1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sp2606 [1]
3 years ago
6

Types of online dangers

Computers and Technology
1 answer:
Vinil7 [7]3 years ago
8 0
One online danger is cyber bullying
You might be interested in
WNOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOW
beks73 [17]

Answer:

yes.

Explanation:

7 0
3 years ago
A technician is performing Windows preventative maintenance tasks on all computers in the organization. She wants a way to creat
Sedaia [141]

Answer:mmc.exe

Explanation:

mmc.exe is used to manage Windows network with a variety of snap-ins(administrative tools that can be added to the console and used to manage various aspects of your network).

The technician will.be able to use mmc.exe to to create a custom console containing only the tools she regularly launches and then distribute this custom console to each computer.

3 0
4 years ago
F=M×A<br> What is the acceleration of 50kg object pushed with a force of 500 newton?
Ainat [17]
If F=M*A then A=F/M
So acceleration is 500N / 50kg = 10 N/kg = 10 m/s² (since 1N is 1kg·m/s²)
8 0
4 years ago
Why do the query tables use an underscore in their names?
Vedmedyk [2.9K]

An underscore is a permitted character in documentations such as MySQL. An underscore in query tables can increase readability. For example, if we use thisIsMyColumn as a column name, it is very easy to write. However, this _is_my_column as a column name is more readable.

 






7 0
3 years ago
To light up an LED, you need to connect the cathode leg to one of the Digital Pins and connect the Anode leg to the ……………. on th
Elenna [48]

Answer bobobobobobobobo

4 0
3 years ago
Other questions:
  • Ben assembled parts of a computer and created a fully functional desktop PC. He wants the computer to connect to the Internet. W
    10·1 answer
  • True or False<br><br> The signing of Act 26 made Cyber Harassment of a Child a crime.
    14·1 answer
  • Which of the following can you do under the fair use exceptions?
    6·1 answer
  • A factory producing cables for personal computers finds that its current average
    10·1 answer
  • To make a drop shadow larger what should you change about the drop shadow in gimp
    12·1 answer
  • How can you enter Task Manager in Windows? Select 3 options. press Ctrl + Shift + Tab press Ctrl+Alt+Delete and then click Task
    8·1 answer
  • Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
    9·1 answer
  • Discuss the importance of top management commitment and the development of standards for successful project management. Provide
    10·1 answer
  • Write a calculator program that will allow only addition, subtraction, multiplication &amp; division. Have the
    8·1 answer
  • Jazmine just finished setting up an operating system that's designed to work between a VM guest OS and computer hardware. What i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!