1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
2 years ago
7

Your online actions can have real- world consequences. True or false?

Computers and Technology
2 answers:
Snowcat [4.5K]2 years ago
6 0

True

For example, if you were to own a deep-web market, that's at least 20 years of jail time.

If you were to meet up with somebody bad from the internet, things bad happen.

If you send illegal information across the internet, you can suffer jailtime.

There are so many more examples, but it's really not worth it

EastWind [94]2 years ago
3 0

Answer:

This is very often false. It's not like anyone knows where you are when you're online, so they really cannot do much about your actions. However, there are times where this is true.

You might be interested in
Walter’s health insurance premium increased by 22 percent this year. Now he pays $488 every month for health insurance. What was
ElenaW [278]

Answer:

$380.64

Explanation:

So he what you do is take $488 multiply it by 22% to get $107.36 you then subtract $488 from $107.36 to get what he was paying before premium increase which is $380.64

7 0
4 years ago
A major concern about ESP claims is that proponents explain both the positive and negative findings. By explaining the negative
4vir4ik [10]

Answer: Falsifiability

Explanation: Falsifiability is the term that is defined as the evaluation of any particular hypothesis or theory to be proven wrong .This feature gives the access that the theory can be tested and have more accurate claims .

The ESP(Extrasensory perception) theory  can also have feature of being falsifiable because the experiments and test lead to the issue that the negative effects of the theory are not certain which might occur due to simple observation of effects.

5 0
4 years ago
Describe email etiquette and netiquette when communicating electronically.
navik [9.2K]

Answer:

Email etiquette refers to the principles of behavior that one should use when writing or answering email messages. It is also known as the code of conduct for email communication. Email etiquette depends upon to whom we are writing- Friends & Relatives, Partners, Customers, Superior or Subordinates

Difference Between Etiquette and Netiquette is that Etiquette is the simple requirements needs for social behavior while Netiquette, is the code of acceptable behaviors users should follow while on the Internet.

6 0
3 years ago
python If the checksum is 10, the last digit is denoted as X according to the ISBN-10 convention. Write a program that prompts t
aksik [14]

Answer:

PYTHON CODE:

str = input("Enter the first 9 digits of an ISBN-10 as a string : ") # user input

i = 1

checksum = 0 # for total sum

while i < 10:

c = int(str[i - 1]) # getting every digit of the ISBN

c = c * i

checksum += c

i=i+1

checksum=checksum % 11 # getting the last digit of ISBN

ch=checksum

if checksum==10: # if the last digit is 10 then change it to X

ch="X"

print("The Complete 10-Digit ISBN is : ",end="")

print(str,end="") # displaying the 9 digit of ISBN

print(ch) # appending the last digit of ISBN

Explanation:

3 0
3 years ago
The Healthcare Innovation and Technology Lab would most likely be interested in which of the following app types?
prisoha [69]

Answer:

No. 4: An app to send data from an insulin pump to a data collection point.

Explanation:

Healthcare Innovation and Technology Lab would not mainly be focused with budgeting, book reading, and home insurance policies. Answer number 4 includes health and technology.

7 0
3 years ago
Other questions:
  • Thomas is using a drawing program to complete a construction. Which construction could he be completing? (5 points).
    5·2 answers
  • Which of the following is the definition of Internet Protocol Security ( IPSec)? A remote access client/server protocol. It is a
    13·2 answers
  • 1. You have just upgraded memory on a computer from 4 GB to 8 GB by adding one DIMM. When you first turn on the PC, the memory c
    13·2 answers
  • How can an instance variable be used in a class? Explain your answer. (java)
    10·1 answer
  • Describe how pseudocode makes programming more efficient for large programming tasks.
    10·2 answers
  • What do we do if IOC is called on the intercom ??
    14·1 answer
  • What is eight bits of data called?
    13·1 answer
  • What is a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide, complete with transitio
    7·2 answers
  • 10011÷11 binary division​
    6·1 answer
  • How to make classs constructer java.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!