1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zavuch27 [327]
3 years ago
5

A school librarian has been asked to identify inappropriate Internet usage. Which students would most likely be reported to the

principal? Check all that apply.
a student who researches various websites that show how to gamble online
a student who finds a link to a news story about the Ku Klux Klan for a social studies project
a student who visits a special website with step-by-step directions on how to make a bomb
a student who posts jokes online about the cultural heritage of other students
a student who logs onto the school’s social media site to see pictures of classmates
Computers and Technology
2 answers:
Jlenok [28]3 years ago
6 0

Answer:

a student who researches various websites that show how to gamble online

a student who visits a special website with step-by-step directions on how to make a bomb

a student who posts jokes online about the cultural heritage of other students

Explanation:

adoni [48]3 years ago
5 0

Answer:

a student who researches various websites that show how to gamble online

a student who visits a special website with step-by-step directions on how to make a bomb

a student who posts jokes online about the cultural heritage of other students

Explanation: These are all most likely against school policy. In fact attempting to make a bomb is illegal.

You might be interested in
PYTHON:Given the dictionary, d, find the largest key in the dictionary and associate the corresponding value with the variable v
lapo4ka [179]

di = {5: 3, 4: 1, 12: 2}

val_of_max = di[max(di)]

print(val_of_max)

I hope this helps!

4 0
3 years ago
Who loves you tube , anyone?
kodGreya [7K]

I LIKE IT DO YOU ALSO LOVE IIT

8 0
3 years ago
Read 2 more answers
What is the definition of "potential energy"?
muminat
Well potential energy is energy that is in a object while its not moving so i would go your third option 
4 0
3 years ago
Read 2 more answers
What natural resources products are discussed in the article? Are they renewable or nonrenewable?
Alex

Where is the article

4 0
3 years ago
Read 2 more answers
In comparing a computer to the human brain, the computer's hardware is like _____ and the computer's software is like _____.
Ne4ueva [31]
This includes application software<span> such </span>as<span> a word processor, which enables a user to perform a task, and system </span>software<span> such </span>as<span> an operating system, which enables other </span>software<span> to run properly, by interfacing with hardware and with other </span>software<span>.
</span>
Computer hardware<span> is the collection of physical parts of </span>a computer system<span>. This includes </span>the computer<span> case, monitor, keyboard, and mouse. It also includes all the parts inside </span>the computer<span> case, such </span>as<span> the hard disk drive, motherboard, video card, and many others. </span>Computer hardware<span> is what you can physically touch.


</span>
8 0
3 years ago
Other questions:
  • Write an algorithm whether the given number is positive negative or zero​
    5·1 answer
  • I have all the points to level up to virtuoso, but it hasn't yet does anyone know when it will?
    9·1 answer
  • Which of the following variable names is not valid? 1price 1 price price 1 price1
    15·2 answers
  • Which of the following is not a command for determining if MySQL is running on Linux (Ubuntu)?
    7·1 answer
  • Choose three typical responses for the Host utility, and explain what they indicate.
    6·1 answer
  • Write a method that returns a String that is just the first and last character of the given string Your return value should be o
    8·1 answer
  • How does a computer do its work? Mention its working principle.<br><br>​
    8·1 answer
  • Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of t
    12·1 answer
  • Classify computer based on signal
    14·1 answer
  • Database queries is an example of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!