1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
3 years ago
9

What are some consequences of internet addiction​

Computers and Technology
1 answer:
fenix001 [56]3 years ago
4 0

Answer:

<em>1</em><em>. </em><em>week</em><em> </em><em>eyesight</em>

<em>2</em><em>. </em><em> </em><em>weak</em><em> </em><em>brain</em><em> </em><em>power</em>

<em>3</em><em>. </em><em>loss</em><em> </em><em>of</em><em> </em><em>concentra</em><em>tion</em><em>.</em><em>.</em><em>.</em>

<em>hope</em><em> </em><em>it</em><em> </em><em>helps</em><em> </em><em>u</em>

You might be interested in
What are the characteristics of the Outlook Rules Wizard? Check all that apply.
Marina CMI [18]

Answer:It is useful for staying organized.

Users can edit the rule description.

Users can move messages to folders.

It is divided into three template choices.

Explanation:

7 0
2 years ago
What is Belady in computer language ?
makvit [3.9K]

Answer: Belady’s anomaly is a process in which by increase in the number of page frames there is a increase in the number of page faults for memory access pattern.

Explanation: Belady's anomaly was if there is a increment in the number of page frames then it will result in the increment of page faults as well in computer terms. The process was seen usually on the following replacement algorithm:-

  • FIFO(first-in first-out)
  • Random page replacement
5 0
3 years ago
The vulnerabilities common to the software development process, including buffer overflows, race conditions, input validation at
spayn [35]

Answer:

Aspects of application security includes all except:____.

D. Requirement Assessment.

Explanation:

The requirement assessment is carried out during the initial development stage to meet the user's requirements.  This assessment does not necessarily deal with application security.  However, the other three aspects are security-related.  They focus on the areas where application security is mostly required to reduce errors and technical weaknesses of a software, including authentication, privacy, access control, data segregation, and error handling.

8 0
3 years ago
What command would you use to see how many concurrent telnet sessions you can run on the IFT MAIN router and how many could can
Mariulka [41]

"Computer, I demand information about how many concurrent telnet sessions I can run on the IFT MAIN router and how many I could have on that router, quickly!"

6 0
3 years ago
How many generations of computer languages
vichka [17]
5 generations................
6 0
3 years ago
Other questions:
  • Which is true for a hosted blog software
    15·2 answers
  • With the help of ________, the digital version of a document is displayed on the screen for a human viewer to verify letters the
    9·2 answers
  • How did the discovery of glossopteris support wegner's continental drift hypothesis?
    15·1 answer
  • To save a document with a new name, click _______ in the navigation bar and enter a new filename.
    12·1 answer
  • Jump to Question: Fill in the blanks below: The flow of electricty is similar to the movement of water through a pipe. The movem
    15·1 answer
  • What is the name of the symbol that is used to classify and categorize information?​
    10·2 answers
  • How do I modify objects in power point 2016 for an assignment
    11·1 answer
  • Who can answer me this one plss little urgent
    15·1 answer
  • A small square at the right corner of the table is what?​
    12·1 answer
  • Is a class of software used to meet organization-wide business needs and typically shares data with other enterprise application
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!