answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zavuch27 [327]
2 years ago
5

A school librarian has been asked to identify inappropriate Internet usage. Which students would most likely be reported to the

principal? Check all that apply.
a student who researches various websites that show how to gamble online
a student who finds a link to a news story about the Ku Klux Klan for a social studies project
a student who visits a special website with step-by-step directions on how to make a bomb
a student who posts jokes online about the cultural heritage of other students
a student who logs onto the school’s social media site to see pictures of classmates
Computers and Technology
2 answers:
Jlenok [28]2 years ago
6 0

Answer:

a student who researches various websites that show how to gamble online

a student who visits a special website with step-by-step directions on how to make a bomb

a student who posts jokes online about the cultural heritage of other students

Explanation:

adoni [48]2 years ago
5 0

Answer:

a student who researches various websites that show how to gamble online

a student who visits a special website with step-by-step directions on how to make a bomb

a student who posts jokes online about the cultural heritage of other students

Explanation: These are all most likely against school policy. In fact attempting to make a bomb is illegal.

You might be interested in
When considering server consolidation, plan on running ___________ vCPUs per core.a. 1 to 2b. 3 to 4c. 4 to 6d. 6 to 8
GREYUIT [131]

Answer:

c. 4 to 6

Explanation:

According to the VMware, a virtual machine software company widely known for producing the virtualization software, which is capable of making computer hardware components to be compartmentalized into various virtual layers, recommended the best practices of virtual CPU per core to be running 4 to 6.

Hence, in this case, the correct answer is option C

4 0
2 years ago
Light travels at 3 × 108 meters per second. A light-year is the distance a light beam travels in one year.Write a PYTHON program
Art [367]

Answer: This is a python code

def lightyear():

   rate=3*100000000   //speed of light

   seconds=365*24*60*60   //number of seconds in 1 year

   return str((rate*seconds)/1000)+" km"    //distance=speed x time

print(lightyear()) //will print value of light hear in kilometers

OUTPUT :

9460800000000.0 km

Explanation:

In the above code, there is a variable rate, which stores the speed of light, i.e. distance traveled by light in 1 second which is in meters. Another variable is seconds, which store the number of seconds in 1 year, which is no of days in 1 year multiplied by the number of hours in a day multiplied by the number of minutes in an hour multiplied by the number of seconds in a minute. Finally, distance is speed multiplied by time, so distance is printed in kilometers and to convert distance in kilometers it is divided by 1000.

4 0
2 years ago
Have you ever tried to teach a class full of restless, active sixth-graders? I have. I taught sixth-grade students for 12 years.
Illusion [34]

1.the average class size at Harbor Elementary School is 32.    

2.The National Education Association recommends a class size of 23.

3. She taught sixth-grade students for 12 years.

Hope this helps:)

5 0
2 years ago
Write a function named "list_concat" that takes a list of strings as a parameter and returns the concatenation of all the values
Marina CMI [18]

Answer:

Following are the program in python language:

def list_concat(ls): #define function

if(len(ls) == 0): #set if condition

return ""

res = ""

for x in ls: #set for loop

res += x + " "

return res[:len(res)-1] #removing the extra spaces from list

ls = ['limit','break','ready'] #initialize the value in list

print(list_concat(ls)) #call the function

Output:

limit break ready

Explanation:

Here we declared a function "list_concat()" in which we pass an argument "ls" then check if condition that check the length of list .We also Iterating  the loop in that function  res[:len(res)-1] statement removes the extra space from the list and finally print the list

7 0
2 years ago
A file concordance tracks the unique words in a file and their frequencies. Write a program that displays a concordance for a fi
neonofarm [45]

Answer:

Python file with appropriate comments given below

Explanation:

#Take the input file name

filename=input('Enter the input file name: ')

#Open the input file

inputFile = open(filename,"r+")

#Define the dictionary.

list={}

#Read and split the file using for loop

for word in inputFile.read().split():

  #Check the word to be or not in file.

  if word not in list:

     list[word] = 1

  #increment by 1

  else:

     list[word] += 1

#Close the file.

inputFile.close();

#print a line

print();

#The word are sorted as per their ASCII value.

fori in sorted(list):

  #print the unique words and their

  #frequencies in alphabetical order.

  print("{0} {1} ".format(i, list[i]));

3 0
2 years ago
Other questions:
  • Is used to process certificates and private/public key information?
    12·1 answer
  • Any software or program that comes in many forms and is designed to disrupt the normal operation of a computer by allowing an un
    13·1 answer
  • Open this link after reading about Ana's situation. Complete each sentence using the drop-downs. Ana would need a minimum of ato
    5·2 answers
  • Assuming that the valid cost should be between 100 and 200, does the following code snippet test this condition correctly?
    10·1 answer
  • If byte stuffing is used to transmit Data, what is the byte sequence of the frame (including framing characters)? Format answer
    6·1 answer
  • You are using a polynomial time 2-approximation algorithm to find a tour t for the metric traveling salesman problem. Which of t
    7·1 answer
  • Sara is using her personal laptop (which is password protected) at a "hotspot" at a local cafe with wifi access. She is in the m
    7·1 answer
  • The variable grade can have any real number value from 0 to 100. Ask the user to enter a grade in numerical form. Write an if-el
    9·1 answer
  • Universal Containers (UC) uses a custom object called Vendor. The Vendor custom object has a Master-Detail relationship with the
    10·1 answer
  • Java Programming home > 1.14: zylab training: Interleaved input/output Н zyBooks catalog Try submitting it for grading (click
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!