1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataliya [291]
3 years ago
10

A group of students are collaborating on an online research project. What is an example of appropriate online behavior?

Computers and Technology
2 answers:
Nezavi [6.7K]3 years ago
8 0

Helpful encouragement, reliable resources, no innappropriate language, staying on topic, staying on task, etc.

german3 years ago
4 0
Helping each other out
You might be interested in
Susan is a network monitoring technician working on a firewall for her company’s network. In the process to determine an open po
Mekhanik [1.2K]

Answer:

type C:\>nmap 203.0.113.100 and Enter

Explanation:

6 0
2 years ago
Your welcome 95 points gg
STatiana [176]

Answer:

tysm :))

Explanation:

have a great day

4 0
3 years ago
Read 2 more answers
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
3 years ago
You can use a(n) to call a function in response to an event?
uranmaximum [27]

Answer:

Simply put: A callback is a function that is to be executed after another function has finished executing — hence the name 'call back'. ... Functions that do this are called higher-order functions. Any function that is passed as an argument is called a callback function.

Explanation:

6 0
3 years ago
Which group on the home tab contains the line spacing attribute?
Juli2301 [7.4K]

Answer:

The Paragraph group on the Home tab contains commands to set and control several format options for a paragraph. The options include alignment, indentation, line spacing, and pagination. click Ctrl+J to justify. You can indent individual paragraphs so they appear to have different margins from the rest of a document.

Explanation:

comment an let me know how it helps

8 0
3 years ago
Other questions:
  • It is generally safe to provide your social security number to
    7·2 answers
  • If you work up to your potential but fall short of your goals, you
    15·2 answers
  • A car holds 16 gallons of gasoline and can travel 312 miles before refueling. Write aC++ program that calculates the number of m
    9·1 answer
  • Which of these engine components forms a tight seal between the piston and the cylinder and is necessary for proper engine opera
    13·2 answers
  • Discuss advantages and disadvantages of Twisted Pair?
    6·1 answer
  • When projecting a presentation on a large screen, what should your minimum font size be?
    6·2 answers
  • How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
    15·1 answer
  • Which letter shows the ball when it has the maximum kinetic energy
    15·1 answer
  • I need help 50 points and brainiest if you answer
    10·2 answers
  • In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniqu
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!