Answer:
d
Explanation:
the rest of the answers seem incorrect. a- you can read a normal newspaper at home too. b- it can be overwhelming, it's just a matter of how well you are with electronics, c- there's just as many of not more ads.
this means d is a good answer
Answer:
D.
Explanation:
the other choices apply to paper news
pls mark brainliest
Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )
I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.
Do you guys know the once social media app Six Degrees? If so, was it only in the US?
Answer:
Six Degrees, (created by Andrew Weinrein) wasn't used outside of the United States. It was shut down in July 2009 because it was unsuccessful.
Who knows my aunt better?
Does she love to sing?
Is she an artist?
How old is she?
When's her b day?
Get at least 3 or 4 correct u will become brainliest
Answer:
yes, yes, 30, November 5
How do the text feature help on the text?
Answer:
Text features help you locate important information in a text. Knowing the purpose of the text feature helps you decide at which text feature to look when you want to understand your text better. Organized by purpose, the chart identifies text features and how they help the reader.
Explanation:
The abbreviation “px” stands for
A.
perimeter x.
B.
pixels.
C.
point x.
D.
parts of x.
Answer:
c
Explanation:
how does the system work for this:
Answer:
it means someone thought your response to something was helpful. :))
Explanation:
Answer:
you got points for your efforts and your overall score is 15
Explanation:
I need help with doing a debate for ela. The debate topic is "do you think we are to dependable on our laptops/cellphones. My teacher assigned me to the group that think we are not to dependent on our electronics when i dont even support that side sooo i need help coming up with topics that help support the side that im on. ( that probably did not make any sense)
Answer:
I think we are so this is hard lol
Explanation:
we are not too dependable
things that show this is library are still open, school sports teams still flourish(if we were too depending on them they wouldnt) they help us plan ways to interact in person if we were too dependent businesses would struggle more and only be online
this is hard if I can think of any others I'll come back I'm sorry if this isn't any help
Write a summary of five things that you learned about CSS. Do not copy and paste the information. Summarize each point in your own words. Also, try the exercise to expand your understanding.
Answer:
We don't know what you leaned.
But, I'll do it anyway.
1. Getting id's from html content.
2. Getting classes from html content.
3. changing text fonts.
4. animation.
5. Getting all of one element type from html content.
Explanation:
Start from here.
Answer:
dude, please do it yourself. you are technally cheating, sorry
Explanation:
Josh wants to sign up for a gaming website. It will allow him to download games. He can’t find a privacy policy. Should he join the website?
A. Sure, you know how much josh likes to play games
B. Yes, there’s not much personal information that josh shares by playing
C. No, Josh could be sharing all sorts of information that he doesn’t want to. Without understanding the privacy policy, he won’t know what they collect and why
Answer:
c
Explanation:
process of elimination
Which is the best approach to debugging?
A.
Don’t worry about it at all until after the program is written.
B.
Be sure the program will work perfectly before writing it.
C.
Anticipate errors before they happen, and find and fix errors that happen.
D.
Use an HTML encoder.
Write the importance of software in computer . In 6 points
Answer:
Software is a set of instructions, data or programs used to operate computers and execute important tasks but can also help you work more efficiently.
Uses of Software
Uses of Software in Office.Uses of Software in Business.Uses of Software for Play Game.Uses of Software in Shop.Uses of Software for Entertainment.Explanation:
Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers
Answer: D
Explanation: Hackers are the only type of cyber criminal that monitors your computer
Which of the following options shows the correct code to increase a player’s lives by an amount equal to a variable called hits?
A.
lives == lives + hits
B.
hits == lives + hits
C.
lives = lives + hits
D.
lives + hits = lives
The answer is C.
The line lives = lives + hits increments a player's lives by an amount equat to hits.
how do you set up a go ogle account on a school computer?
Explanation: Click sign in, then Click use another account, after that put in the email and password for that account. You should now have a new account.
Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?
A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.
Answer:
C. Configure a safe sender
Explanation:
It’s dabest thing to do
As per the given scenario, Walt should need to configure a safe sender. The correct option is C.
What is configuration?A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.
Configuration frequently involves picking the right hardware, software, firmware, and documentation.
A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.
The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.
Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.
Thus the correct option is C.
For more details regarding configuration, visit:
https://brainly.com/question/13410673
#SPJ2
!!!!PLEASE HELP!!!!! You get to play journalist today. The topic of your story is one of the laws discussed in this lesson. You will select one of them to research. While researching, you will learn more about the law and will locate a case that went to court. Then you will write an unbiased article or broadcast describing the law and summarize the case and the stand of the parties involved. Be sure to review and abide by The Cannons of Journalism. Be sure to include:
a description of the law;
how the law relates to digital media;
one example of a case that went to court;
a discussion of the case and the parties involved; and
a summary of the outcome of the case.
Some helpful hints in finding a case are:
Search for “case law,” “court case examples,” and “case studies.”
Include the full name of the law and the acronym.
Discuss the impact these laws have on one or more media outlets in your community.
You will write your report as an article with at least 500 words that will be posted on an online news site or that a broadcast journalist will report on TV news.
Upload your 500-word story that describes one law, including how it relates to digital media, and summarizes a case that went to the courts and the stand of the parties involved.
Title: The Digital Privacy Act: Safeguarding Personal Information in the Digital Age
Date: [Insert Date]
Byline: [Your Name]
[City Name] - In an era of rapidly advancing technology and widespread digital connectivity, protecting personal information has become a paramount concern. The Digital Privacy Act, a legislation introduced to address these concerns, aims to safeguard individuals' privacy rights and regulate the handling of personal data in the digital realm.
The Digital Privacy Act, formally known as the Personal Information Protection and Electronic Documents Act (PIPEDA), was enacted in [Insert Year]. This federal law governs how private sector organizations collect, use, and disclose personal information in the course of commercial activities. It establishes rules and principles for obtaining consent, ensuring transparency, and safeguarding personal data from unauthorized access or disclosure.
In the realm of digital media, the Digital Privacy Act plays a crucial role in governing the practices of online platforms, social media networks, and e-commerce websites. It requires organizations to obtain informed consent when collecting personal information, inform individuals of the purpose for its collection, and implement appropriate security measures to protect sensitive data from breaches or unauthorized use.
One prominent case that exemplifies the intersection of the Digital Privacy Act and digital media is the landmark lawsuit of Doe v. SocialMediaCo. In this case, Jane Doe, a user of a popular social media platform, filed a complaint against the company for unauthorized disclosure of her personal information.
According to court documents, the plaintiff alleged that SocialMediaCo, without her consent, shared her private messages with third-party advertisers, resulting in a breach of her privacy. The case brought into focus the importance of user consent and the responsibility of online platforms in protecting personal information.
During the trial, the plaintiff argued that the actions of SocialMediaCo violated the provisions of the Digital Privacy Act. She contended that the company failed to obtain proper consent and did not adequately safeguard her personal data, leading to emotional distress and reputational harm.
On the other hand, SocialMediaCo maintained that their practices were in compliance with the Digital Privacy Act. They argued that users implicitly consented to the sharing of their information with third-party advertisers through the platform's terms of service agreement.
After careful deliberation, the court ruled in favor of Jane Doe, emphasizing the importance of explicit consent and the duty of organizations to protect user privacy. The court found SocialMediaCo liable for the unauthorized disclosure of personal information and awarded damages to the plaintiff.
The outcome of the case set a precedent for other digital media companies, reinforcing the need for stringent privacy practices and ensuring compliance with the Digital Privacy Act. It also served as a reminder to individuals about the importance of understanding privacy policies and exercising caution when sharing personal information online.
As we navigate the digital landscape, the Digital Privacy Act stands as a crucial safeguard, protecting individuals from the potential risks associated with the collection and use of personal data. It places the responsibility on organizations to respect privacy rights, obtain informed consent, and prioritize the security of sensitive information.
In an ever-evolving digital world, the Digital Privacy Act serves as a shield, empowering individuals to assert their rights and reinforcing the notion that personal information deserves protection, both offline and online.
I hope this helps. Cheers! ^^
How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!
A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.
B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.
C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.
D)esident viruses load themselves into memory while non-resident viruses find networks to infect.
Answer:
The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.
In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.
Explanation:
--> used brainly simplify :D
Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.
Hi! Does anyone know how long it takes for a S o u n d C l o u d import to finish importing to a video-making website (Flixier to be exact) It'll be much appreciated if you answer this! I'll mark brainliest!
Answer:
It takes me around 20 to even an hour but its always different depending on the length
Explanation:
Answer:
It can take 5-7 business days
Explanation:
Hope this helps
All of the data in a digital book (letters, punctuation, spaces, etc) are stored and processed in a computer as binary. Break down how this works (hint: Ascii) . Explain in three or more sentences: Please Answer ASAP, Brainiest for Best and most In detail answer!!!!!
_____ describes the layout of the screen. Block-based, Interface, Editor, Player
On the planet Mongo, each year has 15 months and each month has 26 days.
Write a function compute_mongo_age(birthYear, birthMonth, birthDay, currentYear, currentMonth, currentDay)
that residents of Mongo can use to compute their age. It should take 6 positive integers as input: the person's birthdate (year, month from 1 to 15, and day from 1 to 26) and the current date (year, month from 1 to 15, and day from 1 to 26), and return a float of the age of the person in years.
For example, print(compute_mongo_age(2879,8,11,2892,2,21)) should print 12.6256410256, the age (in Mongo years) of a person, who was born on the 11th day of the 8th month of the year 2879, is on the 21st day of the 2nd month of the year 2892.
Answer:
DateTime now = DateTime.Today;
int age = now.Year - bday.Year;
if (now < bday.AddYears(age))
age--;
So your helper method would look like:
public static string Age(this HtmlHelper helper, DateTime birthday)
{
DateTime now = DateTime.Today;
int age = now.Year - birthday.Year;
if (now < birthday.AddYears(age))
age--;
Which device would help someone train for a marathon?
Drone
Navigation system
Smart watch
VR headset
I think Smart watches will be good as it will track your breathing, heartbeat, and steps. VR head set will not make you go so far, drones can look at the track you are running but it is not helping you run, and i don’t know about navigation systems.
Hey can someone help?
What is something you do to judge the credibility of websites, videos, or information you come across online?
Question 1(Multiple Choice Worth 5 points)
(03.01 MC)
Which line of code will only allow a non-decimal point to be stored in a variable?
candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 2(Multiple Choice Worth 5 points)
(03.01 MC)
Cheri's teacher asked her to write a program using the input() function. What will this allow her program to do?
Add comments to the code
Allow others to understand the code
Display a string on the screen
Make the program interactive
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)
Jabari is writing a program which prompts a user for a value that is negative and has a decimal. Which function should he use?
float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 LC)
In programming, what is a string?
A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)
Which function converts the user's input to a number without a decimal?
float()
int()
print()
string()
Answer:
b
Explanation:
it's not a c or d and now I have to make it 20 characters long so I will do this
Please help I need to ask you a question...
Answer:
yes ask whatever you want to
When the prompt function is used in JavaScript, _____ appears.
A.
an error message
B.
a pop-up box
C.
a data warning
D.
a password request
Answer:
B
Explanation:
instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog
Which of the following lines of code creates a division called answer?
A.
B.
C.
D.
Answer:
Explanation:
Alice is trying to figure out a good password for her rob-lox account. Which of the following is a good password for the account? It is very tricky...
a) 66660
b) Chicken_wing
c) Password1
d) All of the above
Answer:
all of the above
Explanation:
if u like mash them up like : 66660Chicken_wingPassword1
(is that what u meant?)
How does today’s food market compare to the food market of the past?
Today’s food market sells primarily organic produce.
Today’s food market is financially unstable.
Today’s food market is dominated by chain stores.
Today’s food market stocks lower-quality goods.
Answer:
Today’s food market is dominated by chain stores.
Explanation: