1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
11

PLEASE HELP ME ASAP!!!!

Computers and Technology
1 answer:
DanielleElmas [232]3 years ago
5 0
1. Cellphones give "rewards" in the form of notifications that alert the user to a waiting surprise. This releases dopamine; a molecule that our body produces naturally. The presence of dopamine signifies lust, love, infidelity, motivation, attention, femininity, learning, and addiction. The mind & body begin to unconsciously (because dopamine is naturally occurring) crave that "high" one gets from, let's say, getting a large number of reactions to an Instagram post. As a result, the user posts more to get more reactions. They spend less & less time engaging with those around them. They are often irritated or anxiety ridden.

2. Alone time is EXTREMELY important & often difficult to get. One needs time to decompress, refresh & problem solve. This becomes an impossible task when one's senses are being constantly bombarded by ringtones & alerts.

3. Using electronic devices to frighten or harass. Ex- sending threatening emails.

4. Using electronic devices to bully someone with intimidating or hurtful comments and/or pictures.

5. Creating a fake social media or dating profile with the intention of deceiving people.

6. Electronically written code capable of stealing & destroying data.

7. Stealing & using someone's personal information for the purpose of financial/material gain.

8. Theft committed using a credit/debit card. It usually happens with online shopping.

9. The act of "breaking in" to an electronic device without authorization.

10. Acquiring money under false pretenses.
You might be interested in
Write all the hexadecimal numbers in sequence from 9F7H to A03H
Harlamova29_29 [7]

Answer:

(9F7, 9F8, 9F9, 9FA, 9FB, 9FC, 9FD, 9FE, 9FF, A00, A01, A02, A03)

Explanation:

(9F7)_{16} =  (2551)_{10}

(A03)_{16} = (2563)_{10}

This means that we must find all hexadecimal values from 2551 to 2563, or 9F7 to A03. You can convert from decimal to hexadecimal for each one, or just count.

5 0
3 years ago
After running a Google Search Ads campaign for several months, Meredith notices sales of her advertised products are starting to
lesya692 [45]

Answer:

The campaign could be improved by 78% if the listed recommendations are followed.

Explanation:

While conducting the following Search advertising program for a few months, Meredith has announced that revenues of its branded goods are beginning to slow. She reviews her Google Advertising Suggestions webpage which states that her campaign's performance ranking is 22 points.

Thus, the campaign will be increased by 78% if the above recommendations are implemented to inform Meredith regarding its Google Search Advertising plan.

5 0
3 years ago
W t f is a ground fault circuit interrupter?
LuckyWell [14K]

lol you are awesome but to break it down for you a circuit inter-putter is is a plug in the is on the floor i have 2 of these in my home. i hope this helps you Mr. w t fer lol hahahaha XD

8 0
3 years ago
Read 2 more answers
Name at least 3 different portable computer devices that can be purchased
rosijanka [135]

Answer:

Smart Phone

Cameras

Console Controller

Brainliest and please say if its right!!

3 0
3 years ago
Read 2 more answers
What technology allows you to hide the private IP address of a system from the Internet?a. SSLb. RADIUSc. PPTPd. NAT
Greeley [361]

Answer:

The answer is "Option d".

Explanation:

In networking, NAT refers to the Network Address Translation. This process is used to translate computer IP addresses into a single IP address in your local network. It allows private IP networks to connect to the Internet using unregistered IP addresses. and other options are incorrect that can be described as follows:

  • In option a, SSL stands for Secure Sockets Layer. It is used in transmission of documents or data over a network that's why it is not correct.
  • In option b, RADIUS stands for Remote Authentication Dial-In User Service. It is used to manage the data on a network.
  • In option c, PPTP stands for Point-to-Point Tunneling Protocol. It is used to provide a set of rules for communicating through a network that's why it is not correct.

6 0
3 years ago
Other questions:
  • Using the bitwise AND operation, the result of 1 AND 0 is ___________. 10100100 ___________ 11010101 = 01110001. A common way to
    15·1 answer
  • What command in windows re gives you the opportunity to manage partitions and volumes installed on the system?
    7·1 answer
  • Im being timed please help!!
    7·2 answers
  • Name the contributions of Steve Jobs and Bill Gates, with respect to technology.
    5·1 answer
  • For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which fe
    5·2 answers
  • True or false.local and cloud backup differs in where the backup is saved
    15·2 answers
  • If my usb could unlock my computer with a tool then could i be able to open it using ip unlock
    9·1 answer
  • Which of the following describes the line spacing feature? Select all that apply. adds space between words adds space between li
    8·1 answer
  • Ew<br>subject: Computer<br>11101÷101<br> binary operations<br>​
    7·1 answer
  • 23. Convert the following to Megabytes<br> a) 2GB<br> b) 2056 Bytes-
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!