answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka57 [31]
2 years ago
12

Describe two reasons to use the Internet responsibly. Explain what might happen if the Internet use policies were broken at your

school.
HELP ASAP PLS
Computers and Technology
2 answers:
maxonik [38]2 years ago
6 0

Answer:

It would be dangerous to give away any personal information on the internet because someone could attempt to find you, your family, your friends, your co-workers, etc. It is also important to use the internet responsibly because your future employers can track down your internet usage to see if you are worthy of the position they are offering. If those policies were broken at school you can not only get into trouble but damage your reputation to the school administrators who will be asked for recommendations for  work opportunities in the future.

viva [34]2 years ago
3 0

Answer:

You should always use the internet responsibly because you never know what kind of people you could run into and the things you might see could sometimes be inappropriate or harmful.

If the internet polices were broken at school you could risk losing internet privileges for everyone and you could even get yourself into a lot of trouble.

You might be interested in
For any element in keysList with a value greater than 50, print the corresponding value in itemsList, followed by a space. Ex: I
VARVARA [1.3K]

Answer:

import java.util.Scanner;  //mentioned in the question.

public class ArraysKeyValue {  //mentioned in the question.

public static void main (String [] args) {  //mentioned in the question.

final int SIZE_LIST = 4; //mentioned in the question.

int[] keysList = new int[SIZE_LIST]; //mentioned in the question.

int[] itemsList = new int[SIZE_LIST]; //mentioned in the question.

int i; //mentioned in the question.

keysList[0] = 13; //mentioned in the question.                                

keysList[1] = 47; //mentioned in the question.

keysList[2] = 71; //mentioned in the question.

keysList[3] = 59; //mentioned in the question.

itemsList[0] = 12; //mentioned in the question.

itemsList[1] = 36; //mentioned in the question.

itemsList[2] = 72; //mentioned in the question.

itemsList[3] = 54;//mentioned in the question.

// other line to complete the solution is as follows--

for(i=0;i<(keysList.length);i++) //Loop to access all the element of keysList array variable.

    {// open for loop braces

        if(keysList[i]>50) // compare the value of keysList array variable with 50.

        System.out.println(itemsList[i]); // print the value

   }// close for loop braces.

}//  close main function braces.

} //close the class braces.

Output:

72

54

Explanation:

In the solution part--

  1. One loop is placed which moves from 0 to (size-1) of the 'keyslist' array.
  2. Then the 'if' statement is used to check the element of 'keyslist' array, which is greater than 50 or not.
  3. If it is greater, then print the element of item_list array of 'i' index which is also the index of greater value of keyslist array element.

5 0
2 years ago
Server farms such as Google and Yahoo! provide enough compute capacity for the highest request rate of the day. Imagine that mos
EleoNora [17]

Answer:

a) Power saving = 26.7%

b) power saving = 48%

c) Power saving = 61%

d) Power saving = 25.3%

Explanation:

3 0
2 years ago
Each row of the scoring guide one is worth one point, so response 2d is worth up to 2 points total. Should the student get 0, 1
maksim [4K]

Answer:mmmmm

Explanation:

5 0
2 years ago
Read 2 more answers
Network flow issues come up in dealing with natural disasters and other crises, since major unexpected events often require the
nasty-shy [4]

Answer:

Check the explanation

Explanation:

Algorithm for solving flood condition:

We suggest an algorithm to resolve the flood condition by creating a flow network graph.

Let us assume for every patient "p" there is a node "2" and for every hospital "h" there is a node "uh" and there is an edge ()T, uh) exist between patient "p" and hospital "h" with flow capacity of 1 iff patient "p" is reachable to hospital "h" within a half-hour.

Then source node "s" is made between all the patient-nodes by an edge with flow capacity of 1 and then the sink "t" is made by linking all the hospital nodes by an edge with capacity "[n/k]".

There is an approach to send patients to hospitals: when there is a source "s" to sink "t" flow of "n". We can send 1 flow-unit from source "s" to sink "t" along the paths (s, yp, uh, t) whenever a probable approach is available to send patients.

This approach of sending patients to hospitals doesn't break the capacity limitation of edges. Hence we can send patient "p" to hospital "h" with 1 flow- unit if edge(m uh) permits at least 1 flow- unit.

The running-time of this algorithm is found by finding the time needed to solve max-flow graph with nodes O(n+k) and edges O(n^{k}) edges.

5 0
2 years ago
Your employer, yPlum Corporation is manufacturing two types of products: Mirabelle smartphone, and Blackamber laptop. The compan
Sever21 [200]

Answer:

See explaination

Explanation:

No of Mobiles=x1

No of Work stations=x2

Constraints:

50x1+70x2<=1,60,000

250x1+700x2 <= 1,20,00,000

x1>=0 x2>=0

Objective function N(x1,x2)= 7800000000 x1+ 7200000000 x2

Excel formulae:

G17 =D9*E7+F9*G7

G18= D10*E7*F10*G7

G19=E7

G20=G7

G21= I17*E7+I18*G7 (This will be Maximum)

And E7 and G7 will be solution.

Prepare sheet as shown in diagram and set the formulae.

Go to tool and select solver. Solver dialog will open, select ‘Assume Linear model’ and ‘assume non-negative’. Click solve model and click keep solution.

See attachment.

7 0
2 years ago
Other questions:
  • Icon view, list view, and details view are all common views provided by which kind of program?
    6·2 answers
  • To read encrypted data, the recipient must decipher it into a readable form. what is the term for this process? re-securing decr
    5·1 answer
  • The _______________ domain refers to any endpoint device used by end users, which includes but is not limited to mean any smart
    14·1 answer
  • Which telecommunications device is widely used in industries that require closed communication?
    7·2 answers
  • FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this i
    5·1 answer
  • Define the instance method inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids. Sample output for th
    10·1 answer
  • A laptop gets replaced if there's a hardware issue. Which stage of the hardware lifecycle does this scenario belong to?
    5·1 answer
  • Which of the following is true about sorting functions?
    14·1 answer
  • The hostel in which you plan to spend the night tonight offers very interesting rates, as long as you do not arrive too late. Ho
    5·1 answer
  • In this problem, you will derive the efficiency of a CSMA/CD-like multiple access protocol. In this protocol, time is slotted an
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!