1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
telo118 [61]
3 years ago
7

The excessive use of the internet and the web for personal use at work is sometimes called ____ .

Computers and Technology
2 answers:
Elodia [21]3 years ago
7 0
This is called Cyberslacking
max2010maxim [7]3 years ago
3 0
Hey there Cutecatgirl7865,

The excessive use of the internet and the web for personal use at work is sometimes called _____.

Answer:

Cyberslacking.

Hope this helps :D AND, I hope you will kindly mark my answer as the brainliest. THX♥

<em>~Danielle♥</em>
You might be interested in
Explain how data structures and algorithms are useful to the use of computer in data management<br>​
laiz [17]

Answer:

programmers who are competent  in data  structures and algorithms  can easily perform the tasks related  to data processing ,automated reasoning ,or calculations . data structure and algorithms  is significant  for developers  as it shows their problems solving abilities amongst the prospective employers .

5 0
2 years ago
Methods that require you to use an object to call them are called ____ methods.1. accessor2. instance3. internal4. static
spin [16.1K]

Answer:

Option 2 i.e., instance methods is the correct answer to the following question.

Explanation:

Because the instance method or function is the function that needed the class object to be called.

<u>For Example:</u>

//header file

#include <iostream>

using namespace std;

//define class

class Test

{

public:

//instance method

void getins()

{  

cout<<"I AM Instance method";

}

};

int main()

{

//creating object

Test obj;

//calling of instance method through class object

obj.getins();

}

<u>Output</u>:

I AM Instance method

3 0
3 years ago
What are Operating Systems?
horrorfan [7]

Answer:

the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.

5 0
2 years ago
(tco 7) the asp.net ajax client-side framework is loaded on the _____ for an asp.net web application.
jok3333 [9.3K]

a client-side framework is loaded on the client side, ie., the browser.

4 0
2 years ago
What are some of the major issues with geotagging? What concerns you the most?
Finger [1]

Answer:

Major issues with geotagging include the ability to pinpoint the exact location where a photo was taken, which raises privacy concerns.

What concerns me the most is when a geotag of an unsuspecting victim's location falls into the wrong hands.

Explanation:

Geotag -  A geographical tag that can attach to SMS text messages, media such as photos and images, etc. The Geotag is measured in the longitude and latitude at which the image or text message took place.

4 0
3 years ago
Other questions:
  • Solve system of equations. <br>x+2y-z=4<br>2x-y+3z=8 <br>-2x+3y-2z=10
    12·1 answer
  • 2. Use inheritance to create a hierarchy of Exception classes -- EndOfSentenceException, PunctuationException, and CommaExceptio
    6·1 answer
  • Write a program that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer values t
    5·1 answer
  • Please answer <br><br> Steps 1-6 <br><br> Visual basics
    7·1 answer
  • Which logic correctly describes an algorithm to find the smallest of the three numbers a, b, and c and store the smallest number
    15·1 answer
  • Identify some advantages of using Excel over lists, paper files, or simple word documents? Describe some disadvantages of using
    15·1 answer
  • Select the best answer from the drop-down menu. ________ networks use cables connected directly to the computer. Signals sent in
    11·1 answer
  • From which country samsung is​
    6·2 answers
  • Which statement is true about biometrics as an authentication method?​
    11·1 answer
  • The readline method of bufferedreader returns _____ when end of file is reached.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!