1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
11

PLEASE HELP ME ASAP!!!!

Computers and Technology
1 answer:
DanielleElmas [232]3 years ago
5 0
1. Cellphones give "rewards" in the form of notifications that alert the user to a waiting surprise. This releases dopamine; a molecule that our body produces naturally. The presence of dopamine signifies lust, love, infidelity, motivation, attention, femininity, learning, and addiction. The mind & body begin to unconsciously (because dopamine is naturally occurring) crave that "high" one gets from, let's say, getting a large number of reactions to an Instagram post. As a result, the user posts more to get more reactions. They spend less & less time engaging with those around them. They are often irritated or anxiety ridden.

2. Alone time is EXTREMELY important & often difficult to get. One needs time to decompress, refresh & problem solve. This becomes an impossible task when one's senses are being constantly bombarded by ringtones & alerts.

3. Using electronic devices to frighten or harass. Ex- sending threatening emails.

4. Using electronic devices to bully someone with intimidating or hurtful comments and/or pictures.

5. Creating a fake social media or dating profile with the intention of deceiving people.

6. Electronically written code capable of stealing & destroying data.

7. Stealing & using someone's personal information for the purpose of financial/material gain.

8. Theft committed using a credit/debit card. It usually happens with online shopping.

9. The act of "breaking in" to an electronic device without authorization.

10. Acquiring money under false pretenses.
You might be interested in
Please helpppppppppp​
olga_2 [115]

Answer:

111001 - 57

1100000 - 96

1010101 - 85

1001000 - 72

:)

7 0
3 years ago
One of Kyle’s clients called to complain that his computer was running really slow. Kyle went to the client’s work area and star
12345 [234]

Answer:

The computer must be infected with malicious virus.

Explanation:

Since Kyle did a troubleshooting of the client’s computer by running Disk Defragmenter and Disk Clean-up utilities and found out, that the CPU was running several processes in the Windows task manager.

After restarting the computer, he noticed a long load time for Windows and saw several processes that he did not recognize.

This is obviously a sign of an infected system by a malicious virus.

Kyle should install an antivirus program such as Avast or Kaspersky on the computer and run a deep virus scan to detect any virus.

4 0
3 years ago
Example of vector image format​
emmasim [6.3K]

Answer:

JPEGs, GIFs and PNGs are common raster image types. ...

Vector images, alternatively, allow for more flexibility. Constructed using mathematical formulas rather than individual colored blocks, vector file types such as EPS, AI and PDF* are excellent for creating graphics that frequently require resizing.

7 0
3 years ago
¿Qué tipo de información deben proteger los sitios de comercio electrónico?​
Ksivusya [100]
Come Estás How are you
4 0
2 years ago
Read 2 more answers
Jim is an experienced security professional who recently accepted a position in an organization that uses Check Point firewalls.
Contact [7]

Answer: D) CCSA

Explanation: THE CHECKPOINT CCSA(CERTIFIED SECURITY ADMINISTRATOR) is a computer based certification offered by different Computer Institutions in order to equip computer experts or systems engineers on the activities or process or knowledge needed to enhance the security domain of computer systems.

Check Point Firewall is a component of the Software Blade architecture which provides advanced firewall features like VPN and mobile device connectivity.

5 0
4 years ago
Other questions:
  • Andrea wants to to install a new internet connection . she eants to use the fastest one she can find . what are the maximum spee
    14·1 answer
  • Which of the following is a benefit, as well as a risk, associated with client/server networks?
    14·1 answer
  • What technique creates different hashes for the same password? ccna routing protocols final answers?
    7·1 answer
  • A _____ is an example of a systems program. A. command interpreter B. web browser C. text formatter D. database system
    10·1 answer
  • How does this happen on brainly????
    12·2 answers
  • Determine whether the phrase below is a sentence or a fragment.
    12·1 answer
  • What is the output?
    6·2 answers
  • Can someone plzzzzzzz help
    14·2 answers
  • What computing paradigm can solve a problem by describing the requirements, without writing code in a step-wise fashion to solve
    8·1 answer
  • List and describe the 3 tasks learners can do in a Technology classroom.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!