1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
3 years ago
9

Respecting yourself and others, educating yourself and connecting with others, and protecting yourself and others are all aspect

s of being a good _____ ______
(2 words) enter your answer

PLEASE HELP QUICK!!!!
Computers and Technology
2 answers:
____ [38]3 years ago
7 0

Answer: kind person

Explanation:

vodka [1.7K]3 years ago
3 0

Answer:

Digital citizen.

Explanation:

The term digital citizen is ued in Computers and technology to make reference to a person that uses the internet and the connections that this creates to interact with information and people all around the globe, part of been a good digital citizen involves respecting yourself and others, educating yourself and conneting with others and protecting youserlf and others.

You might be interested in
Thomas Edison and his assistant W. K. L. Dickson patented which device in 1891
Svetlanka [38]
They patented the kinetoscope
5 0
3 years ago
Read 2 more answers
In Tynker it is not possible to create a/an______.
alina1380 [7]

Answer:

IDE

Explanation:

8 0
3 years ago
The function below tries to create a list of integers by reading them from a file. The file is expected to have a single integer
Setler [38]

Answer:

Check the explanation

Explanation:

def get_list_of_integers_from_file(filename):

int_list=[]

for line in open(filename).readlines():

try:

int_list.append(int(line))

except:

continue

return int_list

print(get_list_of_integers_from_file('file.txt'))

 

File.txt:

Kindly check the output below.

4 0
3 years ago
You receive a phone call from a co-worker telling you that "the network is down." Just as you are about to look into the issue,
Dvinal [7]

This issue will happen mostly if cellular network will not be down, or suppose if cellular network is down mostly, or it will be rainy or a current cutoff issue might be occurred.

<u>Explanation:</u>

The following step to be made for trouble shoot his phone when cellular network is down.

1. Restart the mobile:- After restarting kindly check mobile connectivity.

2. Check for mobile air plane mobile and make sure the mobile phone is not in air plane mode.

3. Check the income and outgoing vapidity.

4. Switch off the mobile, Remove service provider sim card from mobile and reinsert the sim card and start the mobile.

5. Still connectivity problem, either contact the service provider or replace with new sim card.

5 0
3 years ago
If the firewall is configured for credential phishing prevention using the "Domain Credential Filter" method, which login will b
ahrayia [7]

Mapping to the IP address of the logged-in user<u>-will detect  a credential theft</u>

<u></u>

Explanation:

In the "Domain Credential Filter" method the firewall matches the username and the password submitted by the user with the corporate user id and password.

In order to match the credentials submitted by the user the firewalls retrieves data from the bloom filter which is further connected  to windows  User-ID credential service add-on.

The firewall also looks in its Mapping Table for the IP address of the logged-in user

3 0
3 years ago
Other questions:
  • suppose you need to verify how to correctly use commas. you pen your English textbook and scan the chapter titles in which one w
    15·1 answer
  • Methods for preventing/overcoming group conflict include all EXCEPT:
    10·1 answer
  • Name a computer programme that designers are likely to use to create a leaflet advertising their new product
    15·1 answer
  • Please helpp!! I need it quickly!
    6·1 answer
  • We want to construct a memory with 256 bytes in capacity. Assume that each byte has a unique address. (a) How many address lines
    14·1 answer
  • Plane eyes I don't know
    9·1 answer
  • A variable that can have values only in the range 0 to 65535 is a :
    5·1 answer
  • When the "swen" virus infected someone's system, it made significant changes to the registry that caused it to be extremely diff
    11·1 answer
  • host b is sending an email intented for the user on host a to the mail server what protocol is being used to send the message
    10·1 answer
  • Select the correct line of missing code to create an output of "hello."
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!