1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Irina18 [472]
3 years ago
5

PLZ HELPP!

Computers and Technology
2 answers:
NikAS [45]3 years ago
8 0

Answer: These are just a few of the ways in which technology may positively affect our physical and mental health: health apps to track chronic illnesses and communicate vital information to doctors. health apps that help you track diet, exercise, and mental health information

kirza4 [7]3 years ago
5 0

Answer: B

Explanation:  A, is incorrect becuase the internet is not always hsafe {hacking}

C is incorrect becuase, that's not true many people can.

D i s incorrect becuase, with out talking to people that causes depression.

B is correct becuase learning is very good for you and your future, and you learn everywhere everyday.

You might be interested in
Why is musical notation important? What benefits do musicians and others receive from being able to write down and note aspects
madreJ [45]
Most importantly, musicians can share their works with others.  Other people can see their musical ideas and can try and perform them too.   Nuances such as tempo, dynamics (loud soft, sweet, "harsh", are just some examples) can be understood even if the composer is not present and there is no recording to listen to.
Financial benefits can be realized from the sale of sheet music, scoring the piece, arranging the piece for bands, orchestras, etc. Conductors can lead an entire musical ensemble through the piece. 
4 0
4 years ago
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
3 years ago
Which activity represents a violation of the licensing agreement
kvasek [131]
Could you give the answers it gives you? It should be along the lines of purposeful destruction of equipment.
5 0
4 years ago
Read 2 more answers
Question 6 options: This is a category or partitioned group of the small units of a programming language include its numeric lit
Wittaler [7]

Lexeme is a category or partitioned group of the small units of a programming language include its numeric literals, operators, and special words.

<h3>What is a lexeme in programming?</h3>

Lexemes are known to be those character strings that are put together from the character group of a program, and the token stands for what aspect of the program's grammar they are made of.

Hence, Lexeme is a category or partitioned group of the small units of a programming language include its numeric literals, operators, and special words.

Learn more about Lexeme from

brainly.com/question/14125370

#SPJ1

6 0
2 years ago
Type the correct answer in the box. Spell all words correctly.
puteri [66]

Explanation:

Type the correct answer in the box. Spell all words correctly.

Ben has to type a long letter to his friend. What is the correct keying technique that Ben should use?

To prevent strain and key correctly, Ben should use his fingers gently over the keys with his wrist in a flat position.

7 0
3 years ago
Other questions:
  • Your computer is once again out of hard drive and you want to see which folders are consuming the most space on your drive. Whic
    15·1 answer
  • Jackson is teaching the decimal number system. He wants his students to know how to expand numbers by powers of 10. Which is the
    13·2 answers
  • In the ____, or ad hoc, layouts configuration, there is no access point at the center of a cell.
    7·1 answer
  • What is the difference between requirements and controls in the security process? Give examples of each.
    11·1 answer
  • Lists are indexed by an ________. a. float b. integer c. string d. All of the above​
    8·1 answer
  • Of the following hard drives, which one is fastest?
    13·1 answer
  • What is the difference between packaged and tailored software ​
    13·1 answer
  • Which JavaScript defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B?
    6·1 answer
  • Yusuke has been a fan of online games for as long as she can remember. She particularly loves the role-playing games that allow
    7·1 answer
  • Explain download as used in computing environment.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!