1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
7

Ways to be your best digital self?

Computers and Technology
1 answer:
timurjin [86]3 years ago
3 0
To be your best digital self just remember that everything you do on the internet STAYS on the internet. There’s no way around it. Be mindful of what you post, say, and do online. Don’t let that, however, stop you from showing something you love to do or talking about something you’re interested in. Being your best digital self requires restraint and knowledge. Think to yourself, do I really want to send this message? this picture? this threatening message? Be safe rather than sorry. Don’t let that stop you from being you. Have fun :) !
You might be interested in
Which one is the result of the output given by a compute
sveta [45]

Answer:

Images.

Sound.

Hardcopy

…

3 0
3 years ago
Read 2 more answers
What are the pros and cons of using ICT
qaws [65]

Answer:

Pros:

- Connect with friends, family in a short period of connecting time

- Faster, easier than paper

- The messages can be stored in the device for longer times, without being damaged, unlike paper files that easily get damages

- Digital communication can be done over large distances through internet and other things.

And many other pros

Cons:

- Software can be easily hacked

- Digital Communication has completelymake people become far to others. They would stop meeting face-to-face but instead of that, video call, chatting is become more popular

- Most of devices have hidden recording mechanisms that can take your information unknowingly and may be used to attack you in the future

And many other cons

Hope this helped :3

5 0
4 years ago
A hub transmits all incoming messages to all of its ports except the port where the messages came in. A switch usually sends mes
leonid [27]

Answer:

MAC Addresses (Destination and Source MAC address)

Explanation:

A switch has 3 primary functions:

  • Forward frames
  • Learn addresses
  • Avoid loops

An Ethernet frame has the header, data and trailer and there are two specific fields in the header that helps the switch to know where to send data in future transmissions.

  • destination MAC address
  • source MAC address

every Ethernet frame has this and when the frame hits a switch or any device, any device can look at it ( an Ethernet frame ) and know where it is suppose to go and where it came from.

Every switch has a MAC address table where it stores MAC addresses of different computers on the network.

Example:

When a PC1 sends a frame to PC2 through a switch, the switch looks at the header of the Ethernet frame for the source mac address and adds the source MAC address to its MAC address table and also the port that it came through.

simply put:

A switch looks at the source MAC address to see if it knows it already, if it does. Great! no need to add it again to it's address table.

If it doesn't, it adds it's source address and the port that the frame came from.

This basically how the switch populates its MAC address table.

3 0
3 years ago
Read 2 more answers
Distinguish between engineering and architecture​
Liula [17]

difference between engineering and architecture are.

A engineer is a person whose job involves designing and building engines, machines, roads, bridges ,etc .

While architect design buildings only.

3 0
3 years ago
hich type of denial of service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly map
shusha [124]

Answer:

DNS poisoning

Explanation:

This type of attack is known as DNS poisoning it is a very common attack that focuses on trying to redirect users of the site that has been attacked towards fake servers. These fake servers belong to the attackers and are used to collect the user's private data, which can then be used by the attackers for a wide range of malicious acts. Aside from stealing user information, this malicious data travels alongside regular user data allowing it to infect various servers easily.

7 0
3 years ago
Other questions:
  • Shelly praised Susan via email for how well she executed an employee training program last week. Shelly is engaging in the _____
    6·1 answer
  • 23. For the 16-bit binary number 1001 0101 1100 0011, show the effect of: a. A right shift of 4 bits with zero fill. b. A right
    13·2 answers
  • T F The scope of a parameter is limited to the function which uses it.
    12·1 answer
  • pWhat macOS system application tracks each block on a volume to determine which blocks are in use and which ones are available t
    14·1 answer
  • When designing your navigation, your primary objective should be to include keywords for search engines.
    6·1 answer
  • What is a function of Agile software development?<br>​
    7·1 answer
  • Brainliest
    13·2 answers
  • What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
    8·1 answer
  • What is multimedia hard ware? Write any four examples of multimedia hardware. <br>​
    13·1 answer
  • If there is a secure socket layer in place, what will you need in addition to a user id in order to access the shared files?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!