1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
11

An example of a __________________ in the United States are computer hackers, whose members engage in actions that subvert autho

rity, disrupt the Internet, and steal personal data in opposition to values and norms of dominant culture.
Computers and Technology
1 answer:
aleksandrvk [35]3 years ago
7 0

Answer: Counterculture

Explanation:Counterculture is the type of subculture that includes the regulation and belief which are different from the mainstream culture.This culture oppose the values of the main hub society.These are followed by the people who don't belief in the culture of the dominant group.

The example mentioned in the question displays the counterculture where the group of hackers belonging to other stream steal the information from the computers of the mainstream people as a sign of opposition.

You might be interested in
A project manager is working with a software development group to collect and evaluate user stories related to the organization’
MA_775_DIABLO [31]

Answer:

Answer: C Scrum

Explanation:

Answer: C Scrum would BEST support this objective, to collect and evaluate user stories related to the organization’s internally designed CRM tool.

3 0
4 years ago
There are four types of characteristics attributed to a flow: reliability, delay, jitter, and bandwidth. Explain how each of the
sergeinik [125]

Answer and Explanation:

Reliability is important because if the service lacks  lacks reliability this could mean losing a packet or acknowledgement which then requires retransmission.

Delay can be tolerable in different degrees by applications, for example online chatting or conferences need to have the minimum delay possible.

Jitter is the variation in delay for packets belonging to the same flow.

High Jitter: difference between delays is large

Low jitter: difference between delays is small.

Bandwidth depends on the application. In video conferences, for example, there is a need to send million of bits per second to refresh a colour screen while sending a email may not reach even a million.

4 0
3 years ago
Name the major types of computer systems from slowest to fastest. ​
Vadim26 [7]

Answer:

Cache is the fastest and most expensive, RAM is slower and less expensive, and virtual memory is the slowest and least expensive type.

Explanation:

3 0
3 years ago
In 5-10 sentences, describe the purposes, design considerations, and common elements of most brochures.
lozanna [386]
The primary thing to consider when designing a brochure is the target audience. <span> Brochures are meant to capture attention and deliver information, so it's important that the audience will want to read it in the first place.</span> When planning the design, consider the placement of elements and how they are arranged, or the 'white space'. Also take into consideration whether photos will be used. This ensures readability. <span>Also plan for the brochure's color scheme and fonts. These capture the audience so these are core parts of the design.</span>
4 0
3 years ago
Which is the order of steps for attaching an item to a contact?
aivan3 [116]
We need to know what item and then we can answer ur question
5 0
4 years ago
Read 2 more answers
Other questions:
  • A method in a class that modifies information about an object is called a/an ____ method.
    14·1 answer
  • Write a script named numberlines.py. This script creates a program listing from a source program. This script should: Prompt the
    7·1 answer
  • What is a spreadsheet program?<br> A spreadsheet program is a computerized version of_________.
    6·2 answers
  • Intro to cs 3.7 edhesive g=float(input("Enter your English test grade:")) if(g&lt;=64): print("F") if (g&gt;=65 and g&lt;69): pr
    11·1 answer
  • When examining the digital evidence, what stage deals with using keyword searches and file-carving utilities to locate data that
    5·1 answer
  • Which of these is the term used to describe the location of an Internet page? A) social network B) Web address C) blog D) net
    6·2 answers
  • Write a java program that prompts the user to input the elapsed time for an event in hours, minutes, and seconds. The program th
    13·1 answer
  • Which of the following might cause a shift from PPF1 to PPF2? I. A new source of high quality denim fabric. II. A new lighter me
    12·1 answer
  • Because people can easily upload information and share online, they tend to:
    15·1 answer
  • Y'+2y = 5-e^(-4x), y(0)=-11
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!