1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
3 years ago
14

Whats a good slogan for digital citizenship

Computers and Technology
1 answer:
statuscvo [17]3 years ago
5 0

Answer:

your brain is like a phone call it the cloud

Explanation:

You might be interested in
A ____ is several programs simultaneously processing the same I/O stream.
Sonja [21]
Concurrent multiple program execution, opposite to pipeline execution where it needs to in a sequential or in order of execution. You can also say parallel process programming.
6 0
3 years ago
Read 2 more answers
Concept of national sovereignty was established by the
Eduardwww [97]

Answer:

Explanation:

Thomas Hobbes. He was the one who provided the term with its modern meaning.

7 0
4 years ago
As you move through your professional career, you will receive requests for favors and contributions. You will not be able to ho
Alika [10]

Growing professionally comes with advises, comments (solicited and unsolicited), request for favours and also contributions. Moving up your professional career from the days of little beginning have always been accompanied with all of the requests and comments. As one levitates successfully, requests and contributions tend to increase. This can be scary and at the same time tiring as you go to question the sensibility of some of your decisions. While being inundated with these ’assistance', it is important that you carefully and thoroughly select the comments, contributions, requests of favours etc that is worth responding to. While some would be considered others will be discarded. Now, the question is how best can we politely turndown a person's request of favours and contributions without sounding rude, ungratetul and condescending. Both useful and irrelevant contributions deserve good responses. We could start by appreciating the request for favours and contributions, and tell whomsoever it may concern that you appreciate his/her assistance but unfortunately would not be needing them.

8 0
4 years ago
Make The PYTHON Code<br><br> print first 3 character of a string - given "Seattle" expected "Sea"
vlada-n [284]

This program uses a conditional to determine if seafood is safe to consume.

IF (seafood = "mollusk" OR daysFrozen ≥ 7) { rating ← "safe" } ELSE { rating ← "unsafe" }

In which situations will rating be "safe"?

️Note that there may be multiple answers to this question.

Choose all answers that apply:Choose all answers that apply:

1. When sea food is mollusk and day frozen is 1

2.When sea food is mollusk and day froze is 9

3. When see food salmon and day frozen is 7

<em>Did that help?</em>

6 0
2 years ago
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being abl
iVinArrow [24]

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters is True.

a.True.

<u>Explanation:</u>

As network administrator he or she is responsible for both prevent from hacker and restore network from disaster with minimum down time. Network administrator has monitor network traffics and packets and do a period check on malware, spyware and ransom ware protection.

As network administrator should ready made tools or purchase to handle the network traffic to avoid network disaster.

Network administrator update firewall patches and upgrades virus signature files at period intervals. Network administrator also takes necessary advice from firewall hardware appliance from supplier and takes necessary steps o handle situation then and there.

7 0
4 years ago
Other questions:
  • In a digital drawing program, when an object is highlighted, boxes appear at the sides and corners. These boxes can be grabbed a
    13·1 answer
  • Which software application should be used to communicate in writing about an upcoming event?
    12·2 answers
  • C. to which cache block will the memory address 0x000063fa map
    14·1 answer
  • Maggie is preparing a document.she wants to open the help menu to sort out a formatting problem.which key should she press to op
    15·2 answers
  • Are there any human lanaguages with context free grammar
    11·1 answer
  • If you need to grasp the topic of a document quickly, which strategy can you follow? A. guessing from context B. paraphrasing C.
    7·2 answers
  • The rules of right-of-way<br> Pedestrians, bicyclists, and skateboarders<br> when they use the road.
    12·1 answer
  • A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web s
    13·1 answer
  • South Africa is the main supplier of which minerals in the world​
    10·2 answers
  • Alice has an item x and Bob has a set of five distinct items y1, y2, y3, y4 and y5. Design a protocol through which Alice (but n
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!