1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
6

What is a negative impact of digital communication

Computers and Technology
1 answer:
galina1969 [7]3 years ago
5 0

Answer:

cyber bulling

Explanation:

You might be interested in
In most languages, if a file does not exist and a program attempts to open it in append mode, what happens?
chubhunter [2.5K]

Answer:

It create a new file in which writing of data begins.

Explanation:

A file can be open in the three mode:

-r (Read mode): open an existing file for the purpose of reading data from it.

-w (write mode): Create a new file for the purpose of writing data to it.

-a (append mode): open an existing file for the purpose of appending extra data to it but if the file does not exist, it create a new file and start writing data to it.

5 0
4 years ago
Câu 4. Trong môi trường lập trình CodeBlocks phím F9 dùng để: A. Biên dịch chương trình B. Chạy chương trình C. Soạn thảo chương
Debora [2.8K]

Answer:

câu trả lời là c nha

Explanation:

7 0
3 years ago
in the client server model, what is the primary protocol used for communication between a browser and Web server
worty [1.4K]
Assuming the client is using a web browser, your answer would most likely be the Hyper-Text Transfer Protocol (HTTP).

HTTP is a very, very common way of transfering insensitive data from client to server. HTTPS is more secure, adding a secure socket layer to protect communications from being intercepted.

--

As an alternative answer, the FTP (File Transfer Protocol) may be an acceptable answer, but this is usually not the primary method of communication for clients, as it is mainly used to access and modify files on the server, requiring a username-password combo to do so (usually).


7 0
3 years ago
Fill in the blank with the correct response.<br> A _<br> is an unknown network.
alexgriva [62]

Answer:

ip address

Explanation:

please mark brainliest

7 0
3 years ago
We look for trends when we are looking at data. What is a trend?
yulyashka [42]
A subject of what people say at the time, most used, famous at the present time
4 0
3 years ago
Read 2 more answers
Other questions:
  • How to type in color on clash royale
    15·2 answers
  • Instructions:Select the correct answer.
    15·2 answers
  • The _______ is a small program run by a computer when first powered on. its primary function is to stabilize the machine and dev
    11·1 answer
  • (EASY 15 POINTS) What are two indications in a browser that a secure connection is being used?
    6·1 answer
  • How does a hard drive work
    6·2 answers
  • 28. Which major NIMS Component describes recommended organizational structures for incident management at the operational and in
    10·1 answer
  • Some in the security community argue that a lack of diversity is security vulnerability. For example, Firefox and Internet Explo
    6·1 answer
  • Given three floating-point numbers x, y, and z, output x to the power of z, x to the power of (y to the power of z), the absolut
    12·1 answer
  • FREEE POINTS
    8·2 answers
  • 8.10 Code Practice Question 1
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!