1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paul [167]
3 years ago
14

1.2.6: Anonymity Reflection

Computers and Technology
1 answer:
kiruha [24]3 years ago
5 0

Answer:

1. they are too afraid to say it in person or are afraid of getting in trouble if they give their identity.

2.more cyber crimes committed and no filter for what is okay to say or not as they have the security no one knows who they are.

3. yes because you may not want your full personal info out there even though negative outcomes could occur from anonymity

You might be interested in
Write an algorithm to get the value of length and breadth of a rectangle from the user and find its area. inn qbasic
Shalnov [3]

Answer:

IN PYTHON ::

x=int(input('Enter length:'))

y=int(input('Enter width:'))

print('Area of the rectangle is', x*y,'squared units')

I hope it will be useful.

5 0
3 years ago
Which application requires knowlodge of html or javascript to produce a website
REY [17]

Answer:

Wordpress

Explanation:

WordPress (WP, WordPress.org) is a free and open-source content management system (CMS) written in PHP [source: Wikipedia].

Wordpress can be used to create websites, blogs, ecommerce sites.

HTML provides the basic structure of websites. It is enhanced and modified by other programs such as CSS and JavaScript. CSS is used to control presentation, formatting, and layout. JavaScript is used to control the behavior of different elements.

4 0
4 years ago
When running on its 11.4 V battery, a laptop computer uses 8.3 W. The computer can run on battery power for 7.5 h before the bat
Ierofanga [76]

Answer:

The correct answer is "0.73 A".

Explanation:

Given that:

Power,

P = 8.3 W

Voltage,

ΔV = 11.4 V

The current will be:

⇒  I = \frac{P}{\Delta V}

On substituting the values, we get

⇒     =\frac{8.3}{11.4}

⇒     =0.73 \ A

3 0
3 years ago
A device that is connected to a network that is identified by a unique number and works as an individual part of the network is
VMariaS [17]
Cellular phone? I'm pretty sure

7 0
3 years ago
Why do reviewers consider the context of a work?
iVinArrow [24]

Answer:

I think the answer is C.

Explanation:

7 0
2 years ago
Other questions:
  • The process that uses 3D modeling software to create a representation of a three dimensional object is called 3D modeling.
    15·2 answers
  • What is the primary business advantage of using email?
    5·1 answer
  • Which statement is a good reason for backing up your data to the cloud?
    7·2 answers
  • Which option describes wearable technology?
    5·2 answers
  • Before you enable data deduplication, what tool can you use to determine if data deduplication would benefit the tested volumes
    11·1 answer
  • What piece of software tells the operating system how to use a specific hardware device? a. User interface b. System service c.
    14·1 answer
  • echnician A says that underinflation can increase the rolling resistance of a tire. Technician B says that underinflation can ca
    9·1 answer
  • The gap in ease of access to technology is known as the ________ divide. Select one: A. technology B. Internet C. web D. digital
    9·2 answers
  • Which of the following statements is true of algorithms?
    15·1 answer
  • Ria and her team ....................... they will win. *
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!