1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
3 years ago
8

What are some consequences of posting inappropriate material online? (Choose all that apply)

Computers and Technology
2 answers:
Rina8888 [55]3 years ago
5 0
All except the third one unless it’s something really bad. But otherwise it’s without the third one
ss7ja [257]3 years ago
3 0

Answer:

I think all of them is a consequence of posting inappropriate material online

You might be interested in
Match each type of option on the left with a corresponding function on the right.
Marta_Voda [28]

Answer:

yes. the above is correct

Explanation: q posted

7 0
3 years ago
Internet is a boon or curse
tangare [24]
It really depends on what you're using it for such as looking up a recipe or an answer to a question. If you're using it for illegal purposes or looking up things that are seen as morally wrong by other people it can make the internet seem like a bad thing. But the internet wasn't created with that intended purpose so again it's just your own personal opinion.
4 0
3 years ago
When making programmed decisions, the information needed to make this decision is __________, and the problem is highly structur
pentagon [3]

Answer:

readily available

Explanation:

The information needed to make this decision is readily available. That is because such decisions have been made countless times that strict guidelines have been created to handle any similar future decisions. These strict guidelines are organized as a sequence of events that must be followed accordingly and are always available for when the situation arises. Examples of this would be "What to do when a machine breaks?" or "What constitutes firing an employee?"

7 0
3 years ago
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
The disk drive is a secondary storage device that stores data by _____ encoding it onto a spinning circular disk.
Lisa [10]
Magnetically





------------------------------
8 0
4 years ago
Other questions:
  • Gloria needs to show in spreadsheet form the number of students in her class who speak different languages. Which type of graph
    7·1 answer
  • A must decode this code. I guess is not a Cesar. The last line is a email adress.
    15·1 answer
  • 4. Scientists are not concerned with the human impact on the environment. True or False?
    6·2 answers
  • What happens when you print a document with red, green, and blue underline?
    7·2 answers
  • Jimmy and his friends are creating a rock band and have decided to turn his garage into a recording studio. He wants to sell the
    9·2 answers
  • What is the working principle of computer?
    9·1 answer
  • ​User documentation _____. Group of answer choices ​allows users to prepare overall documentation, such as process descriptions
    9·1 answer
  • I need the answer ASAP!!!! I’ll mark brainliest if correct
    13·1 answer
  • Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential
    12·1 answer
  • GUYS THERE IS A HACKER IN BRAINLY PLEASE DONT PRESS ON THE WEBSITE THEY WILL HACK YOU.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!