1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spin [16.1K]
3 years ago
15

Which statement below is incorrect when discussing communication in the online community?

Computers and Technology
1 answer:
Marysya12 [62]3 years ago
8 0
It's everyone's responsibility to report cyberbullying.

The tone is important whenever you are talking to someone else.

You can literally say anything in virtual world, but you should behave yourself

If everybody knows the common text phrases, then it's fine, but it will be better to talk formally.
You might be interested in
Which of the following must be true in order for an object to stay in place?
Allushta [10]
The forces must be balanced.

This is in accordance to Newton's first law of motion, which states that an object at rest will remain at rest and an object in motion will remain in motion unless acted upon by an unbalanced force.
An unbalanced force is also known as a resultant force.
4 0
3 years ago
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
What do you mean by Data Types? Give Examples. <br>Ms Access question​
Anika [276]

Answer:

This answer is quite late, but data types are basically categories that differentiate stuff in python.

A few examples would be:

String - Anything that has single or double-quotes around it. The input( ) function automatically returns a string, unless changed.

Int - An integer. Any whole number.

Float - Any decimal number.

List - a variable in which you can store multiple different elements. (Strings, integers, floats, tuples, lists, etc...)

Also, sorry if my English isn't perfect. English isn't my first language.

Explanation:

Don't know. Just some stuff I remember from my python class. ∞

3 0
3 years ago
Internet service providers​ (isp) need to resolve customer problems as quickly as possible. for one​ isp, past data indicates th
I am Lyosha [343]
I think that the likelihood will still be 0.8 as that means that 8 out of 10 calls will be resolved within one hour so the 7 out of 10 falls within that likelihood so therefore the callers can go by that assumption and be fairly confident that they have quite a high likelihood of having their problems resolved within one hour.
3 0
3 years ago
Read 2 more answers
Which type of topology describes the physical arrangement, installation, and connection of cables, computer, and other devices?
Nutka1998 [239]
<span>The network topology describes the physical arrangement, installation, and connection of cables, computer, and other devices.
The network topology can be bus topology (a</span><span> network topology that uses a single cable or conductor to connect all nodes on the network.) ,</span>star topology (a network topology in which cables running from each node connect to a single point, such as a hub.), ring (a network topology that consists of a single cable that runs continuously from node to node), mesh, hybrid, hub topology,... according the arrangement of the nodes. 

8 0
3 years ago
Read 2 more answers
Other questions:
  • A _______ is a piece of computer hardware used for the modulation and demodulation of data between digital and analog formats.
    10·1 answer
  • Suppose a classmate constructed an electric motor with a solid commutator.that is, the commutator has no split. This solid commu
    9·1 answer
  • Create and Provide complete program that includes a comments header with your name, course, section and other program details an
    9·1 answer
  • A global project called One Laptop per Child is attempting to distribute low-cost laptop computers to children in developing cou
    10·1 answer
  • A program that will accept the ages of girls and boys and calculate the total and average age​
    15·1 answer
  • Do u have to divide or multiply this problem 5300 yd = mi
    9·1 answer
  • What critical-thinking tool is being used when asking the question, Is this information specific enough?
    9·1 answer
  • Naynar kis dhrm se sambandhit hai​
    15·2 answers
  • How do you refer particular cell?<br>​
    12·1 answer
  • The ____ line for any e-mail messages you write should clearly state the intention of the e-mail..
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!