Benedetta was cyber bullied by her classmates about her looks. WHAT computer ethics was violated?

Answers

Answer 1

Answer:

Digital Rights Foundation’s Cyber Harassment Helpline is Pakistan’s first dedicated, toll-free Helpline for victims of online harassment and violence.  The Helpline will provide a free, safe and confidential service. The Helpline aims to provide legal advice, digital security support, psychological counselling and a referral system to victims of online harassment. The Helpline will provide a judgment-free, private and gender-sensitive environment for all its callers.

Explanation:


Related Questions

Every research project should make a contribution:
a. To knowledge.
O b. In terms of methodology.
Oc.
To the researcher's development.
O d. Financially​

Answers

Answer:

As far as I know your answer is option (c) To the researcher's development

Answer:

a. To knowledge

If it not , then sorry.

Hope it helps you.

differentiate between standard and enhanced keyboard(10 diffrences)​

Answers

Explanation:

by which green plants and some other organisms use sunlight to synthesize nutrients from carbon dioxide and water. Photosynthesis in plants generally involves the green pigment chlorophyll and generates oxygen as a by-product.

A standard keyboard typically features a basic layout and functionality, while an enhanced keyboard includes additional features such as multimedia keys, customizable macros, and backlighting options.

The difference between standard and enhanced keyboards are as follows:

1) Key Layout: One of the primary differences between a standard keyboard and an enhanced keyboard is the key layout. A standard keyboard typically follows the traditional QWERTY layout, while an enhanced keyboard may have additional keys or modified key arrangements.

2) Extra Function Keys: Enhanced keyboards often feature additional function keys beyond the standard set found on a standard keyboard. These extra keys may provide quick access to specific functions like media controls, volume adjustment, launching applications, or controlling lighting effects.

3) Multimedia Controls: Enhanced keyboards often include dedicated multimedia controls for managing audio and video playback. These controls allow users to play, pause, stop, or skip tracks without the need to navigate through software interfaces.

4) Macro Keys: Enhanced keyboards may offer programmable macro keys that allow users to assign custom functions or complex sequences of commands to a single key press. This feature is commonly utilized by gamers or power users who require quick access to specific actions or shortcuts.

5) Backlit Keys: Many enhanced keyboards have backlit keys, allowing for improved visibility in low-light environments. These keyboards may offer adjustable backlighting levels or even customizable RGB lighting options for personalization.

6) Touchpad or Trackpad: Some enhanced keyboards include an integrated touchpad or trackpad, similar to those found on laptops. This feature eliminates the need for a separate mouse and provides cursor control directly on the keyboard.

7) Ergonomic Design: Enhanced keyboards often prioritize ergonomics by incorporating features like palm rests, adjustable tilt angles, or split keyboard layouts. These design elements aim to provide increased comfort and reduce the risk of repetitive strain injuries.

8) Connectivity Options: While standard keyboards usually come with a wired USB connection, enhanced keyboards may offer additional connectivity options such as wireless Bluetooth or specialized connectors like USB-C for faster data transfer.

9) Specialized Keys: Enhanced keyboards may have dedicated keys for specific purposes, such as gaming keyboards with keys optimized for gaming actions like WASD movement or mechanical keyboards with specialized switches for tactile feedback.

10) Software Integration: Enhanced keyboards often come with companion software that allows users to customize key functions, lighting effects, and other settings. This software integration provides additional flexibility and personalization options beyond what standard keyboards offer.

Learn more about Keyboards click;

https://brainly.com/question/30124391

#SPJ2

A folder is a collection of related of data is true or false​

Answers

Answer:

false

Explanation:

may this answer is helpful for you

Yea I’m gonna have to agree with the person above I think it’s false as well

When to not touch the mask? ​

Answers

Answer:

If your mask touches another part of your body that is potentially contaminated with the virus—hair, forehead, hands—and the mask is put over your mouth and nose, you are at risk for infection.

Always be sure to wash your hands before putting your mask on, and once it is in place and you are out in public, don’t keep touching or adjusting it. When you’re not wearing it, don’t leave it around your neck in case there was any type of contamination.

How does blockchain work?

Answers

Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.

Answer:

I hope this website helps https://www.investopedia.com/terms/b/blockchain.asp

Explanation:

UDP stands for


user-defined protocol

user-defined packets

user data packets

user datagram protoco

Answers

Answer:

user datagram protocol

Explanation:      User datagram protocol (UDP) operates on top of the Internet Protocol (IP) to transmit datagrams over a network.

Let's say set1 contains the following values: 1, 2, 3. set2 contains 3, 4, 5. Please name the difference between set1 and set2:

a. 4,5
b. 3
c. None of the above / below.
d. 1,2,3,4,5
e. 1,2

Answers

Answer:

c

Explanation:

None of the above /below

Jane wants to type a math assignment involving percentages she wants to insert the percent symbol after typing a number which key should Jane express along the shift key

Answers

To type a percent symbol. Press shift+5.

What describes Accenture's approach to automation?

1.cloud-centered
2.human-centered
3.intelligence-centered
4.machine-centered
6.I don't know this yet.

Answers

human center because we describe stuff by what we see and obserevs

Answer:

Human-centered

Explanation:

Hope this helps :) If you need anymore detail, feel free to ask.

What are the type and the value of the expression

a > 4 || a == b ? ab: a/b

after the following declarations: int a = 5; int b = 0;?

Explain your answer in particular, provide the type and value of each relevant
subexpression).

Answers

Answer:

SEE THE IMAGE FOR SOLUTION

HOPE IT HELPS

HAVE A GREAT DAY

Which unit of the computer works as the input​

Answers

Answer:

Center Processing Unit ....

solution Please write a sample query to look at data by week for the created_at date, where you're summing revenue by country and state.

Answers

SELECT QUERY is used for the MySQL database fetching. It chooses is planned to return 1 or more rows from the database tables which meet a given criterion. It could be used for PHP, Ruby, and you can execute them via the command prompt inside the scripting language, and further queries can be defined as follows:

Following are the complete Query to this question:

SELECT  DATEPART(week, created_at) AS Week,  Sum(revenue) AS Revenue  FROM country  WHERE '20180101' <= created_at  AND created_at < '20190101'  GROUP BY DATEPART(week, created_at)  ORDER BY DATEPART(week, created_at);

Learn more:

brainly.com/question/22044117

brainly.com/question/11771506

What is the name of the typical keyboard?

Answers

QWERTY (/ˈkwɜːrti/) is a keyboard design for Latin-script alphabets. The name comes from the order of the first six keys on the top left letter row of the keyboard ( Q W E R T Y ). The QWERTY design is based on a layout created for the Sholes and Glidden typewriter and sold to E. Remington and Sons in 1873.
Qwerty i think it is

What are the benefits of computer literacy?

Answers

Answer:

College Material

Explanation:

it helps and introduces you to more computer related thing that maybe you like and are more interested in and that could help you go to college and maybe get a degree in something to do with computers

help me to solve this​

Answers

Answer:

Hello!

Mouse-points and selects gui objects

Printer-it produces hard copy output

Alu- performs mathematical calculations

Rom-the instructions stored in it cannot be changed by the user

pendrive- can be considered as a small external hard disk

P.S. please follow me and also mark me as the brainliest ;)

Answer:

the answer is :

1-4

2-5

3-1

4-3

5-2

What is a file and ten examples

Answers

Answer:

A file is a collection of related electronic information.

Examples;

» a report [ a dbm file ]

» a receipt [ a dbm file ]

» bill list [ a .xls file ]

» attendance sheet [ a .xls file ]

» family slideshow [ a .ppt file ]

» physics notes [ a .docx file ]

» chemistry notes [ a .doc file ]

» a query [ a .dbm file ]

» a survey sheet [ a .xls file ]

» organization work plan [ a .ppt file ]

Explanation:

[tex]{ \sf{dbm \:→database }} \\ { \sf{xls \:→ \: spreadsheet }} \\ { \sf{docx \: and \: doc→ \: word \: processor}} \\ { \sf{ppt \: → \: powerpoint}}[/tex]

Answer:

a file is for holding loose paper or important documents that are typically arranged in a particular order for easy reference

Explanation:

example PDF

DOC

AUDIO FILE FORMAT

TIFF

DOCUMENT FILE FORMAT

PSD

ZIP

Your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you use?
a. IP.
b. SSH.
c. SFTP.
d. FTP.
e. DHCP.

Answers

The protocol that should be used for establishing a secure network connection is SSH.

The following information is to be considered:

SFTP is secure also it is a protocol for file transferring that applied SSH.IP, FTP, and DHCP should not be for safety purposes as they are not secure.SSH is a secured connection for the remote sites so here the SSH protocol should be used.

Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.

Learn more about the protocol here: brainly.com/question/16985821

Which of the following is a paragraph format?

Answers

Answer:

its like the structure of the paragraph

Explanation:

thank me lol

The one that is a paragraph format is alignment. The correct option is C.

What is a paragraph format?

Indenting, bullets, line spacing, and paragraph spacing are just a few formatting options that can be applied to a whole paragraph.

You must comprehend what a paragraph is in order to comprehend paragraph formatting and how it operates. You may manage how each paragraph looks by using paragraph formatting.

By defining and designating divisions (headings), emphasising essential words or concepts (bold, italics, or lists), and providing a solid first impression, formatting also makes material more accessible to the reader.

The appearance of the text throughout a paragraph is determined by the paragraph formatting element known as text alignment.

Thus, the correct option is C.

For more details regarding paragraph format, visit:

https://brainly.com/question/1395337

#SPJ2

Your question seems incomplete, the missing options are:

Typeface

Font size

Alignment

Font style

A static class method might take one or more objects of its class as parameters -- or it might take none -- depending on the purpose of the method.

a. True
b. False

Answers

True is the answer


Mark as brainlist if you can;)))

The given statement "A static class method might take one or more objects of its class as parameters -- or it might take none -- depending on the purpose of the method" can be marked as true. Thus, the correct option is A). True

What is static method?

A static method refers to a method which belongs to a class rather than a single case of a class. This method is accessible to every instance of a class, but it defined in an instance that are only able to be accessed by that object of a class.

A static method is a method that can access static data member and can change the value of it. It can be invoked without the need for creating an instance of a class.

A static method can be used for two main purpose i.e. for utility or helper methods that don't require any object state.

Learn more about static method here:-

https://brainly.com/question/13098297

#SPJ2

The Linux operating system is widely used in industry, especially for servers. Why do you believe this is the case?

If you've worked with Linux previously, share your experiences. How would you compare it with other operating systems—like Windows?

If you have little or no experience with it, what are your perceptions?

Answers

Answer:

Asking why Linux is used as a server operating system? It has many advantages

Explanation:

1. Linux has very small kernel footprints

It can be on a USB, embedded system and the like.

2. Requires very little hardware resource to run.

Building on the first point, Linux dos not need much jard ware resource to run implying it can be run on outdated CPUs, a low RAM size, small disk space and it would be possible - doesn't matter with Linux - bar the effect on performance.

3. Linux runs 80% of the Internet today

4. It's free

...... and so much more.

- Reference: Andrew Holcomb, Quorate

How Linux compares with other OS - like Windows or Mac?

May Help:

https://www.quora.com/What-are-the-advantages-of-Linux-as-a-server-operating-system

Recommendation: Jason Montoya and Glen Becker, BI Analyst, SAS Expert

what is the name of the computer that access shared resources on the network

Answers

Answer:

what is the name of the computer that access shared resources on the network

Explanation:

A server is a device or computer program that provides functionality for other devices or programs. Any computerized process that can be used or called upon by a client to share resources and distribute work is a server

Need help coding this it uses input and I need to use the words good and morning

Answers

Answer:

x = input ("Enter a word: ")

y = input ("Enter a word: ")

print ( x, " ", y)

Explanation:

This is the simplest way to write it using Python.

Consider the following statements regarding computer programs A - Variables can contain different values at different times.B - Reserved words of a programming language can be used as variable names in that languageWhich of the following is true with respect to the above? * O Only A is correct Only B is correct Both A and B are incorrect Both A and B are correot​

Answers

Answer:

The answer is: Only A is correct.

Explanation:

Variables in a program can assume different values at different times, and the program can then produce different results, depending on circumstances, so A is correct.

In a computer language, a reserved word (also known as a reserved identifier) is a word that cannot be used as an identifier, such as the name of a variable, function, or label – it is "reserved from use". This is a syntactic definition, and a reserved word may have no meaning. So, B is incorrect.

Hence, the answer is: Only A is correct.

Which of the following best describes how the final path is determined once the goal state is reached in the A* search algorithm?

a. Begin with the starting node and trace the order that nodes were added to the Open List until the goal node is reached.
b. Start at the goal node and iterate through each node’s parent until the starting node is reached.
c. As nodes as added to the Closed List, track the order until the goal node is added.

Answers

Answer:

b

Explanation:

After start from a node, immediately added to the Closed List,

In this A* approach begin with the starting node and trace the until the goal node is reached. It always checkeck least cost approach to reach goal. After reaching to goal state or stop state iterate through each

Why is QBASIC Program easy to debug??
✌✌✌✌​

Answers

Answer:

it is do as qbasic is a high level language and is quite simple to understand and has been adopted by most of the microcomputers

what is a leased line​

Answers

Explanation:

A leased line is a dedicated fixed bandwidth data connection. The word leased refers to the connection rented by the internet service provider directly to a business. A leased line needs to be symmetrical, uncontended and point to point

Answer:

Leased line refers to a dedicated communication channel that easily interconnects two or more sites. Actually, it is a service contract between a provider and a customer. This dedicated line ensures continuous data flow from one point to another for a fixed monthly rate.

When writing an algorithm, plans are reviewed before they are carried out.

True or False?

Answers

Answer: True

Explanation:

thats the main step of algortithm lol

If we are using the hub in a LAN. Can we avoid the collision domain? If yes, justify. If no, which device can be used in the replacement and why?

Answers

Answer:

No. A hub is neither a collision domain separator nor a broadcast domain separator. All the devices connected to a hub is in a single collision and single broadcast domain. the device is computer networking devices

Identify the correct answer in each item. Write your answer on the blank provided before
the item.
1. It is considered as the brain of the computer.
2. It is like a television.
3. It is a pointing device.
-4. It works like pencil of the computers.
5. We hear sound produced by the computer through -
6. It is the mainboard inside computer case.
7. It considered as the house of primary device of a computer.
8. It is the electric supplier which make the whole computer operates.
9. A mechanical drive that stores all the data.
10. It is an electronic device that manipulates information or data.

Answers

Answer:

1. CPU

2. Monitor

3. mouse

4. keyboard

5. speaker

6. motherboard

7. storage(RAM)

8. power supply unit

9. hard disk

10. computer

I am not sure about 8. no and 7. no!!!

Why are visually interesting effects, such as WordArt, to be used sparingly?

Answers

Explanation:

Formatting with Word Art

Standard formatting options, such as bold, italic, and underline , are all Available on the home tab.

Word Art Styles

You can find Word art text effects in the text group on the insert tab. When you apply a word art text effect , PowerPoint 2007 displays the format contextual tab under drawing tools.

Answer:

Microsoft PowerPoint is a popular presentation application that is widely used across many mediums. Maybe you’ve used it to read presentations from conferences or perhaps you’ve explored its basic functions, but have you ever considered its true impact and potential?

As a JAWS user, the benefits of creating visually appealing PowerPoint presentations might not be immediately evident, but the use of images, audio and graphics to convey an idea can significantly impact your audience. Here are 4 reasons to incorporate powerful visuals into your next presentation.

Explanation:

As a presenter, you need to grab the attention of your audience from the very beginning. While your words are certainly important, those who can see the presentation will need more to become fully engaged.

Think of it as showing rather than telling. You are literally creating a balance by illustrating the text points in your slides to convey a message, and what better way to do this than through powerful pictures, videos and graphics to pique their interest.

As a non-visual user, you might have difficulty choosing images. If so, don’t hesitate to consult with sighted individuals to find the right visuals. Your slides will be more compelling and memorable as a result.

Other Questions
X^6-64 divided by X+2 List the resulting array after each iteration of the outer loop of the selection sort algorithm. Indicate the number of character-to-character comparisons made for each iteration (line 07 of the Selection Sort algorithm). Sort the following array of characters (sort into alphabetical order): C Q R B P D X.public static void selectionSort (char[] a){int n = a.length;for (int i = 0; i < n; i++){int min = i;for (int j = i + 1; j < n; j++){if (a[j] < a[min]){min = j;}}exchange(a, i, min);}}private static void exchange(char[] a, int i, int j){//exchange the value at index i with the value at index jchar temp = a[i];a[i] = a[j];a[j] = temp;} 5 reasons why people should use electricity wisely Phng trnh vi phn y'' - 2y' -3y =0 c nghim tng qut l ? factorize the following: x^4+x^2+1 i really need to find out how to find a,b, and c in the quadratic formula can u please help ASAP will mark as BRAINLIEST!! find the domain of y= 3x+3 Predicting and controlling the social impact of technology, both anticipating new technologies and their social and environment implications and the consequences of ever- increasing scale of application of older technologies is one form of contribution of:Select one:A. Science to technologyB. Invention to innovationC. Innovation to inventionD. Technology to science CORRECT ANSWER ONLY PLEASE!! What is the simplest radical form of the expression?(8x5y3)23 1. If you could be any animal for one day, which animal would you choose and why?restating the question! help me please ! MAIN IDEA: CARBON ATOMS HAVE UNIQUE BONDING PROPERTIES.Choose whether the statement is true or false. 1. true / false Carbon atoms form the building blocks of most living things. 2. true / false Carbons outer energy level is full. 3. true / false Carbon atoms can form covalent bonds with up to four other atoms. 4. true / false The three basic structures of carbon-based molecules are straight chain, bent chain, and ring. Manuel describe un sbado por la maana en su casa. Completa lo que diceEscribir con la forma correcta de ser o estar. (Complete the description with the correct formof ser or estar.)Los sbados yo no 1. cansado porque duermo mucho. Bajo ala cocina a las diez; mis padres y Elena ya 2. all. Elena 3.mi hermana. Ella 4. un poco perezosa. Mi padre y yo preparamosel desayuno. La cocina 5. grande y amarilla. La mesa y las sillas 6. cercade la ventana. Las cortinas 7. blancas. La alfombra 8. de Otavalo, enEcuador. Despus del desayuno, mi familia y yo 9. contentos porquevamos a jugar al ftbol. Nosotros 10. muy atlticos. You are very concerned about your good friend who is pregnant and smoking 17 cigarettes a day she also tells you that she has cut down on drinking and is only consuming two beers a day. what would you suggest to her pretending the remainder of her pregnancy Choose the best description of the associative property of addition.O A. The smaller of two addends is called an associated number.OB. The way in which numbers are grouped to be added does not change the sum.O c. If one of two numbers is 1 more than the second number, the numbers are called associated numbers.OD. When zero is added to a number, the sum is that number. help ---------------------------------------------- help me find the area pls Wally and Kim, a married couple with an average life expectancy, have a retirement budget of $6,000/month. While they are both alive their Social Security and Kim's military retirement will pay $4,500/month. Wally's IRA is sufficient to generate $1,505/month with the features they need. What Retirement Level have they achieved? What is 888 x - 666? Identify two ways to measure mass Robert says that the slope of a line passing through (1, 7) and (3, 9) is equal to the ratio 1-3/7-9 . Is this a correct method for calculating the slope? Explain your answer. (1 point)