1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
3 years ago
13

Why might your digital footprint be important when you are applying for collage

Computers and Technology
1 answer:
AlladinOne [14]3 years ago
4 0
College basically determines what you are gonna be doing for a living. Your digital footprint is your internet history which you can prevent from taking a wrong step and heading in a wrong direction. First, I would suggest staying away from social media and posting pictures that you wouldn’t want your family to see.
You might be interested in
A student is curious about how a Web site appears on his computer screen. On a piece of paper,
Temka [501]

Answer:

When you go out to open a web page then you should know that It’s not the OSI model that comes into the picture, and in fact, it is just for study purposes, and it does not work in real network work, The exact one used is the TCP/IP model. However, the OSI model separates the concepts into various layers, and hence used for study purposes.

When you try to open a web address through a web browser, then the web browser uses the HTTP that is an Application layer protocol.

The web browser thus finds the IP address of the URL through the Domain Name System. And this is as well the Application layer protocol.

However, you will find that the actual process is even more complex.

The browser now forms an HTTP packet which mentions, “Hello I would like to get the web page from the server”. Now the browser sends the HTTP packet to the TCP, which stands for Transmission control protocol, and is a transport layer protocol.

Here the adjacent layer interaction works. However, that is on the same device, and currently, the packet is on your PC only. The ALI states that the higher layer asks the next lower layer protocol to get done the service, and the lower layer delivers the service to the higher layer just above it. And this interaction gets repeated until the data finds itself at the lowest layer.

The main job of the TCP is to create a pipe in between you and the server, such that the data can be transferred via the pipe. And for this the TCP on your PC talks to the TCP on the server.

Now the TCP puts up its details over the HTTP packet. And these are necessary for managing the pipe/session.

Now the packet is handed to the IP process or the internet protocol, which is an internet layer protocol. The main task performed by the IP is addressing and routing. It's like a postal service, that routes the letter via various postal offices to reach the correct one. IP now puts its info on top of the TCP packet. This info is required for routing on the internet.

The packet is now handed over to the network access or the network interface layer. And this defines the hardware and protocols that are required for delivering the data via the physical network. The majority of the times the physical network used is the Ethernet.

Your PC now binds the IP packet in between the Ethernet header and the Ethernet trailer, and thus forms an Ethernet frame. You should know that Ethernet has a MAC address that is being made use of for sending the frame within the LAN.  And now the PC transmits the Ethernet frame bits physically with the help of the electricity that flows through the Ethernet Cables.

The packet now reaches the server. The web server recreates the bits through the interpretation of the electrical signals. And the webserver now removes and discards the ethernet header and trailer from the ethernet frame, and de encapsulates it. And in the same manner, it reads through the TCP data, and finally transfers that to the HTTP process which can figure out the HTTP get request.

Now the webserver in s similar manner sends back the detail. And this process can be repeated any number of times.

Also, keep in mind that in case of secure website, there is one extra step, and that is the verification of the SSL certificate, at both the client and server end. Rest of the process is same.

Explanation:

Please check the answer section.

6 0
3 years ago
What two factors make up the skills of a good typist
Vikki [24]

Answer:

I feel to be a good typist one would have to have a good grasp of reading, grammar, and the ability to make errors to a lesser degree than more so. I can type, myself, 120-150 wpm with an error rate of 0-2. I also have the ability of not having to look at the keyboard as I type, and have a good eye on catching errors.

Explanation:

5 0
3 years ago
Choose the option that best matches the description given. The older term, social service, referred to advancing human welfare.
egoroff_w [7]

Answer:

Social Assistance

Explanation:

Provision and disbursement of intervention in other to palliate the suffering and want of an individual, group or community can be described as rendering social assistance. Assistance which also means helping people fulfill their needs could be offered by the government, non-governmental organizations or individuals personnels. Rendering social assistance could be in the form of cash or gift offerings, provision of food for the hungry, shelter for the homeless, medical interventions for the sick and catering for other touch points of the needy.

4 0
3 years ago
Which tab is used to edit objects on the Slide Master and layouts?
andreev551 [17]
When your trying to master the slide layouts you must go to the Slide Layout tab.
4 0
3 years ago
What is one way for an entrepreneur to decrease risk?
marysya [2.9K]

Answer

we can  decrease risk for an entrepreneur by creating a team of trusted advisors to rely on.

there are some points that we can take in mind know how  to position our company as a safe position.

revenue streams and additional technology, paving the way for future growth.

Entrepreneurs can use all these  unique strategies to decrease those risk

8 0
3 years ago
Other questions:
  • In order to delete an object, it must be?
    14·1 answer
  • Which two statements give good definitions of financial credit
    8·1 answer
  • In ethical hacking testing, what approaches exist for the ethical hacker to choose from depending on how much information is kno
    10·2 answers
  • What is this system's reliability at 700 hours? Component failure data is: Failure Rate of A = 0.0007 failures/hour Reliability
    9·1 answer
  • Which of the following are valid values for a String? (Select all that apply)
    7·1 answer
  • Write a program that:
    13·1 answer
  • If the executives for Office Max LLC, a chain of office supply stores, developed the chain's objectives by asking buyers and sto
    11·1 answer
  • For LG, on the app Messages, will the delete button on the upper right corner cancel a sending message?
    12·1 answer
  • The keys to successful outsourcing are accountability, reporting, and ___
    7·1 answer
  • Is Microsoft team voice lagging for people who use it I want to know I only want to know if you use it ok not if you don’t.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!