1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
7

Which is an example of a student practicing ethical behavior online??

Computers and Technology
2 answers:
galina1969 [7]3 years ago
8 0

Answer:

Zohar abides by his school's internet policy and does not visit questionable websites. is an example of a student practicing ethical behavior online

Explanation:

Polina using a segment from a magazine article in a report without permission is not a good ethical behavior online it is copyright violation.

Maxim receiving mean text messages and retaliating can't be said to be a good online behavior, it is seen as cyber bullying while creating a fake password and posting rude comments is also sen as cyber bullying and it can't be considered a good online behavior.

Ethical online behaviors are the kind of good online behavior that users exhibit online in consideration of how other users of the same internet space might feel as seen in Zohar's behavior

professor190 [17]3 years ago
4 0

Answer:

Zohar abides by his school’s Internet policy and does not visit questionable websites.

Explanation:

Only the first one is ethical behavior. The second choice is an example of plagiarism. The third & fourth choices could be examples of cyberbullying.  

You might be interested in
A(n) ____________ specifies a variable's name and data type.
Alla [95]
I think that would be a function
4 0
3 years ago
Read 2 more answers
Christina used the following expression to calculate the average ages of her three program users: average = age1 + age2 + age3 /
aleksley [76]
I am thinking it's A. Not so sure though.
6 0
3 years ago
Read 2 more answers
Please help me!
BaLLatris [955]

Answer:

Choose what you think based on this.

Explanation:

with a for loop:

>>> students = 3

>>> for student in range(students):

>>> print(student)

would output

>>> 0

>>> 1

>>> 2

with a while loop now:

>>> students = 3

>>> student = 0

>>> while student < students:

>>> student = student + 1

>>> print(student)

the for loop is more compact than the while loop. But there may be some times when a you cant do a for loop. The first question is more than likely definite but I don't know the second answer.

8 0
3 years ago
Read 2 more answers
Write a Java expression that converts the value of 'y' into an integer, and assigns the value to 'x'.
Kamila [148]

\huge{\purple{\underline{\underline{\mathfrak{\red{\bigstar answer:: \bigstar}}}}}}

int y = (int) y;

int x = y;

<h2><u>Hope</u><u> </u><u>it</u><u> </u><u>helps</u><u>.</u><u>.</u><u>♪</u></h2>
7 0
2 years ago
Ronald attended a seminar about the best practices to use when browsing the Internet. The presenter used the following statement
Salsk061 [2.6K]

Answer:

Ronald missed the words: One-time password, Secure  

Explanation:

Whenever we use public computer, there are possibilities to steal the user data by hackers. It might not be safe to use as like we have protection in personal or Office computers. But when a situation arises to use a public system, it is always recommended to use one-time password so that the logins are not misused thereafter.

Even if the hackers try to misuse, the user will get a message / authentication reply to use the login and thus we are safe. Also, always browse only secured website ie. “https”.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which activity represents a violation of the licensing agreement
    7·2 answers
  • Write a program that asks the user to input four numbers (one at a time). After the four numbers have been supplied, it should t
    6·1 answer
  • PLEASE HELP ME!!!!
    12·2 answers
  • The chip that controls the radio frequency waves within a device
    9·1 answer
  • A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
    6·1 answer
  • The main screen of wireshark includes several shortcuts. which shortcut category displays a list of the network interfaces, or m
    15·1 answer
  • PLEASE HELP!!! History abounds with instances in which the work of scientists and artists were affected by the political, religi
    9·1 answer
  • Can you please help me
    9·1 answer
  • Write a program which will enter information relating to a speeding violation and then compute the amount of the speeding ticket
    12·1 answer
  • The range of an area where users can access the Internet via high-frequency radio signals transmitting an Internet signal from a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!