1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
11

PLEASE HELP ME ASAP!!!!

Computers and Technology
1 answer:
DanielleElmas [232]3 years ago
5 0
1. Cellphones give "rewards" in the form of notifications that alert the user to a waiting surprise. This releases dopamine; a molecule that our body produces naturally. The presence of dopamine signifies lust, love, infidelity, motivation, attention, femininity, learning, and addiction. The mind & body begin to unconsciously (because dopamine is naturally occurring) crave that "high" one gets from, let's say, getting a large number of reactions to an Instagram post. As a result, the user posts more to get more reactions. They spend less & less time engaging with those around them. They are often irritated or anxiety ridden.

2. Alone time is EXTREMELY important & often difficult to get. One needs time to decompress, refresh & problem solve. This becomes an impossible task when one's senses are being constantly bombarded by ringtones & alerts.

3. Using electronic devices to frighten or harass. Ex- sending threatening emails.

4. Using electronic devices to bully someone with intimidating or hurtful comments and/or pictures.

5. Creating a fake social media or dating profile with the intention of deceiving people.

6. Electronically written code capable of stealing & destroying data.

7. Stealing & using someone's personal information for the purpose of financial/material gain.

8. Theft committed using a credit/debit card. It usually happens with online shopping.

9. The act of "breaking in" to an electronic device without authorization.

10. Acquiring money under false pretenses.
You might be interested in
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
notka56 [123]

Answer:

The answer is "compromise"

Explanation:

In computer science, the comprised system is used to describe as any technological resource, that has been negatively affected by an untrustworthy source for nondisclosure, integrity or accessibility either deliberately or inadvertently.

  • In this, the mechanical interaction from the unauthorized source or technological progress can result in compromise.
  • This helps you and the partner to meet each other's interests by taking into consideration both the positions and the solution to the main problem.

4 0
3 years ago
Read 2 more answers
Could someone give an example or tell me what all of these mean? (For internet source citing) Evaluation: • Domain Name: • Autho
koban [17]

Evaluation-the making of a judgment about the amount, number, or value of something; assessment

Domain Name-Is a websites name (ex-Google)

Authoritativeness-The quality of possessing authority. The quality of trustworthiness and reliability.

Accuracy-the quality or state of being correct or precise

Timeliness-the fact or quality of being done or occurring at a favorable or useful time.

Objectivity-the quality of being objective.

Writing Style and Mechanics-Style has to do with how a piece of writing sounds. Everyone has a style which develops along with their writing.

Paragraph structure: Each paragraph should begin with a topic sentence that provides an overall understanding of the paragraph. ...

Sentence length: Sentences should be kept as short as possible so that their structure is simple and readable.

Graphics-are visual images or designs

Links- is an open source text and graphic web browser with a pull-down menu system.

8 0
3 years ago
What makes software engineering an engineering discipline and what makes software engineering different from other engineering d
sweet [91]
26 + 26 = 57 but when it takes away 2 it = 55 if you really wanna think about it that much
8 0
3 years ago
Most _____ focus on galning entry over the internet to a secure computer system by finding a
dangina [55]

Most <u>Malware</u>  focus on gaining entry over the internet to a secure computer system by finding a  working user ID and password combination.

<u>Explanation:</u>

A malware is a small computer program which works on the user’s system without knowing to the user. Different malware works differently.

Some malware sits on the user computer, create multiple unnecessary files and make the hard drive full, some people create viruses to show their computer skills which they tend to prove in a wrong way, some malware sits in the computer to steal data especially while using internet.

So there are malware's like Virus, Worm, Trojan, spyware, etc.

5 0
3 years ago
Discuss the role of the concept behind the "Internet of Things (IoT)" in today's digitally connected society.
AlekseyPX

Answer:

IoT Definitions: The term Internet of Things generally refers to scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to generate, exchange and consume data with minimal human intervention.

Explanation:

hope that helps

7 0
3 years ago
Other questions:
  • Zoom Vacuum, a family-owned manufacturer of high-end vacuums, has grown exponentially over the last few years. However, the comp
    11·1 answer
  • Which statement is true of Web-based electronic data interchange (Open EDI)? a. It consists of international agreements on priva
    7·1 answer
  • Which of the following does every font that you choose communicate, either on a conscious or subconscious level?
    10·2 answers
  • To show the navigation pane if it is hidden, click the ____ button
    12·2 answers
  • In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow
    9·1 answer
  • This is a quick and easy program that will let you practice the basics of the switch statement. You will ask the user to enter a
    6·1 answer
  • Which phrase best describes a scenario in Excel 2016?
    5·2 answers
  • Is this App for real?​
    5·1 answer
  • Select all of the reasons Windows 95 increased the popularity of Windows.
    12·1 answer
  • Create a vector of structures experiments that stores information on subjects used in an experiment. Each struct has four fields
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!