1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
13

Netiquette is the

Computers and Technology
1 answer:
e-lub [12.9K]3 years ago
4 0

Answer:

C

Correct or acceptable way of communicating

You might be interested in
Diagnosing is solving the problem, and trouble shooting is figuring out what the problem is.
exis [7]
False its the opposite
3 0
3 years ago
Egyptian hieroglyphs were part of a writing system used by the ancient Egyptians. What type of graphic design elements did they
Lina20 [59]

Answer:

Logographic, syllabic, and alphabetic elements. I think thts what u were asking for?

Explanation:

3 0
3 years ago
To implement a small database, a database designer must know the "1" and the "M" sides of each relationship and whether the rela
elena55 [62]

Answer: True

Explanation:

The lines connecting an entity with a relationship whether single or double line refer to another constrain called “Existence Dependency Constraint” (also called “Participation Constraint”).

6 0
3 years ago
Attribute variables have the same meaning as participants variables. is this true or false?​
zysi [14]

Answer:

true

Explanation:

because I said so dude

5 0
3 years ago
Is there such a thing as an ethical reason for unauthorized access into a computer system?
Anastaziya [24]
Of course there is. On a simple level, consider a parent trying to locate their missing child. Someone might break into their social media accounts to see if there are messages that might help determine their whereabouts.

Consider a website hosting inappropriate pictures of children. Breaking into the server hosting the files and removing them is 100% ethical. 

I'm sure you can think of more examples. 
7 0
2 years ago
Other questions:
  • Your company is developing a new marketing campaign and wants to know which customers have never placed an order. You will need
    10·1 answer
  • A patient presents at an outpatient urgent care facility with an acute illness and is seen by a provider. A detailed history wit
    13·1 answer
  • Write a java program which uses methods for calculating the sum of any 5 non-zero integer digits that are input. The program mus
    8·1 answer
  • What is a GUI?
    11·1 answer
  • What is the plan to make optimum usage of available spaces?
    15·1 answer
  • Assume that class BankAccount exists, and that it has a constructor that sets the private field balance, and that setBalance and
    13·1 answer
  • Is a free verse a poetry that has no images
    5·2 answers
  • How does the autosum command calculate data? Need help ASAP​
    5·1 answer
  • B) The company's chief financial officer recognizes the need for an upgrade to the smart watches, but does not understand why th
    8·1 answer
  • Which of the following are true about algorithms? (You may select more than one)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!