1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tresset_1 [31]
3 years ago
11

Why is it important to practice safety guidelines when communicating with others via social media platforms?

Computers and Technology
2 answers:
arlik [135]3 years ago
8 0
Becuse you could release the wrong info that could jeapordize your safety or be talking to a person that you think you know, but dont.
Alexxandr [17]3 years ago
3 0
Because if people communicate freely, then inappropriate things might be said between them. Some words might even hurt others. Then there is also the case of when someone shares their personal information. If they share personal information, then that person might be at risk of people finding them. Not everyone is who they say they are online and because of this, people need to be careful. Even if someone they are talking to seems trusting.
You might be interested in
What is the acronym for computerized command provides weather by microphone clicks?
AleksAgata [21]
What is the acronym<span> for a </span>computerized command? it is a<span> response system that </span>provides <span>automated </span>weather<span>, radio check capability and airport advisory information selected from an automated menu by </span>microphone clicks.<span>
</span>
6 0
3 years ago
The Curiosity Rover has recently landed on Mars and likes to send Twitter updates on its progress. If a tweet is posted 10 minut
vampirchik [111]

Answer:

1.8 * 10^11 m

Explanation:

Given that :

Time taken for tweet to me posted after been sent, t = 10 minutes

t in seconds :

60 seconds = 1 minute

10 minutes = (10 * 60) = 600 seconds

Tweet sent will br transmitted at the speed of light, c = 3 * 10^8 m/s

Recall :

Speed = distance / time

Distance = speed * time

Distance of Curiosity from Earth = (3 * 10^8 * 600)

Distance of curiosity from earth = 1.8 * 10^11 m

7 0
3 years ago
Wireless data networks are particularly susceptible to known ciphertext attacks.
sesenic [268]

Answer:

The answer is TRUE

Explanation:

Wireless data networks uses wireless connections to send information to end users. Information here, are shared within a far distance. Mobile cell phones use wireless networks. Wireless network can be targeted from a distance and are therefore susceptible to attacks among which are ciphertext attacks.

Ciphertext are necessary way of coding a data to prevent readability which in turn would ensure the protection of the data. However, an attacker could attack wireless data networks using ciphertext attacks by decrypting any ciphertext  through the knowledge of the secret key or encrypted key and through a handful of some encrypted messages.

5 0
4 years ago
A pair of single quotes ' will prevent the shell from interpreting any special character. True or False
Stells [14]

Answer:

The answer is "True".

Explanation:

A single quote is a punching mark also known as an apostrophe located on the US Standard keyboard near the Enter button.

  • It's also known as a direct quote, such markings are also used in a news article for marking a statement. If a paragraph is a capital letter within the next quote, it is a function of a single quote. It refers to verbal marks.
  • A couple of quotes will avoid a unique character becoming interpreted by only the shell, that's why the given statement is true.
3 0
3 years ago
Given an input array of strings (characters) s, pick out the second column of data and convert it into a column vector of data.
hodyreva [135]

Answer:

Consider the following code.

Explanation:

save the following code in read_and_interp.m

 

function X = read_and_interp(s)

[m, n] = size(s);

X = zeros(m, 1);

for i = 1:m

if(str2num(s(i, 2:5)) == 9999)

% compute value based on previous and next entries in s array

% s(i, 2:5) retrieves columns 2-5 in ith row

X(i,1) = (str2num(s(i-1 ,2:5)) + str2num(s(i+1,2:5)))/2;

else

X(i,1) = str2num(s(i,2:5));

end

end

end

======================

Now you can use teh function as shown below

s = [ 'A' '0096' ; 'B' '0114' ; 'C' '9999' ; 'D' '0105' ; 'E' '0112' ];

read_and_interp(s)

output

ans =

96.000

114.000

109.500

105.000

112.000

7 0
3 years ago
Other questions:
  • An _________ is a phrase formed from the first letters of words in a set phrase or series of words a. Acronymic sentence c. Basi
    7·2 answers
  • Excel assigns the name ____ to the first excel table created in a workbook.
    10·1 answer
  • Your boss is very skeptical about the idea of storing his files up in the cloud rather
    8·1 answer
  • Which of the following is not true about search engine advertising?
    15·1 answer
  • Sam needs to create a spreadsheet for his coworkers. They will need to follow a crossed a long road of data. Sam would like to m
    15·1 answer
  • Which of the following are some of the ways that the media influences consumers behavior
    9·1 answer
  • Which osi/iso layer is responsible for determining the best route for data to be transferred?
    5·1 answer
  • to edit text boxes in a template, first A click on the text box you want to edit B begin typing C format the front D drag the te
    5·2 answers
  • Why was the tesla model s help change the was we see EV
    12·1 answer
  • The unit we use to measure bending moment is...<br> A kg<br> B N<br> C Nm<br> D MPa
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!