1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
3 years ago
10

Is the Internet dangerous?

Computers and Technology
2 answers:
VARVARA [1.3K]3 years ago
8 0

Many people would answer this in many different ways. In my personal opinion, it's a yes. It's a yes because it makes it easier for people to track you down (finding your iep) and it's easy for someone to take your identity. It's also dangerous for children and teens (even young adults) because there are many people wanting them, and wanting to meet them in public and things like that. I hope I answered your question! (:

Lynna [10]3 years ago
3 0

Answer:

well,sometimes yes and sometimes no for example it could be dangerous by people  scamming you or trying to be friends with u with fake profile and might kidnap u but it's also great for ex: this site you are on now and for homeschooling for homework help sometimes u might have a bad life and still can talk to a friend about it because it always feel better unless u r more of a private person also if u moved like i did and u can't have contact with Ur Friends  with soical media

Explanation:

You might be interested in
the majority of refrigeration systems in residential comfort cooling systems use what type of system?
DIA [1.3K]

Air conditioning, or cooling, is more complicated than heating. Instead of using energy to create heat, air conditioners use energy to take heat away. The most common air conditioning system uses a compressor cycle (similar to the one used by your refrigerator) to transfer heat from your house to the outdoors.

Picture your house as a refrigerator. There is a compressor on the outside filled with a special fluid called a refrigerant. This fluid can change back and forth between liquid and gas. As it changes, it absorbs or releases heat, so it is used to “carry” heat from one place to another, such as from the inside of the refrigerator to the outside. Simple, right?

Well, no. And the process gets quite a bit more complicated with all the controls and valves involved. But its effect is remarkable. An air conditioner takes heat from a cooler place and dumps it in a warmer place, seemingly working against the laws of physics. What drives the process, of course, is electricity — quite a lot of it, in fact. Hope this helps?


7 0
3 years ago
In what software development model does activity progress in a lock-step sequential process where no phase begins until the prev
den301095 [7]

Answer:

"Waterfall" is the correct answer for the above question.

Explanation:

  • The Waterfall model is a model which is the first model recognized by some scientists is used to states some rules to develop the software. It is based on the phases of the SDLC. The SDLC is the collection of phase that is used in software development.
  • The waterfall model moves like water moves. It means any next phase starts if the previous phase is completed and the user can not move into previous steps of the model.
  • This is also asked by the question. Hence the answer is the waterfall model.
5 0
3 years ago
If i find an image and copy and paste it into Paint.
Leokris [45]

Answer:

Lossy image formats will remove data during compression as a trade off for lower storage occupation. Lossless data formats will not remove data during compression, resulting in higher quality but also higher storage occupation.

Graphic Artists will almost always use lossless due to it delivering the highest quality image possible.

8 0
3 years ago
What are some differences between CUI and GUI ?
ollegr [7]

Answer:

Even though both are interfaces and serve its purpose of attempting to run the strategies, their components as well as the manipulate they will get from the patient differ.

Explanation:

CUI (Character User Interface) :-

  • It's a sort of user interface that only uses binary data and pseudographics for interface-output and data sessions.
  • That's characterized by low availability for operating systems I / O resources (act with integrity) and high speed with a display of data.

GUI (Graphical User Interface (GUI):-

  • Using graphical elements such as windows, icons, menus helps the user to communicate with the program.
  • It is a kind of user interface along which people interact with electronic equipment through characterizations of visual indicators.
3 0
3 years ago
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
Other questions:
  • Ar count = 10;
    13·1 answer
  • Match each task with the features necessary to complete the task
    10·1 answer
  • Which do web servers host?<br> Websites<br> Networks<br> Firewalls<br> Zones
    8·1 answer
  • When a JSP page is compiled, what is it turned into?
    11·1 answer
  • Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
    6·1 answer
  • What does input allow a computer to do
    14·1 answer
  • How do we explain the difference between fake news and facts​
    8·1 answer
  • Who is famous for his three laws of robotics?
    9·1 answer
  • High level language is___________
    15·1 answer
  • What is the distance from the end of the pin to the center of the hole?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!