1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FromTheMoon [43]
3 years ago
14

What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg

ed with crimes. Online chat room disagreements usually lead to violence. Students become vulnerable to cyberbullying and harassment. Anyone can join a discussion board, regardless of their background.
Computers and Technology
2 answers:
adelina 88 [10]3 years ago
4 0

Explanation:

Students become vulnerable to cyberbullying and harassment.

adell [148]3 years ago
3 0

Answer:

Students become vulnerable to cyberbullying and harassment.

Explanation:

You might be interested in
Naruto Uzumaki who likes naruto ??? who waches it??
nika2105 [10]

Answer:

me

Explanation:

naruto is the coolest dude

6 0
3 years ago
Read 2 more answers
"how has user access of the web changed over the past 10 years? how does this impact the design of a website?"
FinnZ [79.3K]
Over the years, the internet has undergone major changes that has positively and negatively affected the overall interface, performance, and design of the entire website. Apart from this, it has completely changed the communities point of views towards technology and its appreciation of the market designs. Some of the major changes are based on its interface mostly on the screen size. In addition, all monitors being manufactured nowadays are calibrated. This means that, there is a better transition of images in-terms of image pixel.  
7 0
3 years ago
As the Sunrise hospital implements an EHR, the coding staff requests a new system that will enhance productivity, accuracy, and
Eva8 [605]

Answer:

D. Computer assisted coding

Explanation:

A Computer Assisted Coding System is a software that scans medical documents and generates codes that are appropriately designed for key phrases and terminology in the document. This system is used to enhance productivity, accuracy and efficiency. It can identify when there is a diagnosis of a certain ailment or just used as it is in the family history. It has several advantages over manual coding and even helps identify mistakes made by manual coding.

7 0
3 years ago
You've finished programming the app! Now your company has to decide whether to use an open source
pishuonlain [190]

Answer:

Proprietary License gives you full ownership and trademark/patent opportunites. Open source allows for code donation and a community based development for your app. Generally speaking, if your a private entity creating an app for a client, you'll need the Proprietary Licence, which will allow you to sell the codebase to your client.

If your creating an app for your company as itself, you go either way, sell the license in licensing agreements, or have your companies community contribute and better your app from the inside.

Its entirely based on the agreements you set for the app.

5 0
3 years ago
Software that functions as an electronic version of a filing cabinet?
Dennis_Churaev [7]

Answer: There are a lot of choices

Explanation: do you want a database? You can obtain a terabyte or even larger size thumb drive or USB drive

Do want a print server? a networked drive specific for your data and if you have  to   print out anything

Do you want a connected drive to send all your documents to with organized folders?  any size drive will work for this they come all prices

Enter the electronic filing system, sometimes called document management software. These computerized filing systems provide electronic file management. In other words, they give us a simple way to store, organize, and retrieve digital files and digital documents and pdfs.

https://www.filecenter.com/info-electronic-filing-system.html here is some good software

5 0
2 years ago
Other questions:
  • Networks provide businesses with these benefits.
    8·1 answer
  • How would a designer interpret the word denier?
    12·2 answers
  • What are computers used for?
    14·2 answers
  • In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across
    9·1 answer
  • Given the following code fragment and the input value of 4.0, what output is generated?
    8·1 answer
  • The term used to describe the shape and layout of a computer component such as a motherboard or hard drive is ______ factor.
    5·1 answer
  • Write a html5 code to display 5 friends both an orderd and unordered list .
    12·1 answer
  • Select the three business advantages of globalization.
    10·1 answer
  • What are pixels?
    13·2 answers
  • Hey plz help, and thanks
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!