanation:

The main objective of the margin is to setting the white space that are showing up at the top , bottom, left and the right corners of the file or the document .

Following are steps to setting the white space that are showing up at the top , bottom, left and the right corners of the file or the document

Firstly click on the page layout  options  .After that click on the margin tab .In this tab you will given the the top, bottom, left, and right margin according to your need Finally click on ok to finish them .

Do you think people need the product that these businesses offer? Why?

Answers

Answer:

Depends

Explanation:

It depends on what items you're talking about, essentials are definitely a must and if they're a waste, maybe not. It all depends on the buyer honestly since you never know what it could be used for.

also what products were you aiming to talk about?

If you were to go back in time, what games might you find kids playing at the local arcade? List and describe at least two games.

Answers

Answer:

Pac-Man Battle Royale, Space Invaders Frenzy

Explanation: Pac-man Battle Royal, came out in 2011 not that long ago. Space Invaders Frenzy came out in 1978. That came out A WAY long time ago.

Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy of it on her website with an attached Creative Commons license. Which of the following best describes who owns the photo?

Beatrice owns the photo because only holders of a Creative Commons license can own works online.

Arman owns the photo because he was the original creator and did not license the work.

Arman owns the photo because it was granted a Creative Commons license by another person online.

Both own the photo because creating a copy makes it her intellectual property.

Answers

Answer:

Arman owns the photo because he was the original creator and did not license the work.

Explanation:

Fill in the blank with the correct response.
One way Go.ogle makes money is to charge a person for using certain
_______.

Answers

Answer:

Go.ogle Apps

Explanation:

Mail checks for received email when you click the ____ button on the Apps bar.

Answers

When you receive an email in your inbox, it's important to check it to determine its relevance, urgency, and importance.

What are Email Checks?

Email checks may include reading the email thoroughly to understand its contents, checking any attachments or links included in the email, responding to the email if necessary, marking it as read or unread, archiving or deleting the email, and taking any necessary actions based on the content of the email.

The process of email checks can help you manage your inbox effectively and stay on top of important communications.

Read more about mails here:

https://brainly.com/question/30551604

#SPJ1

According to Chargaff's data, ________ must pair with ________, and ________ must pair with ________.

Answers

The Chargaff's rule state that in DNA, equality often exist in quantity between the bases A and T and between the bases G and C. According to Chargaff's data, adenine must pair with thymine and guanine must pair with cytosine.

Chargaff's gave rules for the pairing of bases. The rule is made up of base pairs in the DNA double helix.

He stated that there is a relation of A with T. The Pyrimidine Thymine (T) will always pairs with the Purine Adenine (A)

and also there is a relation of C with G and thus the Purine Guanine (G) always pair with the Pyrimidine Cytosine (C)

Erwin Chargaff was an Austrian-American biochemist. He lived from 1905-2002. It was at Columbia University that he discovered this rule.

Learn more from

https://brainly.com/question/22955213

Standard web design is:

Question 4 options:

Single media


Bi-media


Multimedia


Media free

Answers

Answer: Multimedia

Explanation:

I just took the test

Post Test: Software Development Life Cycle and Initial Phases 6 Select the correct answer. Which activity is performed during high-level design in the V-model? A. gathering user requirements B. understanding system design C. understanding component interaction D. evaluate individual components E. design acceptance test cases

Answers

During the high-level design phase in the V-model of the software development life cycle, the activity that is performed is understanding component interaction. So, the correct option is C.

The high-level design focuses on translating the system requirements into an architectural design that outlines the overall structure of the software system. It involves identifying the major components or modules of the system and understanding how they interact with each other to achieve the desired functionality.

Understanding component interaction is crucial during high-level design as it involves determining the interfaces and dependencies between the different components. This includes defining the communication protocols, data flows, and interactions between the components. The goal is to ensure that the components work together seamlessly and efficiently to meet the system requirements.

Option A, gathering user requirements, is typically performed during the requirements gathering phase, which is before the high-level design phase. It involves understanding and documenting the needs and expectations of the system's users.Option B, understanding system design, usually takes place in the detailed design phase, where the specific design of the system is defined, including the internal workings of the components.Option D, evaluating individual components, is more aligned with the testing phase, where the components are assessed individually to ensure their functionality and compliance with the design.Option E, designing acceptance test cases, typically occurs during the testing phase when the acceptance criteria are established and test cases are created to verify that the system meets the specified requirements.

In conclusion, during the high-level design phase in the V-model, the activity of understanding component interaction takes place to ensure that the major components of the system work together effectively to achieve the desired functionality.

For more questions on V-model

https://brainly.com/question/16298186

#SPJ11

Perform binary calculation: 110111 +101011) X 11​

Answers

Answer:

10000110110

Explanation:

\(110111 +\\101011\)

______

1100010

1100010 × 2 is the same as \(1100010+\\1100010\)   = 11000100

11000100 × 2 is the same as \(11000100+\\11000100\)    = 110001000

110001000 × 2 is the same as \(110001000+\\110001000\\\)   = 1100010000

\(1100010000\\11000100\\1100010+\\\)

_______

10000110110

Which of the following options are different characteristics of the diamond model?(Choose all that apply)
Capacity
Capabilities
Victim
Adversary

Answers

Therefore, the correct options that are different characteristics of the Diamond Model are: Adversary, Victim. Capacity is not a characteristic typically associated with the Diamond Model.

The Diamond Model is a framework used for analyzing and understanding cyber threats. The characteristics associated with the Diamond Model include:

Adversary: This refers to the individual, group, or entity responsible for carrying out a cyber attack or threat. They are the threat actor.

Victim: The victim represents the entity or system that is being targeted or attacked by the adversary.

Capabilities: Capabilities refer to the specific tools, techniques, and resources that the adversary possesses and can utilize during the attack.

Learn more about Capabilities here:

https://brainly.com/question/29675437

#SPJ11

13. A 2-sided coin has an equal likelihood of landing on each side. One side is called "heads" and the other is called "tails". The program below simulates randomly
flipping that coin many times,
var heads -
var tails - ;
var rolls - 100;
for(var i=0; i
if(randonlumber(0,1) - )
heads
} else
tails
Which of the following is NOT a possible combination of values of the variables in this program when it finishes running?
O A. tails has a value of O and heads has a value of 100
B. tails has a value of 100 and heads has a value of O
0 C.tails has a value of 20 and heads has a value of 20
O D. tails has a value of 50 and heads has a value of 50

Answers

Answer: tails has a value of 20 and heads has a value of 20

Explanation: Both Values have to add up to 100 for it to work. You cant have a 60% chance of a side that doesn't exist on a coin.

The combination that is not possible is (b)  tails has a value of 20 and heads has a value of 20

The first and the second line of the program initializes heads and tails to 0.

The third line of the program initializes roll to 100

This means that at the end of the program, the combined value of heads and tails variables must add up to 100.

The above highlight is true for options (a), (b) and (d), because

\(0 + 100 = 100\)

\(100 + 0 = 100\)

\(50 + 50 = 100\)

However, this is not true for the third option because

\(20 + 20 \ne 100\)

Hence, the combination that is not possible is (c)

Read more about similar programs at:

https://brainly.com/question/18430675

which of the following is not a valid statement? a. online analytical processing is a set of tools that work together to provide an advanced data analysis environment for retrieving, processing, and modeling data from the data warehouse. b. the data warehouse is a specialized database that stores data in a format optimized for decision support. c. production databases focus primarily on storing historical data and business metrics used exclusively for tactical or strategic decision making. d. a database that is designed primarily to support a company's day-to-day operations is classified as an operational database.

Answers

C. Production databases focus primarily on storing historical data and business metrics used exclusively for tactical or strategic decision making.

What is databases?

A database is a collection of information that is organized for easy access and manipulation. It typically contains data organized in a table, which is a two-dimensional structure with columns and rows. The columns represent the various elements of data, while the rows represent each individual record. Databases can be used to store and retrieve information quickly and securely. They are used in almost every industry and are essential for businesses to keep track of customer information, inventory, and more.

This statement is not valid because production databases are not used exclusively for tactical or strategic decision making. They are used to store the data that is used for day-to-day operations.

To learn more about databases
https://brainly.com/question/518894
#SPJ4

A text-editing application uses binary sequences to represent each of 200 different characters. What is the minimum number of bits needed to assign a unique bit sequence to each of the possible characters

Answers

The minimum number of bits that one needs to give a unique bit sequence to each of the possible characters is 8.

What are binary sequences?

A binary sequence is known to be also called a bitstream. This is regarded as is a string of ones and zeros.

The information in storage which can be in form of text message, a photograph, a song, a computer program, etc. may looks the same, like in a form or sequence of bits.

See options below

4

6

7

8

Learn more about bits from

https://brainly.com/question/19667078

For the following Python code to work, what must be added to the title column in the CREATE TABLE statement for the Course table:

Answers

The following Python code needs to be added to the title column in the CREATE TABLE statement for the Course table: NULL is the main answer and explanation is provided below.

The code provided is incomplete, but it is evident that the CREATE TABLE statement is being used to create a table named "Course. A column named "title" is being generated with some specifications. The code doesn't mention what should be done with this column, i.e. what data type it should have or what constraints it should follow.

NULL must be added to the title column in the  create table  statement for the Course table. In the absence of a value, NULL represents the lack of a value. NULL is not the same as zero, a blank field, or a field containing spaces, according to SQL conventions. Rather, NULL indicates the lack of a value. In a CREATE TABLE statement, a column may be marked as NULL or NOT NULL.  

To know more about python code visit:

https://brainly.com/question/33331724

#SPJ11

How Much did a case of soda (any kind your choice ) cost in 2004?
PLS HELP!!!!!!

Answers

Answer:

2004 88 cents for 2 cans

Explanation:

How Much did a case of soda (any kind your choice ) cost in 2004?PLS HELP!!!!!!
Other Questions
Frogs use their tongues to catch flies, the longer a frog's tongue the more food he can get. Over time the lengths of frogs tongues became longer, as those frogs with shorter tongues died off quickly and reproduced more slowly. This is an example of which of the following?Frogs use their tongues to catch flies, the longer a frog's tongue the more food he can get. Over time the lengths of frogs tongues became longer, as those frogs with shorter tongues died off quickly and reproduced more slowly. This is an example of which of the following? 1255 - your patient is allergic to bee stings. she suddenly began having watery eyes and itching in her arms. she does not remember being stung. vital signs: bp 130/80, p 110, r 16. you should What would be msot heloful to a pricution manger who wnate to determine the minimum time requred to complete a proposed pricut? compose the balanced formula unit equation that describes the chemical reaction between khp and naoh: anyone please write an easy solution to solve this linear equation with brackets:16-4(x+3)=2xanyone pls explain i keep getting 7/2!! Given each function and domain find the range values y=3x +1; domain = (-1,0, 1, 4) 8. Which Greek pottery style featured figures in silhouette?Orientalizing styleArchaic styleBlack-figure styleDoric style Ama and Kwame shared an amount of money.If Ama received one third of the money. Whichfraction is for Ama's share? How can I observe this years 21st February? please solve through and explain how to get values of mean and Standard Deviation. Using Reference Materials Assignment Active Using an Online Thesaurus to Choose the Best Wo Visit an online thesaurus to look for synonyms of apparel. Then choose the best synonym the sentence The apparel at this store is so great, it makes me want to buy new O toys O clothing o games O music. Based on the table below, find the input and output values of the function. If the feelings an author has toward his work, his theme, and his readers is influenced by a shifting point of view, then the story's ____ is influenced.A)styleB)syntaxC)characterizationD)toneE)diction Who won the Vietnam war Consider a country that is entering second year of looking at w and the country has the following GDP-related data: NX = 0. Y = $13 Trillion T= 4 Trillion C = ... Which of these is based on a deduction?a. If I tum the key in the ignition while stepping on the gas pedal, then my car will start.b. My car battery is dead.c. My car is out of gas.O d. My car won't start. Find the distance between the two points.(-2, 7), (3, -1) Explain the significance of each of the following.Jedediah Smith HELP PLEASE GEOMETRY PARALLELOGRAMS a person who has a fear of intimacy and tends to resist committing to others likely has which type of attachment style?