1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
3 years ago
6

Which examples demonstrate appropriate use of media for a school project? Check all that apply. showing cartoons to teach about

acting playing a how-to video to introduce a new skill providing a recent movie clip to discuss the topic of old movies using a movie segment to compare it to the novel it is based on presenting an interview clip to make a point about a discussion topic
Computers and Technology
2 answers:
Neporo4naja [7]3 years ago
7 0

Answer:

24 5

Explanation:

Oliga [24]3 years ago
6 0

Answer:

Explanation:

c

You might be interested in
Which of the last step in conducting a URL search
kipiarov [429]
The user's browser renders the html code as a visual web page. A web page that we commonly see is structured by a bunch of 1 and 0. Rendering process allow the machine to interpret that 1 and 0 into the visual that we currently seeing Hope this helps. Let me know if you need additional help!
6 0
3 years ago
Which layer of the osi model is mainly concerned with routing packets of data from one network card to another across a large ne
horrorfan [7]
Layer 3 the Network Layer
7 0
3 years ago
Write a program that uses a dictionary to store students birthdays. Your program should ask the user what their name is, and loo
tekilochka [14]

di = {"student":"10/30/1984", "student2":"11/16/2020"}

name = input("What is your name? ")

if name in di:

   print(di[name])

else:

   print("Your name is not in the dictionary.")

You can change the values inside the dictionary. I hope this helps!

3 0
3 years ago
On the cities worksheet, click cell f4 and enter a formula that will subtract the departure date (b1) form the return date (b2)
Mademuasel [1]
=(+B2-B1)*F3 is what you need to enter in cell F4
8 0
3 years ago
You acquire a network vulnerability-scanning tool and try it out on a network address segment belonging to people at your univer
inna [77]

Answer and Explanation:

  • The speculates on either the morality of transmitting vulnerabilities to an individual over all the internet. The node is a very possible target of a criminal charge, these are highly recommended in terms of the problem not just ethical.
  • The question argues the etiquette of telling a compromised network infrastructure to something like a domain admins or security guard. Throughout this case the primary admin issue is power. Informing individuals about both the potential problem is prudent or legal, which is also preferable to recommend the future course of action.
  • The speculates on either the moral values of leveraging the infrastructure for a mild vulnerability. This same proprietor including its node is truly likely to be victims of a prospective infringement, and therefore it is advantageous to notify him including its problem that the equitable access is considered to become an ethical manipulate susceptibility for possessor data as well as potential threats to understanding.
  • The theories a small flaw throughout the channel's ethics. The device's leader is the likely guilty party of even a future offense to notify him of both the actual problem. The law is ridiculous as well as comparable to trying to hack without permission vulnerability it's immoral vulnerability.
  • The content upon the ethical principles of manipulating the channel's small susceptibility. The device's owner seems to be the likely casualty of such a future offense to instruct him including its subject. As well as trying to sell him much farther documents socially responsible borders. It's the holder who has so far notified the weakness she perhaps she has just one option to obtain products and services. Having clear data on the sale still seems to be ethical.
  • The issue argues mostly on ethics with repairing security flaws without channel assent. Although the controlled variable of the modules has been the true likely target of such a future infringement, exploiting susceptibility without permission is appropriate as well as unethical, this same objective being honorable as well as noble.
8 0
3 years ago
Other questions:
  • Consider a simple application level protocol built on top of udp that allows a client to retrieve a file from a remote server re
    15·2 answers
  • Why was Unicode invented?
    11·1 answer
  • Which of the following are best practices that should be done in Photoshop before placing images in InDesign?
    11·1 answer
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    14·1 answer
  • The class attribute
    8·1 answer
  • Active space is important in which type of photograph?
    12·2 answers
  • Someone knows a good compiler for iPad? It has to be an app
    10·1 answer
  • Consider the code block below. What is the value of amount when this method is called twice, the first time using cookieJar(7) a
    14·1 answer
  • 1.) Explain one way the internet has impacted the way we behave.
    7·2 answers
  • Which of the following controls computer memory?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!