1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
7

From Blown to Bits why is it important to know what children are doing on the Web Tonight?

Computers and Technology
1 answer:
prisoha [69]3 years ago
5 0

Answer:

explanation below

Explanation:

Children use computers in lots of places and it is good for an adult to supervise their activities online. This came as a result of the issues Katherine Lester, a 16-year-old honors student from Fairgrove gave her family. She was declared missing in June 2006 because she tricked her mother into getting her a passport which she used to travel to Middle East to meet the Palestinian man she met online. U.S. authorities met her plane in Amman and she later left for home to beg her parents for forgiveness.

You might be interested in
Which of the following is the most effective password?
timurjin [86]
It seems like <span>xK6D(#dsswuJD would be best because it has several "special characters" as well as capitals, lower cases, and numbers.</span><span /><span>
</span>
8 0
4 years ago
Read 2 more answers
In which step is a metaphor used in planning a multimedia presentation
bulgar [2K]

Metaphors are considered in a presentation as a statement that considers one idea in terms of another. This literary use has a deeper function as it entertains and motivates our minds. Therefore, metaphors are a great tool in presentations. They help with simplifying ideas, and make concepts easier to understand.  Metaphors bring a creative touch to the content of the presentation, as well. Especially in multimedia, where you have visual metaphors to stir up the audiences senses t the content being presented.

6 0
3 years ago
Which term describes encryption that protects the entire original ip packet's header and payload?
mario62 [17]
The answer is <span> tunnel mode encryption.   This</span><span> describes encryption that protects the entire original ip packet's header and payload.  A tunnel mode encryption </span><span>protects the internal routing information by encrypting the IP header of the original packet. The original packet is encapsulated by a another set of IP headers. .<span>Additional headers are added to the packet; so the payload MSS is less.</span></span>
7 0
3 years ago
Read 2 more answers
A drowsy cat spots a flowerpot that sails first up and then down past an open window. The pot is in view for a total of 0.50 sec
GaryK [48]

Answer:

2.342m

Explanation:

Given

Time = 0.5 s

Height of Window = 2m

Because the pot was in view for a total of 0.5 seconds, we can assume that it took the cat 0.25 seconds to go from the bottom of the window to the top

Using this equation of motion

S = ut - ½gt²

Where s = 2

u = initial velocity = ?

t = 0.25

g = 9.8

So, we have.

2 = u * 0.25 - ½ * 9.8 * 0.25²

2 = 0.25u - 0.30625

2 + 0.30625 = 0.25u

2.30625 = 0.25u

u = 2.30625/0.25

u = 9.225 m/s ------------ the speed at the bottom of the pot

Using

v² = u² + 2gs to calculate the height above the window

Where v = final velocity = 0

u = 9.225

g = 9.8

S = height above the window

So, we have

0² = 9.225² - 2 * 9.8 * s

0 = 85.100625 - 19.6s

-85.100625 = -19.6s

S = -85.100625/19.6

S = 4.342

If 4.342m is the height above the window and the window is 2m high

Then 4.342 - 2 is the distance above the window

4.342 - 2 = 2.342m

6 0
3 years ago
A cache has been designed such that it has 512 lines, with each line or block containing 8 words. Identify the line number, tag,
Reptile [31]

Answer:

Given address = 94EA6_{16}

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

Explanation:

using the direct mapping method

Number of lines = 512

block size = 8 words

word offset = log ^{8} _{2}  = 3 bit

index bit = log^{512}_{2}  = 9 bit

Tag = 20 - ( index bit + word offset ) = 20 - ( 3+9) = 8 bit

Given address = 94EA6_{16}

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

8 0
4 years ago
Other questions:
  • A _____ is an area hosted by a Web server in which project members and colleagues can share documents, models, photos, and other
    6·1 answer
  • Se Statements
    6·1 answer
  • Dit View
    5·2 answers
  • Which task is performed by the artificial intelligence programmer?
    7·1 answer
  • Write a program to enter a number and test if it is greater than 45.6.if the number entered is greater than 45.6 the program nee
    13·1 answer
  • During which phase of film making does the team outline their vision for the film?
    5·1 answer
  • What is another word for: a location in memory that contains a value?
    7·2 answers
  • Suppose we want an error correcting code that will allow all single-bit errors to be corrected for memory words of length 15. 1.
    5·1 answer
  • How have these advances in-home technology changed the role of technicians in our society?
    10·1 answer
  • List at least three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential c
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!