1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
3 years ago
8

I WILL GIVE BRAINIEST ANSWER AND THANKS IF YOU ANDWER THIS QUESTION!!!!

Computers and Technology
1 answer:
sesenic [268]3 years ago
6 0
Access: full electronic participation in society.
Commerce: electronic buying and selling of goods.
Communication: electronic exchange of information.
Literacy: process of teaching and learning about technology and the use of technology.
Etiquette: electronic standards of conduct or procedure.
Law: electronic responsibility for actions and deeds.
Rights & Responsibilities: those freedoms extended to everyone in a digital world.
Health & Wellness: physical and psychological well-being in a digital technology world.
Security (self-protection): electronic precautions to guarantee safety.

IMPORTANT
Etiquette. Students need to understand how their technology use affects others. ...
Literacy. Learning happens everywhere. ...
Rights and responsibilities. Build trust so that if something happens online, students are willing to share their problems or concerns about what has happened.
You might be interested in
This device transmits data to all the workstations on a network. gateway hub router switch
marshall27 [118]
hub transmits to all workstations
Switch transmits to specific workstations
Gateway is a connection between subnets
Router locates the correct destination for packets
5 0
4 years ago
Read 2 more answers
you are using linux and need to perform a reverse lookup of the ip address 10.0.0.3. which command would you use to accomplish t
ollegr [7]

A command you would use to perform a reverse lookup of the IP address 10.0.0.3 on a Linux system: dig -x 10.0.0.3.

<h3>What is a Linux command?</h3>

A Linux command can be defined as a software program that is designed and developed to run on the command line, in order to enable an administrator (end user) of a Linux network perform both basic and advanced tasks by only entering a line of text.

<h3>What is IP address?</h3>

IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.

In Computer Networking, a command which an administrator (end user) would use to perform a reverse lookup of the IP address 10.0.0.3 on a Linux system is dig -x 10.0.0.3.

Read more on Linux commands here: brainly.com/question/25480553

#SPJ1

3 0
2 years ago
Howard’s In The Process Of Creating A Google Display Campaign And Decides To Use Custom Intent Audiences As A Targeting Option.
Vladimir79 [104]

Answer:

Option 3 and Option 4 i.e., URLs and Keywords are correct.

Explanation:

Howard through the Phase for developing the following display project as well as determines to still use specific Purpose Viewers As just the targeting tool. He would prefer to affect consumer attention, however his limited demographic is not served by such an in-market client group.  

  • Thus, URLs, as well as keywords, are data inputs that Howard sends to better serve his viewer.
  • So, the following are the reason that describe the other options are not appropriate according to the scenario.
6 0
3 years ago
List the different generation of computers with its main component​
Dennis_Churaev [7]

Answer:

1940 – 1956:  First Generation

1956 – 1963: Second Generation

1964 – 1971: Third Generation

1972 – 2010: Fourth Generation

2010-  : (Present )Fifth Generation

Explanation:

  1. First Generation Computers (1940-1956):In this Generation the main component of computers were Vacuum Tubes.
  2. Second Generation Computers (1956-1963):In this generation the main component of computers were Transistors.
  3. Third Generation Computers (1964-1971):In this generation the main component of computers were Integrated Circuits.
  4. Fourth Generation Computers (1972-2010):In this generation the main component of computers were Microprocessor
  5. Fifth Generation (2010-Present):In this generation the main component of computers is Artificial Intelligence
4 0
3 years ago
The eight great ideas in computer architecture are similar ideas from other fields. Match the eight ideas from computer architec
andrew11 [14]

Answer:

following are the answer to this question:

In option a, "Performance via Pipelining".

In option b, "Performance via Parallelism".

In option c, "Performance via Prediction".

In option d, "Make the Common Case Fast".

In option e, "Hierarchy of Memories".

In option f,  "Design for Moore’s Law".

In option g, "Dependability via Redundancy".

In option h, "Use Abstraction to Simplify Design".

Explanation:

Automotive assembly lines are Efficiency through pipelines.

The cable bridge suspension is used to Perform by Parallelism.  

The aircraft and navigation systems are designed to integrate and use through simulation wind information.  

The fast and the common Case is used to express lifts in the building.  

The Memory hierarchy library is used for the reserve desk.  

Extending the port area of a CMOS transistor to reduce Moore's Law Design for Moore's legislation switching sequence.

Increasing energy generation from the latest reactor technology dependability through redundancy. It enables the addition of electrical aircraft slingshots, which are electrically powered as opposed to the earlier steam models.  

It Constructs cars that depend on existing sensor systems, like automatic braking devices or clever speed control systems, that already have installed their monitoring system throughout the base vehicle by Using abstraction to ease the model.

7 0
3 years ago
Other questions:
  • Bullet points on a slide should be limited to _____. 2 4 8 10
    15·2 answers
  • A spreadsheet has some values entered:Cell A1 contains 10 cell A2 contains, cell A3 contains 7. you enter in cell A4 the followi
    14·2 answers
  • Someone plzzzzz help me!!!
    6·1 answer
  • What kind of security features does Microsoft Security Analyzer promise?
    5·1 answer
  • Write a program that reads in characters from standard input and outputs the number of times it sees an 'a' followed by the lett
    11·1 answer
  • Identify an advantage of working in teams.
    8·1 answer
  • Which of the following is categorized as an indirect payment
    9·1 answer
  • When you start a new blank document, you begin typing at the
    6·1 answer
  • What can relaxation help to reduce?
    14·1 answer
  • Who was the first person to develop http the language in which servers and browsers communicate
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!