1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trapecia [35]
3 years ago
6

1.How can we be a responsible online user???​

Computers and Technology
2 answers:
solong [7]3 years ago
6 0

Answer:

if we use appropriate language and behavior when interacting with others (i.e. no cyberbullying)

may this help u

PSYCHO15rus [73]3 years ago
3 0

Answer:

Be respectful – and expect respect.

Protect your reputation.

Protect your privacy.

Watch your tone.

Be sceptical.

You might be interested in
20. A computer freezes at odd times. At first, you suspected the power supply or overheating, but you have eliminated overheatin
ahrayia [7]

Answer:

Flash BIOS

Explanation:

In flash BIOS, BIOS is stand for basic input output system.

Flash BIOS the process by which we update the PC motherboard , its software .

It is mainly done to increase the performance and capabilities of a computer.

It is in the form of a chip and not in form of hard drive.

After flash BIOS the performance of computer is increases to great extent.

7 0
3 years ago
Which term describes an approach to security similar to defense in depth in that it supports multiple layers, but uses a differe
miss Akunina [59]

Answer:

The answer to this question is Diversity of Defense.

Explanation:

Diversity of defense:- It is an approach for security which supports multiple layers but the catch here is that at each layer a different mechanism of security is used or at most of the layers.The idea is that you do not need to have multiple layers of defense but different defenses also.  

So we conclude that the answer to this question is Diversity in Defense.

3 0
3 years ago
Lola wants to install an add-in in Excel.She has to unblock the add-in to allow Excel to open the add-in file automatically.To d
ololo11 [35]

Answer:

The correct answer is:

Properties (D)

Explanation:

First of all, option D (Properties) is the option that makes the most sense in this scenario, because the other options: Copy, Delete, and Rename are unrelated commands to what is to be achieved.

Secondly and more practically, an add-in file may not load in excel, and most of the time it is blocked by default and has to be unblocked. The following steps are used:

1. close Excel if it is open

2. open the folder where the add-in file is located, right-click on the add-in file, and select "properties"

3. a display tray will appear, having the attributes: Read-only, Hidden, Advanced, and unblock. Click the checkbox against "unblock" and make sure it is checked.

4. click Apply and Click Ok

Voila, your add-in file is unblocked.

<em>N:B The Images are for steps 2 and 3</em>

5 0
3 years ago
Which of these benefits can be achieved whensoftware is restructured?
Ivenika [448]

Answer:

iv. all of the given options

Explanation:

This is the correct answer because this is what happens when software is restructured.

<em>PLEASE</em><em> </em><em>DO MARK</em><em> </em><em>ME AS</em><em> </em><em>BRAINLIEST</em><em> </em><em>IF</em><em> </em><em>MY ANSWER</em><em> </em><em>IS HELPFUL</em><em> </em><em>;</em><em>)</em><em> </em>

4 0
3 years ago
Select the term below which is a protocol that provides a method for software components to communicate, interact, and share dat
KATRIN_1 [288]

Answer:

B. Application programming interface

Explanation:

An application programming interface (API) is an interface or communication protocol between different parts of a computer program intended to simplify the implementation and maintenance of software. An API may be for a web-based system, operating system, database system, computer hardware, or software library.

8 0
3 years ago
Other questions:
  • Hands-on Assignment To these assignments, refer to the tables in the JustLee Books database. Generate and test two SQL queries f
    10·1 answer
  • The main storage device inside a computer where programs and files are saved is called the
    5·1 answer
  • Peter accumulated many photos from his visit to Wisconsin. He wants to upload these photos to a social networking site. Which fi
    12·1 answer
  • The work principle is not always true<br> T or F
    11·2 answers
  • Who predicted nearly 60 years ago that the rise of electronic media would create a "global village," thereby reducing the barrie
    12·1 answer
  • Why is it important to recognize web adress endings ?
    13·1 answer
  • What is a frame injection attack in a wireless network?
    13·2 answers
  • The type of memory that stores data<br>Currently in used is called​
    8·2 answers
  • Complete the sentence.
    10·1 answer
  • Data is stored on ________ using a laser to either melt the disc material or change the color of embedded dye.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!