1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvasek [131]
3 years ago
14

PLEASE GET THE RIGHT ANSWERS AND HELP MEEE

Computers and Technology
2 answers:
Oliga [24]3 years ago
8 0

I just took this quiz and got a 70%.

1) online activity

2)digital footprint

3) digital access

4) this is one of the ones i missed, i know it’s not program

5) learning management system

6) another one i missed i know it’s not popular internet surfer

7) citizen

8) online learning

9)one i missed it’s not calendar

10) permanent

hope this helps anyone else that’s taking this quiz:)

Afina-wow [57]3 years ago
4 0

Answer: #1 is A

Explanation: Parents often monitor what their child is doing online because online activities can be threatening and sometimes dangerous to a child's life, depending on what they come across on the web. just a hunch

You might be interested in
If you want to insert a column into an existing table what would you do
Amiraneli [1.4K]
This is generally the same on Docs and Word. You'd just highlight the table, go into the settings, and expand it by one column, on docs by dragging it out a little more on the given grid.
Hope this helps!
5 0
3 years ago
Antiglare screens are sometimes called ____.
yaroslaw [1]
Simply a glare screen, because it clearly states what it protects one against, I guess.
8 0
3 years ago
Leah’s computer is connected to the network most of the time. Once, she noticed few of her files with sensitive data were missin
vivado [14]

Answer:

The Firewall (Router) is the vulnerable hardware.

Explanation:

The entry into the network will be the firewall (If there is a firewall installed on the network), if this medium is compromised, every workstation on the network will be vulnerable.

3 0
4 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
Select all that apply) Alex is designing a webpage for her composition course that summarizes her research project. As she prepa
marissa [1.9K]

Answer:

C. Purpose

Explanation:

The purpose of website should be determined and then text fonts and layout should be selected. The target audience of the website should be determined and it should be identified their preference so that website layout is designed in a way which impresses the audience and leaves an impact on them.

6 0
3 years ago
Other questions:
  • Using caller id is part of which step in an effective time management plan
    10·1 answer
  • The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should
    13·2 answers
  • How many categories of bitmap images are there?
    8·1 answer
  • Mariah was working on a multimedia presentation that included both video and audio files. The file was huge, and she wanted to s
    13·2 answers
  • Software that was designed to serve the needs of a specific company or organization is called:
    11·1 answer
  • What is the computer?​
    9·1 answer
  • I really need help in this!!!
    11·1 answer
  • Which bits of the address would be used in the tag, index and offset in a two-way set associative cache with 1-word blocks and a
    7·1 answer
  • When individuals are purchasing a computer, they sometimes might get the most expensive computer they can afford. Why might this
    7·1 answer
  • How to get the lightning round in dares of eternity
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!