1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
2 years ago
6

Which activity is the best example of a negative habit that may result from heavy and internet usage

Computers and Technology
1 answer:
Minchanka [31]2 years ago
8 0

Answer:

Avoiding going outside in order to play online games / online shopping / watch videos online.

Explanation:

Any activity that has a negative impact on an internet user is bad but one of the main ones is probably - avoiding going outside in order to play online games / online shopping / watch videos online.

Hope this helped!

You might be interested in
A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to sever
Leno4ka [110]

Answer:

B. Change the router's default administrative password

Explanation:

The best way to prevent any unauthorized use is to change the password to something more secure using 12 minimum characters and including number, symbols, upper and lower case.

4 0
3 years ago
A file type is the standard used to and information in a computer. All file types have unique that determine which program to us
Oxana [17]

The term record types portrays the assortment of relationship among archives and the applications that utilization them. The most clear utilization of this component is that, for instance, Windows knows to run Notepad when you double tap on a book report in Explorer (confirmation that Windows XP isn't genuinely question arranged).

Genuine object-situated configuration manages that articles (for this situation, records and envelopes) know about their very own attributes. This plan is just copied in Windows XP. Rather than each record knowing which application is utilized to alter it, Windows decides how to deal with a document dependent on the filename expansion. This structure has points of interest and weaknesses, however Microsoft's choice to shroud filename augmentations, the reason for record affiliations, just makes the entire framework increasingly hard to comprehend and ace.

Everything begins with document augmentations, the letters (normally three) that pursue the period in many filenames. For instance, the augmentation of the record Readme.txt is .txt, connoting a plain-content document; the expansion of Resume.wpd is .wpd, implying an archive made in WordPerfect. Naturally, Windows shrouds the expansions of enlisted record types in Explorer and on the work area, however it's ideal to have them shown.

Record expansions not just enable you to effectively figure out what sort of document a specific document is (on the grounds that symbols are never unmistakable enough), yet additionally enable you to change Windows' view of the kind of a record by essentially renaming the augmentation. Note that changing a document's augmentation doesn't really change the substance or the organization of the record, just how Windows associates with it.

To show your document augmentations, open Folder Options in Control Panel (or from Explorer's Tools menu), pick the View tab, and mood killer the Hide expansions for realized record types alternative. Snap OK when you're set.

By concealing record expansions, Microsoft wanted to make Windows simpler to utilize—an arrangement that exploded backward for a few reasons. Since just the expansions of enrolled documents are covered up, the augmentations of records that aren't yet in the File Types database are still appeared. Even all the more confounding that, when an application at long last claims a specific document type, it can appear to the unpracticed client just as the entirety of the old records of that type have been renamed. It likewise makes an "information hole" between the individuals who comprehend document types and the individuals who don't; take a stab at telling somebody whose PC still has concealed augmentations to discover Readme.txt in a catalog loaded with records. Different issues have emerged, for example, attempting to separate Excel.exe and Excel.xls in Explorer when the expansions are covered up; one record is an application and the other is a report, however they might be generally undefined.

Redo Context Menus

A setting menu (once in a while called an alternate route menu ) is the little menu that shows up when you utilize the correct mouse catch to tap on a record, envelope, application titlebar, or almost some other item on the screen. More often than not, this menu incorporates a rundown of activities proper to the item you've clicked. As it were, the alternatives accessible rely upon the specific circumstance.

The setting menu for documents, the most ordinarily utilized and altered setting menu, relies on the sort of record chosen, which is dictated by the filename augmentation. For instance, all content documents (with the .txt augmentation) will have a similar setting menu, paying little respect to what they contain or which application was utilized to make them. (This is the reason Windows gives you a harsh admonition when you attempt to change a document's expansion.)

4 0
3 years ago
Which of the following statements is false?
maks197457 [2]

Answer: C. Hardware controls software.

Explanation:

It is the software which controls all the functionalities of the hardware. The hardware is the backbone of the system so when a software is being developed it is kept in mind of the hardware it will require to support. We as a client we cannot access the hardware directly, as for using the hardware we need a third party.

Here the third party is the software which make use of the hardware such as ram, memory, registers etc. For example we have a software where we need to perform calculation. So this software will to access the memory and the registers for storing the values. Then the calculations need to be performed in the ALU and then again store the output in the memory.

So, in this way we can say that the software controls the hardware.

6 0
3 years ago
Technician A says a 2:1 gear ratio doubles the amount of torque. Technician B says a 2:1 gear ratio reduces the speed by half. W
Alina [70]

b, a 2 to 1 increases doubles speed and reduces speed by half

4 0
3 years ago
Your boss calls you from the road she's trying to connect to the local hotel guest wireless network but there's a yellow shield
tino4ka555 [31]

Hiya!

If there is a yellow shield next to the wireless icon, this indicates that the connection is functioning but is not secured. In this case because she's using the hotel guest wifi, I would tell her to switch to a more secure network or to disregard the error.

Hope this helps!

6 0
3 years ago
Other questions:
  • Consider this scenario: A major government agency experiences a data breach. As a result, more than 100,000 personal records are
    7·2 answers
  • Which of these is outside the scope of an art director's responsibility?
    12·2 answers
  • What will cloud cumputing offer
    15·1 answer
  • Climate is considered a(n) _______ limiting factor. (2 points)
    9·1 answer
  • Materials such as copper, silver, and aluminum through which electric energy passes freely are called
    13·1 answer
  • What was the first Apple computer, and who was it designed by?
    7·2 answers
  • In the original UNIX operating system, a process executing in kernel mode may not be preempted. Explain why this makes (unmodifi
    9·1 answer
  • What is a navigation bar?
    7·1 answer
  • What number will this code return?<br> Math.max(7, 5, 9);
    6·1 answer
  • Class Main {
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!