1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
13

(I need help also can u guys just give me some example just in case I got confuse)

Computers and Technology
1 answer:
Vesna [10]3 years ago
8 0

Answer:

1) there should be boundaries because you never know what could happen on the internet as people tend to not have control of who is on theyre account or texting them,

2) if you have a phone you should be responsible and not do something that could get you in alot of trouble ,

3) it's important because if somebody else gets your information things can be sent that you didnt send ,that can get you in legal trouble or start a fued between people,

5) comments only matter if you let them matter as people's opinions shouldn't matter to you as long as your happy,

6) block, report , and notify a trusted adult.

You might be interested in
How has the use of computers impacted business
Svetlanka [38]
It has allowed for better organization, faster communication, and more advanced actions that people can't complete
3 0
4 years ago
Read 2 more answers
The __________ is a worldwide collection of networks that links millions of businesses, govenment agencies, educational institut
Vlad [161]
<span>The INTERNET is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals.</span>
5 0
4 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
postnew [5]

Answer: Computers as target

Explanation:

Whenever an authorized  access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.

8 0
3 years ago
Software is the brain of computer. Explain this starement
Annette [7]

here you go

i hope this helps you

5 0
3 years ago
How long is the bachelor's program at Eth Zurich? 3 or 4 years?
natulia [17]
The bachelor's program at Eth Zurich is 3 years.
I hope this helps!
:-)
4 0
3 years ago
Other questions:
  • Which of the following consists of electronic components that store instructions?
    10·1 answer
  • What is a quick way to close the header or footer view in a microsoft word document?
    12·1 answer
  • In reduced visibility conditions you need to work especially hard to gather visual information because
    7·1 answer
  • What is output? Select all that apply.
    15·1 answer
  • After reading the article, "The Impact of Technology", answer the following question.
    7·1 answer
  • Taking a group of recipes and identifying the similarities is an example of _____.
    13·1 answer
  • a publication usually issued daily,weekly or other regular times that provides news,views,features and other information of publ
    8·1 answer
  • If I am working in a document and wish to follow a hyperlink, what should I do?
    7·1 answer
  • Which of the following is an antivirus software?
    6·1 answer
  • What is the difference between a field and an infoobject? What is the advantage of using infoobjects instead of fields in an ads
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!