12. Good digital citizenship includes keeping in mind who has access to the internet and who does not. (1 point)

true

false



13. In 2013, which of the following did Google® think would be the new direction in technology? (1 point)

Google Glasses®

Google virtual reality

Google self-driving cars

Google Maps® 3-D

Answers

Answer 1
12. Good digital citizenship includes keeping in mind who has access to the internet and who does not. (1 point)

true

The focus of digital citizenship is how Internet users should manage online relationships, provide personal protection from online attacks and show accountability for posted online viewpoints and opinions.

13. In 2013, which of the following did Google® think would be the new direction in technology? 
Google Maps® 3-D
Answer 2
true | Good digital citizenship includes keeping in mind who has access to the internet and who does not, as there are situations in which people or business assume there is always an internet connection but it is not always like that. Forr example, in a contact card it could be useful to include a phone number, as someone may not having access to mail.

Google Glasses® | Google Glasses® was a technology developed by Google, which included the portability of the Google technology on a glass lens. However, the project failed, and the glasses have not made the huge breakout expected. There is a new version in elaboration now that seems to be more promising. 

Related Questions

how does the session ID differ from port number?

Answers

The difference between Session ID & Port Numbers :
Session ID keep data streams separate.  Port numbers identifies the process of where a network message should be forwarded on a server.
A session ID is a unique number that a Web site's server assigns a specific user for the duration of that user's visit (session).  A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server.

A session ID is a unique number that a Web site's server assigns a specific user for the duration of that user's visit (session). The session ID can be stored as a cookie, form field, or URL (Uniform Resource Locator). Some Web servers generate session IDs by simply incrementing static numbers. However, most servers use algorithms that involve more complex methods, such as factoring in the date and time of the visit along with other variables defined by the server administrator.

                   while,A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server. For the Transmission Control Protocol and the User Datagram Protocol, a port number is a 16-bit integer that is put in the header appended to a message unit. This port number is passed logically between client and server transport layers and physically between the transport layer and the Internet Protocol layer and forwarded on.

For example, a request from a client (perhaps on behalf of you at your PC) to a server on the Internet may request a file be served from that host's File Transfer Protocol (FTP) server or process. In order to pass your request to the FTP process in the remote server, the Transmission Control Protocol (TCP) software layer in your computer identifies the port number of 21 (which by convention is associated with an FTP request) in the 16-bit port number integer that is appended to your request. At the server, the TCP layer will read the port number of 21 and forward your request to the FTP program at the server.

Some services or processes have conventionally assigned permanent port numbers. These are known as well-known port numbers. In other cases, a port number is assigned temporarily (for the duration of the request and its completion) from a range of assigned port numbers. This is called an ephemeral port number.


Twitter and facebook are both examples of the​ _____________ internet business model.

Answers

community provider  

Provide online meeting place where people with similar interest can communicate and find useful information

People can transact, share interests, photos and videos

Why does adding the printer to your computer require a password mta?

Answers

it depends on the security preferences on your computer, if yes try setting new security options

What is the name of the redesign heuristic that suggests checking the completeness and correctness of incoming materials?

Answers

The answer is Control Addition.  The Control Addition is the name of the redesign heuristic that suggests checking the completeness and correctness of incoming materials.  

The heuristic is called the **"Ingestion Heuristic,"** focusing on verifying completeness and correctness of incoming materials before processing.

The heuristic you're referring to is known as the **"Ingestion Heuristic."** This concept is particularly relevant in redesigning systems or processes where materials, data, or information are received or ingested from external sources.

The main focus of the ingestion heuristic is to ensure that the incoming materials are complete and correct before they are processed further or utilized within the system.

In practical terms, applying the ingestion heuristic involves establishing clear criteria or checks to verify the completeness and correctness of incoming materials. This may include checking for missing data, validating the format or structure, ensuring data integrity, and verifying the accuracy of content.

By implementing robust ingestion processes guided by this heuristic, organizations can minimize errors, reduce processing delays, and enhance overall reliability and quality of operations.

Overall, the ingestion heuristic underscores the importance of proactive validation and quality assurance at the point of material intake, thereby promoting efficiency and reliability throughout the system's workflow.

Blender questions
4. Which of the following are edges? (1 point)

straight line segments connecting two vertices

flat surfaces enclosed by other edges

multiple points on the object

default layouts used for new files



5. Blender®’s toolbars cannot be resized, moved, or split between windows. (1 point)

true

false

Answers

Blender questions
4. Which of the following are edges? (1 point)

straight line segments connecting two vertices

flat surfaces enclosed by other edges

multiple points on the object

default layouts used for new files

The correct answer is:
flat surfaces enclosed by other edges

5. Blender®’s toolbars cannot be resized, moved, or split between windows. (1 point)

true

false

The correct answer is:
false

What would you enter at the command prompt to display log entries from the journal related to cupsd service?

Answers

You can use journalctl u cupsd

- It prompts journalctl with u option to display specific log entries to the CUPS specifically running on the DAEMON system.

Please write down your student id. take the last digit of your student id as m.

Answers

Now why in the world anyone would want to do that....



Really!!!!

____ idss/ipss monitor activity on network segments. essentially, they sniff traffic as it flows over the network and alert a security administrator when something suspicious occurs.

Answers

IDS stands for Intrusion detection systems. These systems help detect attacks on systems and networks. IPS stands for Intrusion prevention systems (IPSs)  and stop attacks in progress.
Network based IDSs/IPSs monitor activity on network segments. essentially, they sniff traffic as it flows over the network and alert a security administrator when something suspicious occurs.

Which is an example of a Foley effect?
recording the sound of an aircraft taking off onboard a naval warship


wailing into the microphone to voice a character in distress


blowing air into a paper bag and popping it to reproduce the sound of a tire burst


combining two voices on a computer using software to create a vocal effect

Answers

Foley effect is the remaking of everyday sounds that are used in movies and tv, so it would be "Blowing air into a paper bag and popping it to reproduce the sound of a tire burst"? I would imagine that is the right one

blowing air into a paper bag and popping it to reproduce the sound of a tire burst

: how do network effects help facebook fend off smaller social-networking rivals?

Answers

How do network effects help Facebook fend off smaller social-networking rivals? The way a network effect works it that one user of a good or service determine the value of the product to other people. Depending on how many people use the product or service, allows the network to see the value they believe it holds. Because Facebook has billions of users, they have a high value and strong network. 

Which describes the conditions that must be met in order to use Subtotal in a spreadsheet? The data must be in adjacent cells and organized in rows using headings. The data must be in adjacent cells and organized in columns using headings. The data must be distributed in different spreadsheets using the same range of cells. The data must be distributed in different tabs within the same spreadsheet using the same range of cells.

Answers

The answer is (B): The data must be in adjacent cells and organized in columns using headings.

You can always add subtotals that contain the same function to several columns at the same time. In most cases, subtotals evaluate values based on categories in another column. For instance, when the value in column A changes, the corresponding value in column B is evaluated.

Answer:

B

Explanation:

These items describe guidelines for the effective use of presentation graphics. Graphics should be large enough to be seen by the audience. Graphics should be used on every slide. Graphics should be used to make a boring presentation interesting. Graphics should be used when they are relevant to the content.

Answers

Answer:

All but graphics should be used on every slide

Explanation:

what is NOT powered by the PSU of your computer?

Answers

Peripherals like your monitor or your printer.

The PSU does not directly power peripheral devices like the keyboard or mouse, which are powered via USB ports.

The PSU (Power Supply Unit) of a computer is responsible for powering most of the internal components. This includes the motherboard, CPU (Central Processing Unit), RAM (Random Access Memory), GPU (Graphics Processing Unit), hard drives, and SSDs (Solid-State Drives). However, one component that is not powered directly by the PSU is the peripheral devices, such as a keyboard or mouse. These devices instead receive power through the computer's USB ports.

Components Not Powered by the PSU

Keyboard Mouse  

These examples illustrate how the PSU functions primarily to power core internals of the computer, leaving the task of powering peripherals to other means.

Which feature of a typical professional networking site helps users add professional details to their profile?


Volunteer Experiences and Causes


Skills and Expertise


Sharing Bookmarklet


Status Update

Answers

That's a good question I think it's LinkedIn where they have professional profiles

11. If you are seeking original research, current and developing trends, and experts within a specific field you should consult
A. television and video recordings.
B. subject-specific encyclopedia.
C. encyclopedia such as World Book Encyclopedia, Encyclopedia.com or Encyclopaedia Britannica.
D. periodical/trade journals.

Answers

I'd say (D) Periodical/trade journals.

In layman’s, periodical is any publication that comes out occasionally, i.e. periodically and is used at a regular. These journals are often the best sources for research especially if your research requires recent information, information on a specific topic, or information on local news. Periodicals that are peer or scholarly reviewed all have articles reviewed by experts in the subject.

if BAD = 10, DAC = 11 and CGI = 22 what is the value of OCCAM?

Answers

The answer is 40.  Given that A = 1, B = 2, C = 3, D=4, E=5, F=6 and so on.... 
BAD = 10 :     2 + 1 + 4 + (3) 
DAC = 11 :     4 + 1 + 3 + (3) 
CGI = 22 :      3 + 7 + 9 + (3) 
The term (3) that is necessary could be the number of letters in the equation. 
Therefore, 
OCCAM = 15 + 3 + 3 + 1 +13 + (5) = 40 (5, using number of letters) 

1010 1111 0011 is an even parity 12 bit hamming code that contains a single-bit error. what is the corresponding uncorrupted hamming code

Answers

The answer is 1010 1111 1011.   1010 1111 0011 is an even parity 12 bit hamming code that contains a single-bit error. The corresponding uncorrupted hamming code is 1010 1111 1011.

do someone know some good movie?

Answers

DESCENDANTS 1&2




Hopefully I helped

What type of movies?

Dr. Sperry, a biologist, is using Excel to track growth rates of different populations of bacteria. She has a very complex formula in one cell. It begins with “ROUND”. Dr. Sperry would like to see exactly how Excel’s calculation reached the final rounded value that she sees in the cell.

Answers

by using the evaluate formula dialog box

What do you feel are the limitations of a computer that has no operating system? how would a user load and execute a program?

Answers

Final answer:

A computer without an operating system has significant limitations in user interaction and program execution, requiring manual and intricate knowledge of hardware for any operation.

Explanation:

A computer without an operating system (OS) faces significant limitations. The OS acts as a mediator between the user and the computer's hardware, managing software resources and simplifying application programming. Without an operating system, a user would have to manually control the hardware, which is exceptionally complex and impractical for general users.

Without an OS, loading and executing a program would involve writing code directly to the hardware, typically using machine language or assembly language. This process is both error-prone and time-consuming, only feasible for advanced users with a deep understanding of computer architecture. For the average user, a computer without an OS would be nearly unusable for regular tasks.

Write a python file called regex.py that defines several variables containing compiled regular expressions, as follows:

Answers

Start with
def regex(enter several variables heat):

Which statement best describes an advantage of using the Subtotal dialog box?

1)Only one function, Add, can be used to combine data quickly.
2)Data from multiple workbooks can be combined in a single step.
3)An option is available that can customize any function available in Excel.
4)Data can be summarized using a single step rather than by writing multiple formulas.

Answers

I think it's 2 i'm not sure

Answer:

The Correct Answer is

Data from multiple workbooks can be combined in a single step.

Explanation:

The Microsoft Excel semi-total work exchanges the subtotal of the characters in a string in a table or database. The SUBTOTAL work is an in-built office in Excel that is characterized as a Math Function.As a worksheet role, the SUBTOTAL function can be accessed as the portion of a method in a group of a worksheet.

Addictions may ______ friends and family
A)Bring together
B) please
C) alienate
D) help

Answers

C because alienation with addictions may block out friends and family.

Addictions may alienate friends and family, Therefore the Alienate words have completed the sentence.

What is family?

A family is a group of individuals connected through consanguinity (by known birth) or affinity. The maintenance of the welfare of its members and of society is the goal of the family. Having a family implies that you have someone who will love you no matter what. A family is a group of people who love and support one another despite difficulties.

The term addiction refers to that, treatable, Chronic medical disease involving complex interactions among brain circuits, genetics, the environment, and an individual's life experiences. People with addiction use substances or engage in behaviors that become compulsive and often continue despite harmful consequences.

Therefore, Thus option (C) is correct.

Learn more about family here:

https://brainly.com/question/10205802

#SPJ5

Write a recursive function, replace, that accepts a parameter containing a string value and returns another string value, the same as the original string except with each blank replaced by an asterisk "*".

Answers

The function taken in an argument which is a string and gives an output of the same string with a asterisk (*) inserted inbetween each word. The program written in python 3 goes thus :

def replace(sentence):

#initialize a function named replace which takes in a single string sentence

sent = sentence.split()

#the sentence is split based on whitespace as a list of words which is attached to the variable called sent.

return '*'.join(sent)

Inbetween two words, a asterisk is appended using the join method.

print(replace('i am here'))

#A sample run of the function with an example is given and the output attached below.

Learn more : https://brainly.com/question/16403687

In jpeg files, what's the starting offset position for the jfif label?

Answers

The answer is Offset 6.  JFIF stands for JPEG File Interchange Format. For the JPEG file, the Offset 6 is used for the starting position of JFIF label.  The hexadecimal value is FFD8.  

_____________ systems will limit the time that the program remains in the running state to a fixed length of time corresponding to one or more quanta.

Answers

Preemptive systems will limit the time that the program remains in the running state to a fixed length of time corresponding to one or more quanta.
The preemptive systems are also referred to as cooperative multitasking systems. The term preempting describes the act of taking control of the operating system from one task and giving it to another task . These systems have computer operating systems that use some criteria to decide how long to allocate to any one task before giving another task a turn to use the operating system. 

Kenneth's manager has been receiving complaints that Kenneth is rude when he's conversing over email. Which email etiquette has Kenneth violated?
A He sent big files as attachments.
B He hasn't specified the intent of the email in the subject field.
C He hasn't been direct while writing his email.
D He didn't check for grammatical and spelling errors.
E He didn't use the proper tone in the emails he writes.

Answers

I would say (E), He didn't use the proper tone in the emails he writes.

(Ex: Writing in all CAPS, most likely tells the receiver of the EMAIL that you're ANGRY>.).



Hope that helps!!!

The correct answer is E. He didn't use the proper tone in the emails he writes.

Explanation:

Etiquette in email communication and similar contexts includes a set of rules that guarantee communication is effective and polite. In the case of proper tone, this refers to the attitude the person writing the message conveys, this can be polite, unpolite, honest, rude, etc. Additionally, the tone depends on the words used as well as other elements, for example not including a salutation might be interpreted as rude for many people.

According to this, Kenneth has probably violated the rule of using a proper tone because people complaints he seems rude in his email messages. This means, he probably did not use the appropriate words or elements and convey a negative attitude or tone.

When one says that e-commerce takes away the physical boundaries in doing business, it’s mostly referring to the actual business transaction – the buying and selling, not to the delivery of what was purchased if that is a physical product

Answers

Do you have answer choices?

Answer: is A true

Explanation:

Just got done doing the assignment.

Write the sql command to show which tutor needs to be reminded to turn in reports.

Answers

SELECT TO_CHAR (Tutor Report.Month, 'MONTH') MONTH, Tutor Report.MatchID, Match History.MatchID, MatchHistory.Tutor.ID FROM Tutor Report, MatchID WHERE Tutor Report.MatchID=Match History.MatchID AND NOT (TutorReport.Month=‘JULY’);

Why is ssh preferred over telnet for remote connections?

Answers

telnet conversations are not encrypted, whereas ssh conversations are, so ssh is secured against eavesdropping.
Other Questions
There are 750 toothpicks in a regular sized box. If a jumbo box is made by doubling all the dimensions of the regular sized box, how many toothpicks will the jumbo box hold? (With work pls) Which effect did the Columbian Exchange have in the Americas? A.Spread diseases B.Decreased warfare C.Increased indigenous populations D.Introduced maize How was Rome finally able to defeat Carthage and what did they do to the city? Quentin went to college with the goal of becoming a social worker. instead, he gave in to pressure from his new spouse and changed his major to business. when looking back at age 50, quentin wished he had pursued his original dream of becoming a social worker. quentin is experiencing a(n) Which of the following were global effects of terrorism in the late twentieth and early twenty-first centuries? Select all that apply. A. decline is religious fundamentalism B. a renewed interest in communismC. a rise in political revolutionsD. a surge in regional warfare E. an increase in suicide bombings A canister containing air has a volume of 85 cm 3 and a pressure of 1.45 atm when the temperature is 310 k. what is the pressure when the volume is increased to 180 cm 3 and the temperature is reduced to 280 k? Match the y-coordinate with the given x-coordinate for the equation y = log10x.1.1/100-22.1/1003.124.1015.100-1 Which of the following countries was NOT a sense of the battle during the Spanish- American War?A) CUBAB) Puerto RicoC) SpainD) thePhilippines How did Laurent Clerc influence the deaf community? Question 2Which of the following is an endothermic reaction?Question 2 options:dissolving sugar in wateriron rustingcampfire burningice melting Since the 1970s, the primary goal of islamic fundamentalists in the world has been to Why do you think oscar Schindler is so generous with the ss officers? Read the sentence from an argumentative essay about chemical waste. The chemical waste produced by factories is out of hand, and factory owners should get in trouble. Which revision offers the most improvement in word choice? The brain of the north american bird known as the clark's nutcracker has an unusually large ________, which may help explain how the bird finds food it buried over a wide area months earlier. When potassium-40 undergoes decay by electron capture the product is? An empty plastic bottle is sealed in a cool room and then moved to a very hot room. What can best be stated about the air pressure inside the bottle when the bottle reaches room temperature? It is lower than the pressure on the outside of the bottle. It is higher than the pressure on the outside of the bottle. It is the same as the pressure on the outside of the bottle. It exerts twice the force per unit area as the air pressure outside the bottle. "if he needs a million acres to make him feel rich, seems to me he needs it 'cause he feels awful poor inside hisself, and if he's poor in hisself, there ain't no million acres gonna make him feel rich, an' maybe he's disappointed that nothin' he can do 'll make him feel rich." Laquelle est correcte?J'ai laiss la maison.J'ai laiss mon devoir.Laquelle est correcte?Elle quitte la maison.Elle laisse la maison.Laquelle est correcte?Robert sort un pourboire.Robert laisse un pourboireLaquelle est correcte?Nous sommes partis cinq heures.Nous sommes parti cinq heures.Laquelle est correcte?Il part la ville midi.Il part de la ville midi.Laquelle est correcte?Vous avez quitt midi.Vous avez quitt l'htel midi.Utilise une forme de laisser, quitter, sortir, partir, pour completer la phrase.Le chien _________ la maison.Utilise une forme de laisser, quitter, sortir, partir, pour completer la phrase.Nous __________ de la maison hier une heure.Utilise une forme de laisser, quitter, sortir, partir, pour completer la phrase.Il ____________ ses livres l'cole hier. Warwick Police discovered the body of a 36-year-old white male (later identified as Darren Davis) in a field about 20 miles north of town. Mr. Daviss body was discovered at 7:30 p.m. on Friday, October 11. He was found lying face up on a yellow king-size sheet. According to autopsy reports, one fatal gunshot to the back of the head ended Mr. Daviss life. Scientists estimate that his death occurred at about 4:20 p.m. As investigators scanned the crime scene, they made the following notes:Paper plates filled with partially eaten fried chicken, deviled eggs, potato salad, and chocolate cake were located near Mr. Daviss body.An open bottle of red wine and two partially filled glasses of wine were found next to the yellow sheet.A recently-smoked cigarette butt was found near the sheet.Shoeprints from the road to the field were those of a male, size 10, and a female, size 5. The only shoeprints from the field back to the road were those of a female, size 5.Car tracks of the same wheel base and tread pattern as Mr. Daviss automobile were found at the road. The car was not found at the scene.Mr. Daviss car was found abandoned in an empty parking lot in downtown Warwick.Investigators believe that a female friend of Mr. Davis was responsible for his demise. After questioning family and friends, it was discovered that the deceased had frequent social outings with 6 women who live in or near Warwick. The womens names are Sue, Laura, Gwen, Beth, Eliza, and Patty. Investigators gathered the following information about the 6 women:Beth works full-time as a caterer.Eliza and Gwen are schoolteachers.Sues babysitter says Sue arrived home in her own car at about 5 p.m.Patty and Eliza live together in a two-bedroom apartment in downtown Warwick.Gwen lives in a nearby town called Jordan.Eliza and Beth are very petite womenthey wear size 4 blue jeans.Gwen and Patty are smokers.Sues father owns a gun shop.Eliza attends a 5 p.m. step aerobics class in downtown Warwick every Friday afternoon and has not missed a class in two years.Patty is deathly allergic to grapes.Laura works at a chemical supply house.Sue lives in a country house about 30 miles west of Warwick.Gwen is a vegan (does not eat any animal products).Sue is a florist.Beth doesnt know how to drive.Eliza and Gwen hate the color yellow.Laura played center for a semiprofessional basketball team 5 years ago. She has red hair and is 6 feet,1 inch tall.Based on the preceding information,determine who murdered Mr. Davis and give the general facts of the case."I think Sue was the one who killed Mr. Davis" What is a guild? a. a union of artists that promise to support one another b. an association of people of a certain trade or occupation c. people who support the arts d. none of the above