What is your definition of Digital Safety?

Answers

Answer 1

Answer:

Digital Safety is being knowledgeable in the areas of Internet safety, device security, etc. and keeping yourself safe when using the Internet.

Explanation:

When you know how to stay safe on the Internet and keep yourself safe, you know Digital Safety.


Related Questions

Which of the two previously described wing designs should result in a longer flying time?

Answers

Answer:

If it's a bird than the bigger the wing span the faster it can fly... or possibly glide in the air longer. I think all plan wing sizes don't change the effect of how it goes. If it is something like the sky gliders than yes. It would most likely be in the sky longer.

BE CAREFUL OF SCAM LINKS HERE
check attached bcuz brainly freak block this

also i love u grammarly

Answers

Answer:

I know what the scam links look like and to be careful. Thanks for warning us though. Have a awesome day!

Explanation:

Answer:

have u watched euphoria

Explanation:

lol

True or False? Apprenticeships have been used for thousands of years to pass knowledge on to a succeeding generation.

Answers

Answer:

true

Explanation:

true true true true true

ANSWER ALL QUESTIONS CORRECTLY PLEASE AND YOU WILL GET A BRAINLIEST AND 10+ POINTS!!!! I WOULD REALLY APPRECIATE IT

Through the use of ICT and emerging technology in todays world, a number of sectors have been affected (whether in a positive or negative way). Three sectors in which ICT has had an impact are the health care, education, and banking sector.
Define the term ICT?

List three ICT tools that are commonly used in the education system?


Identify two ways in which ICT has impacted the education sector?

Answers

Answer: uhm can u explain what ICT is so i can understand the questions pls when i whould gladly help :)

Explanation:

Corinne would like to click on the link at the bottom of a Web page but she only sees the top portion of the page. She should _____. A.click twice on the status bar
B.use the scroll bar to scroll down to the bottom of the page
C.click on the back button
D.click on the display window and drag it up

Answers

Answer:

B

Explanation:

from 3dg3

Answer:

D.click on the display window and drag it up

Compare the OSI Application Layer with the TCP/IP Application Layer. Which statement is true? Both application layers are relevant mainly to programmers, not to network technicians. The OSI application layer involves more things than does the TCP/IP application layer. They are the same layer, only they are viewed through different conventions. The TCP/IP application layer is for the user; it is not important to programmers or network technicians.

Answers

Answer:

They are the same layer, only they are viewed through different conventions.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

On the other hand, the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer comprises of four (4) main layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

This ultimately implies that, the Open Systems Interconnection (OSI) Application Layer and the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer are the same layer, only they are made up of different number of layers and as such are viewed through different conventions.

Answer:

c

Explanation:

List two examples of following types of communication

Answers

Verbal Communication. Verbal communication occurs when we engage in speaking with others. ...
Non-Verbal Communication. What we do while we speak often says more than the actual words. ...

Answer:

Explanation:

sign language is communication

touch is communication

write a program. in QBAsSIC
a to find product of two numbers
b to calculate sum of two numbers
c to calculate difference between two numbers
computer q qubasic can anybody help me plz​

Answers

Answer:

The program is as follows:

5 INPUT A,B

6 PROD = A * B

7 PRINT PROD

8 TOTAL = A + B

9 PRINT TOTAL

10 DIFF = A - B

11 PRINT DIFF

12 END

Explanation:

This gets input for the two numbers

5 INPUT A,B

This calculates the product

6 PROD = A * B

This prints the calculated product

7 PRINT PROD

This calculates the sum

8 TOTAL = A + B

This prints the calculated sum

9 PRINT TOTAL

This calculates the difference

10 DIFF = A - B

This prints the calculated difference

11 PRINT DIFF

This ends the program

12 END

What is Polymorphism in programming? Explain in your own words with examples.

Answers

Answer:

A computer program which can change on it's own, such as a polymorphic virus that is harder to detect. It can change it's own code to achieve the same goal but have a different structure.

Explanation:

Answer:

Polymorphism is a feature of object-oriented

programming languages that allows a specific routine to use variables of different types at different times. Polymorphism is the ability of a programming language to present the same interface for several different underlying data types.

Explanation:

hope it helps

Posts that you delete _____.

cannot ever be shared

will be released in five years

are still visible to others

may already have been shared

Answers

May have already been shared

Answer: Below

Explanation:

Write a recursive method named editDistance that accepts string parameters s1 and s2 and returns the "edit distance" between the two strings as an integer. Edit distance (also called Levenshtein distance) is defined as the minimum number of "changes" required to get from s1 to s2 or vice versa. A "change" can be defined as a) inserting a character, b) deleting a character, or c) changing a character to a different character. Call Value Returned editDistance("driving", "diving") 1 editDistance("debate", "irate") 3 editDistance("football", "cookies") 6

Answers

Answer:

Explanation:

The following code takes in the two parameters s1 and s2 and returns the Levenshtein distance of the two strings passed.

def editDistance(s1, s2):

   m = len(s1) + 1

   n = len(s2) + 1

   arr = {}

   for x in range(m):

       arr[x, 0] = x

   for y in range(n):

       arr[0, y] = y

   for x in range(1, m):

       for y in range(1, n):

           proc = 0 if s1[x - 1] == s2[y - 1] else 1

           arr[x, y] = min(arr[x, y - 1] + 1, arr[x - 1, y] + 1, arr[x - 1, y - 1] + proc)

   return arr[x, y]

One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data

Answers

Answer:

Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers

Explanation:

Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only  certain limited number of sites are available.

Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible

Hence, option A is correct

Match the characteristics to the mobile operating system that it describes.

1. simple, user-friendly design Apple iOS
2. preferences personalized Microsoft
3. limited number of available apps Android

Answers

Answer:

1. is Apple's iOS

2. is Android

3. is Microsoft

A radio and communications security repairer is responsible for both radio and satellite communication systems.

True
False

Answers

i'm almost certain the answer is true

Answer:

The answer is true

Explanation:

I got it correct on the quiz

You are the network administrator for a city library. Throughout the library, there are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do to fix this problem

Answers

Answer: Configure port security on the switch

Explanation:

Since there need to be a restriction on access to the network so that the library computers will be the only ones that are allowed connectivity to the internet, the thing that can be done to fix the problem is to configure a port security on the switch.

When a port security is configured, it helps in securing the network and this will in the prevention of unknown devices from being connected to the network.

Betty set up an account on a popular social networking website. She wants to know whether the privacy policy is effective for her account. Which information should she look for in this document?

Answers

the info needed to log in

-This would show what is protected in the privacy policy and its related to you since it would show personal data.

-A good Privacy Policy depends on understanding these matters - showing that this is not an agreement to take for granted.

Columns are identified by numbers (1,2,3,4,5....) and Rows are identified by letters (A,B,C,D,E.....) True False

Answers

The answer would be true. Hope this helps you

The first step to keeping your home safe is to minimize the overall amount of _______________ materials you store in your home. (9 letters)

Answers

Answer: Hazardous

Explanation: Hazardous materials should be kept somewhere safe.

Answer:

i believe it would be dangerious

Explanation:

what are the answers for Quiz 7 answers computer science principles

Answers

Answer:

unknown

Explanation:

this sounds like it is very vague and could be confused with other tests, i do not know of any tests like this

another thing is you can ask each question, even though it would cost more points, it would be better in the long run, people with similar questions can find their answers easier, AND you can get the correct answer for each question with confidence

that and people are more willing to answer one question at a time then a whole quiz lol

not saying what you are doing is bad, its just impractical and not an easy way to go about this

hope you find the answers you need, have a great day/night mate :D

JAVA

Write a method that takes an ArrayList of Strings, and an int numRepeats and returns a new ArrayList with the original ArrayList repeated numRepeats times.


For example if we had an ArrayList list with the values ["a", "b", "c"]:


repeatArrayList(list, 3)

Should return a new ArrayList with the elements:


["a", "b", "c", "a", "b", "c", "a", "b", "c"]


public ArrayList repeatArrayList(ArrayList list, int numRepeats)

{

}

Answers

Answer:

Explanation:

The following code is written in Java. It creates a function that takes in an ArrayList and an int parameter. Then it loops through the array and adds each element into a new array called newList but adds them the number of times that the numRepeats argument states. Output can be seen in the attached image below.

import java.util.ArrayList;

class Brainly{

   public static void main(String[] args) {

       ArrayList list = new ArrayList();

       list.add('a');

       list.add('b');

       list.add('c');

       ArrayList newList = repeatArrayList(list, 3);

       System.out.println(newList);

   }

   public static ArrayList repeatArrayList(ArrayList list, int numRepeats) {

       ArrayList newList = new ArrayList();

       for (int x = 0; x < numRepeats; x++) {

           for (int i = 0; i < list.size(); i++) {

               newList.add(list.get(i));

           }

       }

       return newList;

   }

}

Find what the secret message is. Get Brainliest if you are fast and correct.

Answers

Answer:

What does your digital footprint say about you?

Explanation:

Just follow the path from the end to the start, that's how I always get mazes.

Answer:

What does your digital footprint say about you?

Explanation:

n
How does an informal outline usually organize information?
A. With letters
B. With bullet points
C. With numbers
D. With Roman numerals

Answers

The answer is (B. With bullet points) have a good day :)

Hardware failure, power outages, and DOS attacks will affect:

data confidentiality.

data integrity.

data verification.

data availability.

Answers

Answer:

The answer should be data availability

Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:​

Answers

Answer:

participle is singing

word it modifies is voice

Two parter:

A.) What is wrong with the program segment below? The program does not contain syntax errors.

B.) Fix the programming error(s)

num = 1;

while (num < 9)
{
cout << num;
num = num - 1;
}

Answers

Answer:

the variable num is not declared so the compiler doesn't define it.

add int before num:

int num = 1;

while (num < 9)

{

cout << num;

num = num - 1;

}

now the code will run but it won't stop as it will never break the condition (num < 9).

Which of the following are considerations in e-commerce and e-government Internet sites? Check all of the boxes that apply.

security

what time of day you are online

protection of sensitive information

from which location you are accessing the site

Answers

Answer:

protection of sensitive information

Explanation:

Answer:

a c baka baddies

Explanation:

bakit mahalaga ang pagtutugma ng iyong mga personal na salik sa minimithing karera​

Answers

Answer:

Hi not able to understand your language

When did computer networking go beyond the walls of the firm?

Answers

Answer:

All kinds of computing devices such as tablets, PCs, or laptops feature a brain-like unit called the central processing unit or CPU. Your computer's CPU calculates and interprets instructions while you're surfing the web, creating documents, playing games, or running software programs.

Explanation:

Fill in the blank!!!!!!!!!!!!!!!!!!!! ASAP!! Please!!!
Recent improvements in __________ have increased the pace of globalization.

Answers

i think it is technology

so I believe that the word you are looking for is technology

Hope this helps

-scav

20 POINTS-
can someone help with this?

Answers

Answer:

large storage= data warehouse

data from daily= world wide

data storaage= transactional

online data= relational

I rlly don't know I'm kinda guessing here for don't take my word to heart it's been a bit since I've learned this

Other Questions
please read this I know it might feel like it's a lot but it makes a lot of sense and I feel like some people don't get the meaning of true beautyI believe that people should look at the beauty of diversity and understand that flaws and imperfections are what make the human race beautiful. People shouldnt compare themselves to celebrities or models because it is difficult to look exactly like that person, we are all created individually and uniquely, thus we arent meant to look exactly like one another. Rather than constantly comparing ourselves to one another, we should realize that we are all beautiful in our own way. I believe that if people live with this mentality they will be happier and comfortable with themselves.I believe that true beauty comes from within. Outer looks and physical beauty eventually disintegrate, but inner beauty will always remain. The personality and heart of every individual are so unique and special to that person, thus making them truly beautiful. I believe that people that possess this true type of beauty radiate and bring a special light onto others everyday. Inner beauty lights up a persons face and brings warmth to others. This type of beauty is so unique to individuals and will always remain, unlike outer beauty. As opposed to outer beauty, inner beauty is what makes a person who they are; it makes them unique and special in many ways. The beauty within a person transcends outwardly, thus making a person even more beautiful than they actually appear to be. According to Elizabeth Kubler- Ross People are like stained-glass windows. They sparkle and shine when the sun is out, but when the darkness sets in their true beauty are revealed only if there is a light from within.I believe that if people live with this mentality that everyone is beautiful inside and out, the world will be a happier place and everyone will be accepted despite their differences. A 68 kg deer has a momentum of 952 kg-m/s. What is its velocity? Which biomes would be found nearest to the equator?tropical rain forests and savannastundras and taigastropical rain forests and taigastundras and savannas help mention 5 benefits of recreation Barium + Aluminum nitrate > makes what ? Help me please! Will mark brainlist! Flip-flop sets are on sale at buyone, get one half-off. Maria andJackie each decide to get a pair.The flip-flops are priced at $24.00.If they decide to split the totalevenly, then how much will eachpay? HELP PLEASE!!!!!!!!!!! The outcome of the first event does affect the outcome of the second, so that the probability is changed Explain ONE way in which a global capitalist economy affected social structures in the period 1750 What did the Colville and Spokane tribes lose after the dam was built?PASSAGE:Even Grand Coulee Dam's success as a hydropower giant and agricultural dynamo could not eclipse the loss of native fish runs that had once traveled freely up the Columbia River and its tributaries. This had a devastating impact on the Colville and Spokane tribes, whose traditions and cultural ties to the land, water, and wildlife were disrupted. By 1937, the dam's slow rise from the riverbed had completely halted salmon, steelhead, and other species from reaching important tribal fishing sites like Kettle Falls on the Columbia River, and Little Falls on the Spokane River. Tribal members could no longer fish for this most valued commodity on which they depended. The annual salmon runs that anchored the tribes' yearly schedules, including the timing of their most important ceremonies, were gone. In addition, land was cleared for the dam site and reservoir. This impacted more than 3,000 homesteaders and Native Americans, who were displaced during the early design and construction phase. Tens of thousands of acres were cleared at a cost of over $10 million-- prime bottom land where Native Americans and pioneers had been living, hunting, and fishing for generations. Both the Colville and Spokane tribes were asked to relocate the remains of their ancestors by moving them to new cemeteries on higher ground. AU BUT one describes an effect of aging on the respiratory system.es 0)A)diminished lung volume capacityB)increased respiratory mucus productiondecreases in respiratory muscle strengthD)oxygen content of arterial blood decreases Which features are used in Roman buildings?Choose all answers that are correct.They have rounded arches, barrel vaults, and cross-barrel vaults.The use of steel rods allowed for their large size.They have domes on circular rooms.They have columns, pediments, and friezes used in Greek buildings. I have 3 Health questions about babies and pregnancies if any ladies can help me with these questions. Im failing this class and need to majorly bring my grade up. If there are any ladies that can help me with these's questions I'll give them Brainliest. ( Please only answer if you can actually help). I also have English questions to anyone can help with those questions. Im also failing English to. Just click on my name and go to my questions. Help please write an email to mike:( 5th Grade U.S Studies Weekly- Week 24 Answer Key(Please create one)Topic: Hardships of WarFt. Abigail Smith AdamsFt. Mercy Otis WarrenFt. Martha Dandridge Custis WashingtonFt. Molly PitcherFt. Phillis Wheatley American PoetFt. Sybil LudingtonQ: to collect and hide food our suppliesA: __________________________Q: Robert Shurtleff's real first nameA: __________________________Q: general who thanked Sybil Ludington for her braveryA: __________________________Q: raising of prices over a period of timeA: (Is this answer, inflation?) _________Q: wrote politically plays and poetryA: __________________________Q: someone who raises prices on goods that are scarceA: __________________________Q: plantation ownerA: __________________________Q: Congress raised money by selling debt _____A: __________________________Q: took her husband's place in battleA: __________________________Thank you so much! You are so well appreciated. I'll offer you brainliest. Please leave a comment if you'd like brainliest. THANK YOU!!! Evaluate the expression when a = 6 and x = -3.-a+7x will give brainliest plz help meTo find the distance an object has traveled, you use the formula D=RT; where D=distance, R=rate and T=time. Find how far a person drove if he traveled at a rate of 60 miles per hour for 6 hours.A. 10 milesB. 36 milesC. 360 milesD. 100 miles Solve: 4x = 32x = 4x = 8x = 4x = 8 What would you do if you were on an adventure to discover a lost civilization.