1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
3 years ago
11

Responsible use of computer is known as ................. .​

Computers and Technology
1 answer:
Wittaler [7]3 years ago
6 0

Answer:

This refers to the proper etiquettes and attitudinal posture to display while handling or using a computer system to ensure maximum performance, confidentiality and respect for other people's right.

Explanation:

You might be interested in
5 differences between a regular mouse and a gaming mouse​
alexdok [17]

Answer:

A gaming mouse has more buttons to keybind to while a regular mouse is simpler

Explanation:

6 0
2 years ago
Jesse is writing a physics quiz about the motion of a roller coaster cart. He has a clip art illustration of a cart rolling hori
NISA [10]
<span>1.editing the image file in a dedicated photo editing program before inserting it
Hope this reaches you before net neutrality sets in</span>
4 0
3 years ago
Read 2 more answers
What are the elements of an autobiographical narrative similar to those of a short story?
sattari [20]
A. because the form is about stories from events in a writer's life
6 0
3 years ago
What data unit is encapsulated inside a packet?
viva [34]

Answer: datagram

Explanation:

7 0
3 years ago
Read 2 more answers
Connection-oriented protocols protect against dropped data by forming connections and using what type of constant stream?
nataly862011 [7]

Answer:

A real constany

Explanation:

5 0
3 years ago
Other questions:
  • The spreadsheet below shows the age, grade level, major, and minor of four students in college. A purple background in the Major
    7·1 answer
  • A database has a built-in capability to create, process and administer itself.
    14·1 answer
  • Which of the following is most likely to be a result of hacking? Group of answer choices slowing of network speed certain Web si
    13·1 answer
  • Molly, an end-user, connects an external monitor, external keyboard and mouse, and a wired network cable to her laptop while wor
    5·2 answers
  • Application software can run without the presence of system software true or false ​
    5·1 answer
  • Pleaseeeeeeeee I will give a brainliest
    7·1 answer
  • When a guest is wearing the medallion, they can order a drink with their smartphone or open their cabin door automatically by st
    13·1 answer
  • What is the correct order for writing the 3 dimensions for a 3D object? Here are the 3 dimensions:
    15·1 answer
  • PLS HURRY<br> Look at the image below
    8·1 answer
  • What is algorithm and how does it works​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!