answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FromTheMoon [43]
2 years ago
14

What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg

ed with crimes. Online chat room disagreements usually lead to violence. Students become vulnerable to cyberbullying and harassment. Anyone can join a discussion board, regardless of their background.
Computers and Technology
2 answers:
adelina 88 [10]2 years ago
4 0

Explanation:

Students become vulnerable to cyberbullying and harassment.

adell [148]2 years ago
3 0

Answer:

Students become vulnerable to cyberbullying and harassment.

Explanation:

You might be interested in
For drivers under 21, the penalties for driving with an illegal BAL include _____.
JulijaS [17]
Up to one year In jail
5 0
2 years ago
Read 2 more answers
Implement a function printWordsLines() that takes as a parameter the name of an input file. It opens the input file and then pri
Talja [164]

Answer:

def printWordsLines(filename):

   file = open(filename, 'r')

   lines = 0

   words = 0

   for line in file:

       line.rstrip()

       lines += 1

       word = line.split(' ')

       words += len(word)

   print('the file ',filename,' contains ',words,' and ', lines, ' lines')

   file.close()

printWordsLines('words')

Explanation:

the file used was words in txt format and its contents are given as follows

hello aamir jan khan

parallelogram abdullah

anaconda ali

pycharm notebook

7 0
2 years ago
Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data
iren [92.7K]

Answer:

De-identification or data anonymization.

Explanation:

Privacy rights are fundamental right of individuals to privatise all personal information, when creating an account.

The de-identification and data anonymization technology is provided by the organisation to user, to prevent their information to be viewed by others. It commonly used in cloud computing, communication, internet, multimedia etc. Reidentification is the reversing of the de-identification effect on personal data.

4 0
2 years ago
A user called to inform you that the laptop she purchased yesterday is malfunctioning and will not connect to her wireless netwo
kakasveta [241]

Answer:

You can perform the following two steps

Explanation:

  1. Have the user press the appropriate function key combination to enable the wireless radio and then attempt to connect to the wireless network (since by mistake he could have disabled it).
  2. Ask the user to turn on the laptop’s airplane mode and attempt to reconnect to the wireless network (this mode basically what it does is disable adapters and activate it will connect the Wi-Fi network).
7 0
2 years ago
1.Write a program in python to find the sum and average of any 3 input numbers.
klasskru [66]

Answer:

ok then i might if i can be bothered

P(-2,2), Q(4,2), R(2, -6), S(-4,-6P(-2,2), Q(4,2), R(2, -6), S(-4,-6P(-2,2), Q(4,2), R(2, -6), S(-4,-6

4 0
2 years ago
Other questions:
  • What does the hard disk drive do? It stores all of the information on a computer. It controls a computer’s operating system. It
    12·2 answers
  • Describe two reasons to use the Internet responsibly. Explain what might happen if the Internet use policies were broken at your
    12·2 answers
  • Moore’s Law is said to be more of a trend, rather than a representation of the actual number of transistors on a silicon chip. W
    14·1 answer
  • Kelli is unable to find a shape that meets her needs which feature in PowerPoint should she use to create shapes that are comple
    8·1 answer
  • Give a proof for each statement.
    13·1 answer
  • Dillard’s wants to learn about its consumers' attitudes toward online purchases. There are numerous studies that are available a
    9·1 answer
  • The term Electronic Privacy Information Center (EPIC) refers to a form of the digital subscriber line technology, which enables
    6·1 answer
  • Juan, a network user, sends an email to you, the IT admin of the network, stating that his account is locked because he has lost
    14·1 answer
  • Square a Number This is a practice programming challenge. Use this screen to explore the programming interface and try the simpl
    11·1 answer
  • Java Programming home > 1.14: zylab training: Interleaved input/output Н zyBooks catalog Try submitting it for grading (click
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!