1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
3 years ago
15

Respecting your self and others, educating yourself and connecting with others, and protecting yourself and others are all aspec

ts of being a good __________ _________ (2 words) enter answer
Computers and Technology
1 answer:
Alexandra [31]3 years ago
7 0

Respecting your self and others, educating yourself and connecting with others, and protecting yourself and others are all aspects of being a good

<u>Digital citizen.</u>

Explanation:

The term <u>Digital Citizen</u> is used to refer to a  person using information technology (IT) in order to engage themselves in a society, politics, and government.

Digital citizens are "those who use the internet regularly and effectively.

The term <u>Digital Citizen </u>is used in Digital world to make reference to those people who   uses the internet and its  connections to communicate/interact with the digital environment around an individual

<u>The nine elements  of Digital citizenship are:</u>

  1. <u>Access:</u> It means full electronic participation of an individual  in society.
  2. <u>Commerce:</u> The individual uses digital technology for electronic buying and selling of goods.
  3. <u>Communication:</u> Using digital means for electronic exchange of information.
  4. <u>Literacy: </u>process of teaching and learning about technology and the use of technology.
  5. <u>Etiquette:</u> electronic standards of conduct or procedure.
  6. <u>Law: </u>electronic responsibility for actions and deeds.
  7. <u>Rights & Responsibilities</u>: those freedoms extended to everyone in a digital world.
  8. <u>Health & Wellness: </u>physical and psychological well-being in a digital technology world.
  9. <u>Security (self-protection)</u>: electronic precautions to guarantee safety.
You might be interested in
Pls someone help me with these four questions
ipn [44]

Answer:

16. Grace Hopper. 1959.

8 0
3 years ago
The capital letter Wis expressed as U+0057 in which system?
Paul [167]

The capital letter W is expressed as U+0057 in Unicode system

  • The Unicode system is known as a type of coding system which contains worldwide character encoding standard that gives a code to every character and symbol in every language spoken in the world today.

  • It is known as the encoding standard that is used in all languages, It makes sure that an individual can retrieve or combine data with the use of different languages altogether.

Conclusively, we can say that the The capital letter W is expressed as U+0057 in Unicode system

Learn more from:

brainly.com/question/24736173

6 0
2 years ago
Read 2 more answers
Moore’s law refers to?
puteri [66]

Answer:

Moore’s law states that processor speeds, or overall processing power for computers will double every two years.

Explanation:

  • Moore’s law is more than an observation than a law which was originated in 1970. The observation is about the number of transistors that is present in any system or an integrated system that will be doubled every couple of years.
  • The real-world application of Moore's law can be seen during computing your business taxes, piloting a spaceship, or changing the television station, etc.
7 0
3 years ago
Some machine/items/gadget having only hardware​
shepuryov [24]
Yeh it’s becoz they work with hardware that’s why
6 0
3 years ago
ossless compression tools generally use either Huffman coding or Lempel-Ziv-Welch (LZW) coding. Discuss the advantages and disad
anygoal [31]

Answer:

It we were asked to develop a new data compression tool, it is recommended to use Huffman coding since it is easy to implement and it is widely used.

Explanation:

The pros and the cons of Huffman coding

Huffman coding is one of the most simple compressing encoding schemes and can be implemented easily and efficiently. It also has the advantage of not being patented like other methods (e.g. arithmetic codingfor example) which however are superior to Huffman coding in terms of resulting code length.

One thing not mentioned so far shall not be kept secret however: to decode our 96 bit of “brief wit” the potential receiver of the bit sequence does need the codes for all letters! In fact he doesn’t even know which letters are encoded at all! Adding this information, which is also called the “Huffman table” might use up more space than the original uncompressed sentence!

However: for longer texts the savings outweigh the added Huffman table length. One can also agree on a Huffman table to use that isn’t optimized for the exact text to be transmitted but is good in general. In the English language for example the letters “e” and “t” occur most often while “q” and “z” make up the least part of an average text and one can agree on one Huffman table to use that on average produces a good (=short) result. Once agreed upon it doesn’t have to be transmitted with every encoded text again.

One last thing to remember is that Huffman coding is not restricted to letters and text: it can be used for just any symbols, numbers or “abstract things” that can be assigned a bit sequence to. As such Huffman coding plays an important role in other compression algorithms like JPG compression for photos and MP3 for audio files.

The pros and the cons of Lempel-Ziv-Welch

The size of files usually increases to a great extent when it includes lots of repetitive data or monochrome images. LZW compression is the best technique for reducing the size of files containing more repetitive data. LZW compression is fast and simple to apply. Since this is a lossless compression technique, none of the contents in the file are lost during or after compression. The decompression algorithm always follows the compression algorithm. LZW algorithm is efficient because it does not need to pass the string table to the decompression code. The table can be recreated as it was during compression, using the input stream as data. This avoids insertion of large string translation table with the compression data.

3 0
4 years ago
Other questions:
  • What operating system allows various teams in its office to network and collaborate on projects
    5·1 answer
  • What does iSCSI stand for?
    5·2 answers
  • What is the post condition of an expression or variable
    11·1 answer
  • Which online resource is usually not free?
    10·2 answers
  • How can parents be health educators in family​
    13·1 answer
  • I need help with workplace safety systems please help
    10·1 answer
  • Describe PROM, EPROM and EEPROM memories​
    7·1 answer
  • Here's a better picture of my pc mouse and keyboard​
    5·2 answers
  • in a stop-and-wait arq system, the bandwidth of the line is 1 mbps, and 1 bit takes 10 ms to make a round trip. if the system da
    12·1 answer
  • which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!