1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ololo11 [35]
3 years ago
11

What might happen if the internet use policies were broken at your school

Computers and Technology
2 answers:
kow [346]3 years ago
5 0

they can take the rights away and make it to only adults can use it

Alexxx [7]3 years ago
3 0
You might get your internet access privileges taken away or blocked. if your staff knows it was you and can track you down, then you might have a talk with them. depends how bad the policies were broken.
You might be interested in
. Hackers generally disguise their IP address. True False
maw [93]
I think that's true.
If they didn't they could be easily tracked by the police.
4 0
3 years ago
15 points. Please give an actual answer and not some random thing. this is not just free points. Correct answer will receive bra
trapecia [35]

Answer:

i think its b

Explanation:

i did the test and got it right

7 0
3 years ago
Read 2 more answers
Most project files will contain:
Leno4ka [110]

Explanation:

not A or D,

about B and C I'm not sure

7 0
3 years ago
Which peripheral device is used to record sound?
faust18 [17]

he will need a microphone, it is a recording device.

8 0
3 years ago
Read 2 more answers
This is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to hel
igomit [66]

Answer:

Business intelligence.

Explanation:

That concept that applies to that of the selection, incorporation, evaluation, and analysis of companies or business information systems, software, and behaviors. It is direct at promoting good business decision-making.

This is a wide concept of software and technology to capture, store, analyze, and to provide information access to support users make far better strategic decisions.

6 0
3 years ago
Other questions:
  • Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
    7·1 answer
  • Look at the following form. Which input method is the form using to receive the user's favorite activity? What is your favorite
    12·2 answers
  • Name the hardware component that performs each of the following functions (1) performs calculation and/or comparisons (2) holds
    9·1 answer
  • What key should you press and hold to select and open multiple files at one time? Enter Alt Control Esc
    12·2 answers
  • What is the output of the following program?
    9·1 answer
  • The Open Systems Interconnection (OSI) is a conceptual model whose purpose is to make networks more manageable. Its objectives i
    15·1 answer
  • Which audio media can be directly sent to the subscribers through an RSS feed?
    6·1 answer
  • Technical term of stealing personal information in social media.​
    5·1 answer
  • Jason works for a restaurant that serves only organic, local produce. What
    15·2 answers
  • Which are the top 10 Popular Cars and Video Games get max ammount of point that we can give​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!