1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marishachu [46]
2 years ago
8

What does it mean to be a good cyber citizen?

Computers and Technology
2 answers:
never [62]2 years ago
8 0

Answer:

B

Explanation:

Aleks [24]2 years ago
8 0
The answer is B. Following the rules of online communication using the internet appropriately, and avoiding unsafe websites
You might be interested in
The method of making paper is called p.........
Scorpion4ik [409]

ANSWER:

the answer is pulping

The method of making paper is called pulping

~batmans wife dun dun dun...aka ~serenitybella

4 0
3 years ago
Read 2 more answers
g 1-1 Which network model layer provides information about the physical dimensions of a network connector like an RJ45
Harlamova29_29 [7]

Answer:

Physical layer

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

In the OSI model, the physical layer is the first and lowest layer. Just like its name physical, it addresses and provides information about the physical characteristics such as type of connector, cable type, length of cable, etc., of a network.

This ultimately implies that, the physical layer of the network (OSI) model layer provides information about the physical dimensions of a network connector such as a RJ45. A RJ45 is used for connecting a CAT-5 or CAT-6 cable to a networking device.

8 0
3 years ago
Ntering a system call involves changing from kernel mode to user mode.<br><br> a. true <br> b. false
Evgesh-ka [11]

The given statement exists true. Ntering a system call concerns varying from kernel mode to user mode.

<h3>What is kernel mode?</h3>

A processor in a computer operating Windows contains two various modes: user mode and kernel mode. The processor switches between the two modes relying on what kind of code exists operating on the processor. Applications run in the user way, and core operating system features run in kernel mode.

The transition from the user mode to kernel mode happens, when the application demands the service of the operating system or an interrupts or a system call happens. The mode bit exists set to 1 in the user mode. When a program requires any hardware resources, it must create a call to the kernel.

Therefore, the correct answer is option a. true.

To learn more about kernel mode refer to:

brainly.com/question/15830364

#SPJ4

5 0
1 year ago
A four-stroke engine is one in which the piston goes through evolutions for each power stroke: intake, compression, power, and e
Luba_88 [7]

Answer:

that is true.

........

.

5 0
3 years ago
Read 2 more answers
A security administrator is implementing a SIEM and needs to ensure events can be compared against each other based on when the
Shalnov [3]

Answer:

The correct answer is option (a) TOTP

Explanation:

Solution

The correct answer is TOTP Because we need randomness and minor probability also change that's why TOTP (Time based One Time Password).

TOTP: A time-based one-time password (TOTP) refers a temporary pass code produced by an algorithm that utilizes the present time of day as one of its authentication factors.

Time-based one-time passwords are normally used for two-factor authentication and have seen growing assumption by cloud application providers.

7 0
3 years ago
Other questions:
  • Select the proper ergonomic keyboarding techniques.
    15·2 answers
  • HI GIVING BRAINLIEST Tyra used the software development life cycle to create a new game. She released it to her friends in order
    14·2 answers
  • How do you insert a new row into a worksheet
    5·1 answer
  • Suppose an 80286 microprocessor is in protected mode. How it is switched back
    6·1 answer
  • What does a bonus object do? A. Subtracts lives B. Keeps track of a player's health C. Gives a player an advantage D. Makes text
    12·1 answer
  • Which is true about TCP and UDP? Choose two answers.
    15·1 answer
  • In a bubble sort for a list of length n &gt;= 2, in each iteration, the first step is to compare_______.
    8·1 answer
  • What is the value of numX when this program is executed? if 3 &lt; 5 and 8 != 3: numX = 3 else: numX = 7
    13·2 answers
  • Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. please select the
    13·1 answer
  • In cell B20, enter a
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!