1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mkey [24]
1 year ago
10

Question 12 (5 points)

Computers and Technology
1 answer:
neonofarm [45]1 year ago
4 0

An example of a user exhibiting proper netiquette with a new neighbor is: "Hi Sam. How are things going?"

<h3>What is netiquette?</h3>

Netiquette is a short terminology for network etiquette or Internet etiquette and it can be defined as the set of behaviors, rules, proper manners, and customs that are considered to be polite (courteous) and should be followed by end users, especially when they are communicating through the use of an email, computer technology, and social media over the internet.

This ultimately implies that, netiquette refers to the acceptable or correct way of using the internet for respectful, polite (courteous) and appropriate communication.

In this context, we can infer and logically deduce that an example of a user exhibiting proper netiquette with a new neighbor is "Hi Sam. How are things going?"

Read more on netiquette here: brainly.com/question/27372890

#SPJ1

You might be interested in
These tools gather information from sources such as emails, text messages, and tweets and make the information instantly and pub
babunello [35]

Answer:

Crisis-Mapping

Explanation:

Social networks are characterized by the immediacy of the content that users produce, and that same feature can be transferred to the online mapping of crises and conflicts.

Characteristics Crisis-Mapping:

  • Real-time information processing.
  • Immediacy;
  • Visualization of the aggregated information can allow the detection of patterns that cause new analyzes to be undertaken or work hypothesis to verify.
  • Continuity in the tasks, the maps record activity without interruption during the twenty-four hours of the day and seven days per week.
  • Flexibility in the protocols, since the tasks are distributed and evolve according to the dynamics (the crisis maps evolve with the crisis itself).
8 0
3 years ago
The capital letter Wis expressed as U+0057 in which system?
Paul [167]

The capital letter W is expressed as U+0057 in Unicode system

  • The Unicode system is known as a type of coding system which contains worldwide character encoding standard that gives a code to every character and symbol in every language spoken in the world today.

  • It is known as the encoding standard that is used in all languages, It makes sure that an individual can retrieve or combine data with the use of different languages altogether.

Conclusively, we can say that the The capital letter W is expressed as U+0057 in Unicode system

Learn more from:

brainly.com/question/24736173

6 0
2 years ago
Read 2 more answers
The process of _____ determines what volume a system can handle by comparing its performance to standards in the industry? horiz
Alina [70]

BENCHMARKING

option C

5 0
3 years ago
Read 2 more answers
Please I need help with this !!!! <br> Complete the table given below.
UkoKoshka [18]

Answer:

  • DBMS , function - include concurrency, security, backup and recovery, integrity and data descriptions.
  • Software calculator , category - calculator
  • DTP , function - Creating, editing, saving and printing documents.
8 0
3 years ago
In the original UNIX operating system, a process executing in kernel mode may not be preempted. Explain why this makes (unmodifi
Elena L [17]

Answer:

the preemption is -> The ability of the operating

system to preempt or stop a currently

scheduled task in favour of a higher priority

task. The scheduling may be one of, but not

limited to, process or 1/0 scheduling etc.

Under Linux, user-space programs have always

been preemptible: the kernel interrupts user

space programs to switch to other threads,

using the regular clock tick. So, the kernel

doesn't wait for user-space programs to

explicitly release the processor (which is the

case in cooperative multitasking). This means

that an infinite loop in an user-space program

cannot block the system.

However, until 2.6 kernels, the kernel itself was

not preemtible: as soon as one thread has

entered the kernel, it could not be preempted to

execute an other thread. However, this absence

of preemption in the kernel caused several

oroblems with regard to latency and scalability.

So, kernel preemption has been introduced in

2.6 kernels, and one can enable or disable it

using the cONFIG_PREEMPT option. If

CONFIG PREEMPT is enabled, then kernel code

can be preempted everywhere, except when the

code has disabled local interrupts. An infinite

loop in the code can no longer block the entire

system. If CONFIG PREEMPT is disabled, then

the 2.4 behaviour is restored.

So it suitable for real time application. Only

difference is we don't see many coders using it

5 0
3 years ago
Other questions:
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • Word 2013 in order to share a document online you must first
    10·1 answer
  • In the beginning of a presentation, it is important to:
    9·1 answer
  • The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
    11·1 answer
  • 10.7 LAB: Fat-burning heart rate Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus th
    8·1 answer
  • The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for t
    7·1 answer
  • Select the correct answer.
    10·1 answer
  • Requests to retrieve data written in a language such as SQL are called…
    8·1 answer
  • How to tell if your phone is being monitored
    12·1 answer
  • A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!