1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
11

The rules and guidelines for appropriate computer mediated communication are called ________.

Computers and Technology
2 answers:
I am Lyosha [343]3 years ago
5 0
<span>The correct answer is netiquette. This term refers to the acceptable and proper way to communicate on the Internet. The term is a combination of the words "Internet" and "etiquette." Etiquette is defined as the standard code of conduct for polite behavior in a particular context. In this case, the context is the Internet and the two words have been combined to create a new word, netiquette.</span>
lora16 [44]3 years ago
3 0

Answer:

its c

Explanation:

You might be interested in
Attackers craft malicious probe packets and scan for services such as HTTP over SSL (HTTPS), SMTP over SSL (SMPTS) and IMAP over
pentagon [3]

Answer:(d)Scan shows that no scanned port is live on the network

Explanation:

Honeypot shows any attempt of unauthorized access to information in the system. Scan showing not scanned port is live on the network shows the presence of honeypot so that hackers could be trapped to be believed that there are no scanned port.

4 0
3 years ago
"On a TCP/IP network, which of the following are used by a router to determine the destination of a packet?"
Nastasia [14]

Answer: Switching packets function.

Explanation: while the main function of a router is to forward packets to their target destination, this can be actualised by adopting a switching packet function.

Switching packet function is the process which the router uses to accept a packet from one interface and passes it to another interface. The main function the switching packet plays is to encapsulate the packets in the right data link frame type for the data link meant to be sent out.

The switching is about moving the packet to the right destination without been mistaken with the layer 2 switch function.

3 0
3 years ago
Technology that verifies a person's identity is _____. a smart card Automated Fingerprint Verification an EPD a digital ink pen
tresset_1 [31]
The answer is Automated fingerprint.
 Automated Fingerprint is the process that verifies a person's identity. It is primarily used for law enforcement agencies for criminal identification initiatives. It is important because it includes identifying a person suspected of committing a crime or linking suspects to unsolved crimes. 

3 0
3 years ago
Read 2 more answers
Suppose that an intermixed sequence of push and pop operations are performed on a LIFO stack. The pushes push the numbers 0 thro
nordsb [41]

Answer:

b) 01564 37928

e) 26 8 75 32 901

Explanation:

Pushes and pulls are the computer operations which enable the user to perform numerical tasks. The input commands are interpreted by the computer software and these tasks are converted into numeric values to generate output.

8 0
3 years ago
when demonstrating 2022 versa’s maneuverability, what available systems should you point out when backing up?
lana [24]

When demonstrating 2022 Versa's maneuverability, what you should you point out while driving in a parking lot is the excellent rearward visibility that is given or shown by the RearView Monitor.

2022 Nissan Versa is a new model by Nissan. They are known to have different technology and safety features. Its includes  automatic emergency braking with pedestrian detection, remote keyless entry etc.

This vehicle comes with 2 functions such as a 5-speed manual transmission or an Xtronic Continuously Variable Transmission. With this one can quickly adjusts to the best gear ratio for a easyy acceleration and efficiency.

Learn more about 2022 Versa's from

brainly.com/question/25980600

8 0
3 years ago
Other questions:
  • What's the difference in unicode value between 'e' and 'a'? (consult a table of unicode values):?
    7·1 answer
  • 2. a. Write pseudocode for a divide-and-conquer algorithm for finding valuesof both the largest and smallest elements in an arra
    11·1 answer
  • Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently and then prel
    8·1 answer
  • Quantas calorias os adolescentes devem consumir diariamente?
    14·1 answer
  • First, launch NetBeans and close any previous projects that may be open (at the top menu go to File ==&gt; Close All Projects).
    6·1 answer
  • Which item is essential to know before sketching a navigation menu flowchart? template specifics, such as horizontal or vertical
    12·1 answer
  • The continue statement _________.
    11·1 answer
  • Master pages are used to create
    7·1 answer
  • Stay at least _____ behind the vehicle ahead of you at all times.
    12·2 answers
  • Advantages of python programming language
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!