1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
3 years ago
7

I need help with doing a debate for ela. The debate topic is "do you think we are to dependable on our laptops/cellphones. My te

acher assigned me to the group that think we are not to dependent on our electronics when i dont even support that side sooo i need help coming up with topics that help support the side that im on. ( that probably did not make any sense)
Computers and Technology
2 answers:
Salsk061 [2.6K]3 years ago
8 0
Yes we are dependable we use our phones everyday
Mama L [17]3 years ago
7 0

Answer:

I think we are so this is hard lol

Explanation:

we are not too dependable

things that show this is library are still open, school sports teams still flourish(if we were too depending on them they wouldnt) they help us plan ways to interact in person if we were too dependent businesses would struggle more and only be online

this is hard if I can think of any others I'll come back I'm sorry if this isn't any help

You might be interested in
How do you delete answers on Brain.ly?
Svetlanka [38]
Need to go to the settings
8 0
4 years ago
Read 2 more answers
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
Which of the following is true of how packets are sent through the Internet?
astra-53 [7]

Answer:

It is A: Packet metadata is used to route and reassemble information travelling  through the internet.

Explanation:

Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee

Step 2: Entering the network

Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.

Step 3: Taking flight

The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.

Step 4: BGP

These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.

Step 5: Finding a route

This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.

Step 6: Bad information

For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.

Last step: Arrival

The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.

8 0
4 years ago
Read 2 more answers
Given the code as follows: main() { int i = 3, n; float x; x = i; n = 8 % x; } What problem will occur? Group of answer choices
Bess [88]

Answer:

A compilation error will occur.

Explanation:

The % operator does not accept a float as its right-hand operand.

7 0
3 years ago
Why were early computers so much bigger than the ones we use now?
prisoha [69]

Answer:

They used bulky vacuum tubes.

Explanation:

I took the test

7 0
3 years ago
Other questions:
  • A way to have cells in your spreadsheet change formats based on the value of the cells is called ________.
    8·1 answer
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    12·1 answer
  • What time does walmart deposit paychecks?
    5·1 answer
  • What did Charles Babbage design in 1822 to substitute values in polynomial equations? ENIAC TRADIC Analytical Engine Difference
    6·1 answer
  • Gap junctions and plasmodesmata have what feature in common?
    6·1 answer
  • Jamal is creating a presentation for a report on engineers. He wants to use a template. How can he access different options for
    14·1 answer
  • True/False
    13·1 answer
  • Two routers connect with a serial link, each using its S0/0/0 interface. The link is currently working using PPP. The network en
    6·1 answer
  • Dimensional arrays can be created using loops. 2 dimensional arrays can be created using:
    10·1 answer
  • Write a C program to input a character, then check if the input
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!