1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
6

Linda moderates the comments section of an online travel magazine. Which type of comments should Linda flag or delete as inappro

priate content?
Computers and Technology
2 answers:
kvv77 [185]3 years ago
8 0
Generally, an online newspaper has a code of conduct for the comments accepted. Hate speech, racism, cursing, sexual comments or bigotry is usually not allowed. She may also want to be looking for spam comments such as links or ads where someone is trying to sell something from the comment section
Nesterboy [21]3 years ago
8 0

comments that discuss topics unrelated to travel

I think

You might be interested in
If AL contains binary 1000 1111, which one will show the information of the binary bits in AL after performing operation SHR AL,
padilas [110]

Answer:

a) AL will contains 0011 1100

Explanation:

In assembly language, shifting bits in registers is a common and important practice. One of the shifting operations is the SHR AL, x where the x specifies that the bits be shifted to the right by x places.

SHR AL, 2 therefore means that the bits contained in the AL should be shifted to the right by two (2) places.

For example, if the AL contains binary 1000 1111, the SHR AL, 2 operation will cause the following to happen

Original bit =>                                        |   1  |  0 |  0  |  0  |  1 |  1 |  1 |  1 |

Shift once to the right =>                |  1 |   0 |  0  |  0  |  1 |  1 |  1 |  1 | (0) |

Shift once to the right =>          |  1 |  0 |  0  |  0  |  1 |  1 |  1 |  1 | (0) | (0) |

Notice;

(i) that there are two shifts - one at a time.

(ii) that the bits in bold face are the bits in the AL after the shift. Those that in regular face are those in the carry flag.

(iii) that the new bits added to the AL after a shift are the ones in bracket. They are always set to 0.

5 0
3 years ago
Implementing information systems has economic, organizational, and behavioral effects on firms. Information technology, especial
soldi70 [24.7K]

Answer: Economic

Explanation: Economic impact can be explained as the effect of a certain action, policy or action on the economy of an organization, country measured in terms of business revenue, gain or profit, impact on manufactory or production cost, inflation, monetary value and so on.

In the scenario above, the economic effect or impact of implementing information technology is highlighted in terms of lower cost of market participation, shrinkage in size of firms due to external participation and so on.

5 0
3 years ago
In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block bp
Sergio039 [100]

In order to prevent ports that are serving network hosts from being considered as best paths, BPDU guard should be enabled to block bpdus.

<h3>What are BPDU used for?</h3>

A bridge protocol data unit (BPDU) is known to be a kind of a data message that is known to be often  transmitted in a local area network to be able to know or find loops in that given network topologies.

Hence, in the case above, In order to prevent ports that are serving network hosts from being considered as best paths, BPDU guard should be enabled to block bpdus.

See full question below

. In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

a. BPDU filter

b. BPDU guard

c. root guard

d. BPDU drop

Learn more about ports from

brainly.com/question/10097616

#SPJ1

6 0
2 years ago
Where should you look in order to find words as they are used in a variety of contexts?
Elodia [21]
You'd want to look at the <span>glossary.</span>
8 0
3 years ago
2. Write a program with a function that accepts a string as an argument and returns a copy of the string with the first characte
Oduvanchick [21]

Answer:

Following are the code to this question:

def capital(val):#defining a method that takes string value as parameter

   x=True#defining boolean variable

   r=''#defining string variable  

   for i in val:#defining loop to convert the first character into upper case

       if i.isalpha() and x:#defining condition to check input value is string

           r=r+i.upper()#change value into uppercase and hold value in r variable

           x=False#assign value false in boolean variable

       elif i=='.' or i=='?' or i=='!':#check symbols

           r=r+i#add value in r variable

           x=True#assign value True in boolean variable

       else:

           r=r+i#add all value in r variable

   return r#return r variable value

val=input()#input value in val variable

print(capital(val))#called the function which print the return value

Output:

please find the attachment.

Explanation:

  • In the above python program, a method "capital" is declared, which accepts a "val" a string value in its parameter, and inside the method one boolean "x" and one string "r" variable is used, in which r stores return value.
  • In the next step, for loop is declared, inside the loop, the conditional statement is used, in if the block it checks string value and converts the first character into upper case and assigns value false in the boolean variable.  
  • In the next step, elif block is defined that adds value in r variable and at the last, it will return function value, at the last step "val" variable is declared that input value from the user and pass into the method and print its return value.

4 0
3 years ago
Other questions:
  • PLC software does not typically fail or break​
    15·1 answer
  • The benefits associated with AAA are increased security, increased control over the network, and the capability of auditing your
    12·1 answer
  • When working in the middle of a presentation, how do you preview the slide show from the current slide?
    12·1 answer
  • Who plays Roblox and wants to be friends on it
    9·2 answers
  • ​open-source software is​ ________.
    11·1 answer
  • What are the benefits of building redundancy into a network?
    12·1 answer
  • Question 1 (1 point)
    5·2 answers
  • Hosts on the Internet have ________ addresses. Group of answer choices both A and B neither A nor B IP data link
    13·1 answer
  • Define operating system?explain the types of operating system on the basis of use.​
    7·1 answer
  • What represents a user’s specific preferences?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!