The Internet is much more anonymous than the real world. People can hide their identities or even pretend to be someone they're not. This can sometimes present a real danger to children and teens who are online. Online predators may try to lure kids and teens into sexual conversations or even face-to-face meetings. Predators will sometimes send obscene material or request that kids send pictures of themselves. Therefore, it's important to teach your kids to be on their guard whenever they're online.
Teens are generally more at risk from predators. Because they are curious and want to be accepted, they may talk to a predator willingly, even if they know it's dangerous. Sometimes teens may believe they are in love with someone online, making them more likely to agree to a face-to-face meeting.
Hope it helps :)!~ (Sorry if you get it wrong or if I got it wrong-)
~The Confuzzeled homan
1. What is JavaScript?
2. Who designed the Apple 1 Computer?
3. Who founded Apple?
Help me, it would be a pleasure if you could.
Answer:
1. JavaScript is a dynamic computer language used to primarily code and create system functions.
2. The people who designed the Apple 1 Computer were
Steve WozniakSteve Jobs3. The founder of Apple was Steve Jobs. He passed away from pancreatic cancer.
Hope this helps you!
What is an enterprise system
Answer:
Explanation:
Enterprise system is a cross- functional information system that provides organization-wide coordination and integration of the key business processes. Enterprise system helps in planning the resources of an organization.
Which type of document would be best created in Word? HELLP!!!!
Spreadsheet
Resume
Presentation
Animation
Answer:
presentation
Explanation:
because maths
Answer:
I think spreadsheet
Explanation:
Please correct me if I am wrong!
jordan needs to create an employee handbook. the handbook will have several written pages with bold text, plain text, and numbered lists. jordan should use a (n)
A) Spreadsheet
b) database
c) e-mail
d) word processor
D
is most likely the correct answer
para saan po yung points dito?
Answer:
Hindi kudin Alam eh hahahha
Answer:
Hey, there this is the answer
Users need to use points to post a question. The more points they use, the more quickly their question will be answered. Users gain a basic number of points each time they log into the platform.
Consider the following numeric values.
Binary 1011
Binary 1101
Decimal 5
Decimal 12
Which of the following lists the values in order from least to greatest?
Answer:
d 5, b 1011, d 12, b 1101
Explanation:
If you convert the binary, 1011 is 11 and 1011 is 13.
The ordered list of values from least to greatest is Decimal 5, Binary 1011, Decimal 12, and Binary 1101.
Binary refers to the numbers consisting of only "0" (zero) and "1" (one), while decimals are digits from "0" to "9".In computation, binary numbers are used in order to store any type of data, these numbers consist of binary digits (bits).A sequence of binary numbers must be read in a digit-by-digit manner, conversely to decimal numbers, which are read by ten, hundred, etc.The decimal numbers can be estimated as the sum of the binary numbers times their power of 2 (2n).In conclusion, the ordered list of values from least to greatest is Decimal 5, Binary 1011, Decimal 12, and Binary 1101.
Learn more in:
https://brainly.com/question/16612919
HELP HELP BRAINLIEST A student learns that a classmate is being cyberbullied. He wonders if it is a serious situation and how it is affecting his classmate.
What areas of his classmate’s life may be impacted by cyberbullying? Check all that apply.
physical health
recent memories
school performance
emotional health
athletic ability
Answer:
physical health
school performance
emotional health
critics of media consumption
A. do not believe we should do away with media altogether
B. agree that our society would be better off without media
C. argues that all media is a deterrent to the growth of society
D. do not want obese children to use technology and media
Answer:
b
Explanation:
make me brainlyest plzz
sorry if i got it wrong
Answer:
b i think
Explanation:CHECK IT FIRST
Why is file extension important when naming the file
Answer:
Extensions are important because they tell your computer what icon to use for the file and what application can open the file
Explanation: For example, the doc extension tells your computer that the file is a Microsoft Word file.
Why does a computer need primary and secondary memory ?
Which Call of Duty game is the best?
A. Black Ops 1-4
B. Modern Warfare 1-4
C. Infinite Warfare
D. Advanced Warfare
E. Ghosts
F. WWII
Answer:
i like ghost and modern 3
Explanation:
who presented pakistan resolution
Which statements describe the use of sound in presentations?
Sound cannot be used in presentation programs.
Sound can distract the audience when it is overused.
Sound can only be used with transitions.
Sound can only be used with animations.
Sound can be used with both animations and transitions.
Answer:
b and e
Explanation:
The statements that best describe the use of sounds in the presentation are as follows:
Sound can distract the audience when it is overused.Sound can be used with both animations and transitions.Thus, the correct options for this question are B and E.
What do you mean by Presentation?The Presentation may be defined as the type of process through which an individual who is known as the speaker conveys information on a particular topic to the number of people known as the audience.
As normally sound makes the presentation more attractive and understandable but the excess sound in the presentation makes the mood of the audience saturated and finally distracts. A standard level of sound must be required in both animations and transitions to make the presentation more influencing one.
Therefore, the correct options for this question are B and E.
To learn more about the Advantages of presentations, refer to the link:
https://brainly.com/question/11972945
#SPJ2
people with healthy media diets:
A.do not have problems with addictions, obesity, or other health issues
B. make good choices about what media to use and when not to use them
C. do not eat while engaging in media and avoid unnecessary weight gain
D. choose to leave media and technology out of their lives entirely
Answer:
b
Explanation:
Which of the following actions is most likely to raise legal or ethical concerns?
A
An analyst writes a program that scans through a database of open-access scientific journals and creates a document with links to articles written on a particular topic.
Sut
B
A computer scientist adds several features to an open-source software program that was designed by another individual.
с
A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.
D
A public interest group alerts people to a scam that involves charging them for a program that is available for free under a Creative Commons license
Q
Answer:
C. A musician creates a song using samples of a work and then uses a Creative Commons license to publish the song.
Explanation:
Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.
A copyright can be defined as an exclusive legal right granted to the owner of a creative work (intellectual property) to perform, print, record, and publish his or her work. Also, the owner is granted the sole right to authorize any other person to use the creative work. The copyright law which protects the sharing and downloading rights of music is known as the Digital Millennium Copyright Act (DMCA).
Furthermore, an intellectual property can be defined as an intangible creation of the human mind, ideas, thoughts or intelligence.
In this scenario, a musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song. This is an action that is most likely to raise legal or ethical concerns because he didn't get a license from the other musicians who he used their work.
A Creative Commons license is simply a public copyright license that allows for the free distribution of a copyright protected material and it can only be used by the intellectual property owner.
Which of the following may be purposes of packaging?
O Help the product stand out from the competition
O Make the product easier to use
O Protect the product and the people who buy it
O All of the above
Answer:
D
Explanation:
Mary is writing an article about the animal kingdom. She wants to place an image below the text. Which menu should Mary choose for this purpose?
Answer:
The answer to this question is given below in the explanation section.
Explanation:
This question is about how to insert caption or text below the image. Marry have to follow the following steps:
Open the article in MS WordSelect the image to insert the text below it.Then go to the References menuUnder the reference group, click on the insert caption buttona popup, windows will get open, fill in it the required detail.If you want to insert the image below the text, then you have to follow the following option.
Select the text where you want to insert the imageGo to insert menUnder the Illustration group of menu, click on pictures button, or online pictures button and select the image and click ok.Mary needs to choose the REFERENCE menu in order to place the text in a desired fashion around the image.
5 steps in cleaning and sanitizing smokehouse
Answer:
Scrape or remove food bits from the surface. Wash the surface. Rinse the surface. Sanitize the surface. Allow the surface to air-dry.Explanation: These are steps for cleaning and sanitizing.
The steps in cleaning and sanitizing smokehouse include:
Scrape or remove food bits from the surface.Wash the surface.Rinse the surface.Sanitize the surface.Allow the surface to air-dry.Sanitization simply refers to the disinfection and cleaning of an area. This is vital on order to prevent humans from being infected or contaminated.
When sanitizing a smokehouse, it's essential to remove food bits from the surface, wash the surface. rinse the surface, sanitize the surface and then allow the surface to air-dry.
Read related link on:
https://brainly.com/question/18996117
Which of the following BEST describes the differences between sequential and event-driven programming?
Answer:
In sequential programming, commands run in the order they are written. In event-driven programming, some commands run in response to user interactions or other events.
Explanation:
Event-driven program : A program designed to run blocks of code or functions in response to specified events.
Sequential programming: The order that commands are executed by a computer, allows us to carry out tasks that have multiple steps. In programming, sequence is a basic algorithm: A set of logical steps carried out in order.
The missing options are;
A) In sequential programming commands run one at a time. In event-driven programming all commands run at the same time.
B) In sequential programming commands run faster than in event-driven programming.
C) In sequential programming each command is run many times in sequence. In event-driven programming all commands are run a single time as an event.
D) In sequential programming commands run in the order they are written. In event-driven programming some commands run in response to user interactions or other events.
This question is about sequential programming and event-driven programming.Option D is correct.
To answer this question, we need to first of all define what the two terminologies in computer programming are;Event-driven programming; This is a programming pattern whereby the program flow is determined by a sequence of events that arise from activities/interaction of the user or the system. Sequential programming: This is a programming pattern whereby the program flow is determined by the sequence in which it was written.Looking at the given options, the only one that fits perfectly into the description I have given above about sequential and event-driven programming is Option D.Read more at; brainly.com/question/17970226
what is marc railberts goal for the robots his company (Boston Dynamics) builds?
Answer:
. We wanted to build a robot that could go where people go
Explanation:
Please help!! Thank youu
Use the drop-down menus to complete statements about importance and sensitivity levels. The Low Importance level is rarely used, and the High Importance level should be used . The sensitivity levels are personal, private, and . Sensitivity levels are basically only , as they appear on the Info Bar in the message.
Answer:
first blank- cautiously
second blank- confidential
third blank- informational
Explanation:
i got it correct on edge 2020
The Low Importance level is rarely used, and the High Importance level should be used cautiously.
What is cybersecurity?Cybersecurity can be defined as a preventive practice that involves the protection of computers, networks, software programs, servers and data (information) from unauthorized access, potential theft, attack, or damage, especially by using a body of technology, frameworks, processes and network engineers.
In Cybersecurity, the use of the various security levels include:
The sensitivity levels are personal, private, and confidential. Sensitivity levels are basically only informational, as they appear on the Info Bar in the message.Read more on Cybersecurity here: https://brainly.com/question/14286078
#SPJ2
some critics aruge that excessive media consumption can encourage______.
A. deeper reading
B. taking breaks from using digital media
C an unhealthy lifestyle
D. healthy friendships
Henry wants to create a website for his projects. He needs it to have a lot of textual content, proper formatting, and animations. Which languages will he need for this?
Henry can us ____to create the web content. He can use ____ to style the content he has created and _____ to create animation
the blank choices can be filled with
1.CSS HTML XML
2.CSS XML DHTML
3. Javascript Shockwave ActionScript
Answer:
1. HTML
2. CSS
3. JavaScript
Explanation:
Shockwave and Actionscript are no longer used on the web.
The Answer Above is incorrect. This is the correct answer:
Jennifer works as a programmer. She has fixed certain bits of code in a program while developing it. She has purposely left specific code in the program so she can access the program later and obtain confidential information. Which programming threat has she created?
A. logic bomb
B. trap door
C. Trojan horse
D. virus
Answer:
B. trap doorExplanation:
It's also referred to as the back door
HERES A RIDDLE!!
What is more useful when it’s broken??
Answer:
an egg
Explanation:
Film directors generally earn more money than theater directors. True False
Answer:
Yes, it's true on edge 2022.
Does anyone know how to use a while loop and ask a user to input positive integers until the user enters 0 and print the sum so far after each input, then print final sum at the end in edhesive?
In python:
total = 0
while True:
num = int(input("Enter a number: "))
if num == 0:
break
total += num
print(f"The final sum is {total}")
Which term refers to a fact that naturally occurs in the universe?
A.
scientific law
B.
scientific inquiry
C.
conclusion
D.
hypothesis
Answer: a scientific law
Explanation:
HOW MEANY PEOPLE PLAY AMONG US
Answer:
up to 1.5 million people are playing Amoung Us
Explanation:
Answer: I Play Among Us But this is a website for learning and questions so please ask that somewhere else. Thank You Have A Nice Day!
Explanation: