Question = 5 Which of these causes problems because it causes all words to have the same shape? ​

Answers

Answer 1

Using all uppercase text causes problems because it causes all words to have the same shape.

option B.

What happens when all uppercase text are used?

When text is written in all uppercase letters, it results in words that have the same height and width, which can create visual monotony and make it difficult for readers to quickly distinguish between words.

Uppercase" text, is generally considered less legible compared to mixed case (capitalization) text.

Thus, using all uppercase text in large blocks of text, such as in paragraphs or sentences, can be particularly challenging for readers, as it lacks the visual cues that help with word recognition and comprehension.

Learn more about uppercase text here: https://brainly.com/question/27935151

#SPJ4

Complete question:

Which of these causes problems because it causes all words to have the same shape?

using left-aligned text

using all uppercase text

putting two spaces after a period

using an image instead of text


Related Questions

You would use the _______ conditional formatting options when analyzing a worksheet in which you want to highlight the highest or lowest values compared to other cells in the selection.

Answers

Answer:

Top/bottom conditional formatting

Explanation:

The top/bottom conditional formatting automatically carries out the task of finding the highest, lowest and even average values.

Conditional formatting formatting gives one the opportunity to enhance reports and dashboards as they work on excel.

You use the too/bottom formatting to highlight cells whose values of highest in a dataset and lowest in a dataset

Which work value involves knowing that your position will be around for a while?

Answers

A work value which involves an employee knowing that his or her position will be around for a while is: receiving recognition.

What is a work value?

A work value can be defined as a series of principles or beliefs that are related to an employee's career or place of work (business firm).

This ultimately implies that, a work value connotes what an employee believe matters with respect to his or her career.

In conclusion, receiving recognition is a work value which involves an employee knowing that his or her position will be around for a while.

Read more on work value here: https://brainly.com/question/3207845

#SPJ1

the points a b c and d lie on a straight line ab:bd = 1:4

Answers

The points a b c and d lie on a straight line ab:bd = 1:4 are A line that extends to infinity on both sides and has no curves is called a straight line.AB:BC=3:4.

What do you call a straight line?  

A line is simply an object in geometry denoted as an object with no width that extends on both sides. A straight line is just a line with no curves.

AC=AB+BC=3+4=7;  AC:CD=2:1, i.e. AC=2;   because we get 2 different lengths for AC, we change the given ratio AC:CD to an equivalent one with AC=7 .As follows: AC:CD = 2 : 1 = 7 : 3.5 (multiply both sides by 3.5 )   Now we have AC:CD = 7 : 3.5 and AD = AC+CD= 7+3.5 = 10.5,, and the answer is: the ratio  BC:AD = 4:10.5.

Read more about the straight line:

https://brainly.com/question/3493733

#SPJ1

Bonus Problem 3.16: Give an example showing that if we remove the assumption that \( G \) is finite in Problem \( 3.15 \), then the conclusion need no longer follow,

Answers

We can see that if we remove the assumption that the group \( G \) is finite, then the conclusion need not follow.

Give an example showing that if we remove the assumption that \( G \) is finite in Problem \( 3.15 \), then the conclusion need no longer follow:We know that every finite group \( G \) of even order is solvable. But if we remove the assumption that the group \( G \) is finite, then the conclusion need not follow. This can be shown by the example of the general linear group \( GL_n(\mathbb{R}) \) over the real numbers.For all finite fields \( F \) and all positive integers \( n \), the group \( GL_n(F) \) is a finite group of order \( (q^n-1)(q^n-q)(q^n-q^2)…(q^n-q^{n-1}) \), where \( q \) is the order of the field \( F \). But if we take the limit as \( q \) tends to infinity, the group \( GL_n(\mathbb{R}) \) is an infinite group of even order that is not solvable.The group \( GL_n(\mathbb{R}) \) is not solvable because it contains the subgroup \( SL_n(\mathbb{R}) \) of matrices with determinant \( 1 \), which is not solvable. Thus, we see that if we remove the assumption that the group \( G \) is finite, then the conclusion need not follow.

Learn more about real numbers :

https://brainly.com/question/31715634

#SPJ11

Which word best describes the feeling you have when you are in the learning zone?

A. Comfortable
B. Accomplished
C. Unsure
D. Agitated

Answers

Explanation:

This is probably something like a feedback form

but I feel unsure/comfortable

Answer: Accomplished

Explanation:

What are the main types of copper media used in networking?

Answers

The main types of copper media used in networking are unshielded twisted-pair (UTP) cabling, shielded twisted-pair (STP) cabling, and coaxial cabling.


Unshielded twisted-pair (UTP) cabling is the most commonly used type of copper media in networking. It is made up of two or more pairs of twisted wires that are not shielded from each other. This type of cabling is used in Ethernet networks, telephone systems, and other types of data networks.

Shielded twisted-pair (STP) cabling is similar to UTP cabling, but it includes a layer of shielding material around the twisted wires. This shielding helps to reduce interference from other electrical devices and can improve the performance of the network.

Coaxial cabling is another type of copper media used in networking. It is made up of a central conductor surrounded by an insulating layer, a metallic shield, and an outer insulating layer. Coaxial cabling is used in cable television systems, broadband internet connections, and other types of data networks.

Learn more about copper cable here:

https://brainly.com/question/30034490

#SPJ11

You have an Active Directory forest named csmtech.local and two Active Directory domains in the forest named csmpub.local and csmsales.local. You want the DNS servers in each domain to be able to handle DNS queries from client computers for any of the other domains. DNS servers in the csmtech.local and csmpub.local domains should be authoritative for their own domains and the csmsales.local domain. However, DNS servers in csmsales. local should be authoritative only for csmsales.local. How should you set up the DNS servers and zones to handle this situation? Explain how the DNS servers in each domain should be configured with zones. Be sure to include information about replication scope and zone types.

Answers

Answer:

ecognize a statistical question as one that anticipates variability in the data related to the ... right now?” a) The ... c) This is not a statistical question because there ... predicted that more people sent 80 to 99 emails than 0 to 19 emails per week. Complete the histogram to represent the data. Is Lisa's prediction valid?

Explanation:

Identify the data type of each variable as either int, float, string, list, or boolean.

Identify the data type of each variable as either int, float, string, list, or boolean.

Answers

Data type of each variable is:

i-int

j-string

k-string

m-boolean

n-list

p-float

q-integer

r- boolean

s-int

t- string

u-string

v- float

w-string

What are data types?

Data is categorized into different types by a data type, which informs the compiler or interpreter of the programmer's intended usage of the data. Numerous data types, including integer, real, character or string, and Boolean, are supported by the majority of programming languages. Today, binary data transfer is the most widely used type of data transport for all devices.

A collection of 0s and 1s arranged in a precise order makes up a binary kind of data. Every piece of information is translated to binary form and used as needed. Another set of binary data is connected to this binary form to define the type of data being carried since this binary form does not specify what it is carrying. Variables are specific storage units used in computer programming that hold the data needed to carry out tasks.

To know more about Data, check out:

https://brainly.com/question/19037352

#SPJ1

I figured out the secret message in Dad feels good, I can connect the dots

It was morse code of blinking lights. Here is my translation

Andan
come in
this is base

Luietanat Emily Ridley
this is base
come in

This makes sense.

Dad's base wasn't on CFBDSIR, it was on 22B

Dad said not to forget 22B, Kepler 22B is the base. I think Kepler 22B is the base that some lifeform took over

Can you guys correct me if I am wrong

Answers

Answer:

Nope you figured it out

Explanation:

the only software component that’s required to run a web application on a client is

Answers

The only software component that’s required to run a web application on a client is a web browser.

A web application is a program or software that runs on a web server and is used by clients over the internet. Web applications are designed to be compatible with multiple platforms, including smartphones, tablets, and computers.

Because they are platform-independent, web applications can be run on a variety of devices without requiring specialized software.

A web browser is a program that displays web pages and content on the internet. It is a client-side software that is installed on a computer or mobile device and is used to access web applications and websites. It provides users with a graphical interface to access web-based content, such as text, images, videos, and multimedia.

Web browsers use HTTP (Hypertext Transfer Protocol) to request and transmit data to and from web servers. Web applications are accessed using web browsers. A web browser is the only software component that’s required to run a web application on a client.

It acts as a user interface that communicates with the web server where the application is hosted. When a user accesses a web application, the web browser sends a request to the web server to retrieve the necessary data and displays the results on the user’s device.

To learn more about software: https://brainly.com/question/28224061

#SPJ11

Prompt
What is a column?

Answers

Answer:

A column is a vertical group of values within a table. It contains values from a single field in multiple rows. ...

A column is a vertical group of values within a table. It contains values from a single field in multiple rows.

Why prompt is used?

Since we can choose only one of the prompts, let's work with prompt A. We can answer it in the following manner edgar Allan Poe believed that a good short story must have a single, unifying effect. He did apply that concept to his own short stories. Let's briefly analyze "The Fall of the House of Usher."

In the story, every element contributes to the story's effect: the setting, the characters, the dialogue, the word choice and the mood, among others. From the beginning, the narrator describes an "oppressive" weather. He proceeds to let us know that his friend Usher looks sick and strange. The house where Usher lives is also quite eerie. And to top it all, Usher's sister, who was buried alive, has returned for revenge.

Poe believed a good short story should possess a single, unifying effect, and that everything in the story should contribute to that effect. He achieves that in his short stories, where every element (characters, setting, imagery, word choice, etc.) contributes to the feeling of tension, anxiety, even horror.

Therefore, A column is a vertical group of values within a table. It contains values from a single field in multiple rows.

Learn more about element on:

https://brainly.com/question/14347616

#SPJ2

you may need an appropriate loader to handle this file type, currently no loaders are configured to process this file.

Answers

Yes, Webpack will provide significant benefits if you are developing a complex Front EndTM application with many non-code static assets such as CSS, pictures, fonts, and so on.

Webpack does not require the use of a configuration file out of the box. It will, however, presume that your project's entry point is src/index. js and will output the result in dist/main. js minified and optimized for production. Webpack is a free and open-source JavaScript module bundler. It's designed mostly for JavaScript, but it can also modify front-end components like HTML, CSS, and pictures if the appropriate loaders are present. Webpack takes dependencies from modules and creates static assets to represent those dependencies.

Learn more about configuration here-

https://brainly.com/question/14307521

#SPJ4

what is the term for pixel-based images that map bits to a display space?

Answers

The term for pixel-based images that map bits to a display space is Raster graphics or Bitmap images. Raster graphics are made up of a grid of individual pixels, with each pixel assigned a specific color or grayscale value.

Each pixel in a raster graphics is assigned a color value, which determines its appearance on the display. The image is represented as a collection of bits, where each bit corresponds to a pixel on the display.

The arrangement and combination of these bits determine the visual appearance of the image when displayed on a screen. Examples of raster image formats include JPEG, PNG, BMP, and GIF, among others.

To learn more about bits: https://brainly.com/question/1989676

#SPJ11

Discuss briefly four types of websites and the criteria you will use to evaluate the content of a website

Answers

Answer: I would look at who made it, what date it was published, what it is about and if it says .gov, .com or etc.

Explanation:

The computer uses a bootstrap.
Tick () one box to show the part of a computer of which the bootstrap is an example.

 The computer uses a bootstrap.Tick () one box to show the part of a computer of which the bootstrap

Answers

Answer: A

Explanation: It's a software

The computer uses a bootstrap. That one box that show the part of a computer of which the bootstrap is an example is application software. Thus, option A is correct.

What is software?

Software is the term for the intangible. The software is the most important aspect. Software is a collection of rules, data, or algorithms used to run machines and perform certain tasks. Apps, scripts, and programs that run on a mobile device are referred to as software.

An application is any software, or combination of applications, that is intended for the end user. Application software is classified into two categories: systems software and applications software. Database programs, web browsers, spreadsheets, and word processors are examples of application software.

Therefore, The computer uses a bootstrap. That one box that show the part of a computer of which the bootstrap is an example is application software. Thus, option A is correct.

Learn more about on software, here:

brainly.com/question/985406

#SPJ2

Create a secure password (10 points)
Ask the user how long they want their password to be, then return a randomized password that includes all the letters of the alphabets, capitalization, numbers, and special characters.

Answers

Answer:

python

Explanation:

import random

secret_length = input("how long you want the secret to be?\n")

secret_length = int(secret_length)

characters = r"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789$%^&*("
secret = ""

for i in range(secret_length):

   secret = secret + random.choice(characters)

print(secret)

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

Answers

In the program for the game, we have a garden scene represented by a green background and a black rectangular border. The cartoon character is a yellow circle with two black eyes, a smiling face, and arcs for the body. The character is drawn in the center of the screen.

How to explain the information

The game uses Pygame library to handle the graphics and game loop. The garden is drawn using the draw_garden function, and the cartoon character is drawn using the draw_cartoon_character function.

The game loop continuously updates the scene by redrawing the garden and the cartoon character. It also handles user input events and ensures a smooth frame rate. The game exits when the user closes the window.

This example includes appropriate use of variables, a function definition (draw_garden and draw_cartoon_character), and a loop (the main game loop). Additionally, it meets the requirement of using the entire width and height of the canvas, uses a background based on the screen size, and includes shapes (circles, rectangles, arcs) that are used appropriately in the context of the game.

Learn more about program on

https://brainly.com/question/23275071

#SPJ1

def winners(scores): This function takes a single dictionary as its parameter. The dictionary maps candidates to their scores. It should return a list of the candidate(s) with the highest score. The return value should be sorted in ascending order using the sort method on lists. assert winners({"a": 1, "b": 2, "c": 3}) == ["c"]
assert winners({"a": 1, "b": 1, "c": 1}) == ["a", "b", "c"]

def plurality(votes):
Another way to elect a candidate using Ranked Choice Voting is called the "Plurality" method. It assigns one point for being ranked first by a voter. The candidate with the most points wins.
This function should take a list of rankings as its input parameter, and it should return a dictionary. The returned dictionary has candidates as keys, and for each key, the associated value is the total number of first-place rankings for that candidate.
assert plurality(votes1) == {"a": 2, "c": 1}
assert plurality(votes2) == {"a": 2, "b": 1}
assert plurality(votes3) == {"a": 1, "b": 1, "c": 1}

Answers

The "Plurality" method is a voting system in which the candidate who receives the most votes in an election is declared the winner. It is commonly used in single-winner elections, such as those for political offices.

The first function, "winners(scores)", takes a dictionary of candidates and their scores as input and returns a list of the candidate(s) with the highest score. To accomplish this, we can first determine the maximum score in the dictionary using the max() function, and then use a list comprehension to find all candidates that have that score. Finally, we can sort the list in ascending order using the sort() method and return it.

Here's an example implementation:

```
def winners(scores):
   max_score = max(scores.values())
   winners_list = [candidate for candidate, score in scores.items() if score == max_score]
   winners_list.sort()
   return winners_list
```

For the second function, "plurality(votes)", we are using the "Plurality" method of Ranked Choice Voting to determine the winner. This method assigns one point for being ranked first by a voter, and the candidate with the most points wins. To implement this function, we can loop through each voter's rankings and add one point to the candidate who is ranked first. We can use a dictionary to keep track of each candidate's total number of first-place rankings, and then return this dictionary.

Here's an example implementation:

```
def plurality(votes):
   rankings = {}
   for vote in votes:
       if vote[0] not in rankings:
           rankings[vote[0]] = 0
       rankings[vote[0]] += 1
   return rankings
```

In this implementation, "votes" is a list of lists, where each inner list represents a voter's rankings in order. For example, [["a", "b", "c"], ["b", "a", "c"], ["c", "b", "a"]] represents three voters who ranked candidates "a", "b", and "c" in different orders. The function returns a dictionary where the keys are the candidates and the values are the total number of first-place rankings for each candidate.

To know more about Plurality" visit:

https://brainly.com/question/2516666

#SPJ11

Deon is setting up a three point lighting system to light an object in his scene which of the following lights is usually the largest and points in a direction opposite the main light

Answers

Answer:

The fill light.

Explanation:

oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message appears official, but joe has never had a membership before. when joe looks closer, he discovers that a hyperlink in the email points to a suspicious url. which of the following security threats does this describe?

Answers

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

What is Phishing?

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

understand what a phishing scheme looks likePlease do not click on that link.Get anti-phishing add-ons for free.Don't provide your information to an untrusted website.Regularly change passwords.Don't disregard those updates.Set up firewalls.Don't give in to those pop-ups.

Learn more about Phishing:
https://brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

TrojanPhishingMan-in-the-middleZero-day attack

Which of the following is the term for the process to make sure the user has the right to access a system? O persistence O authentication
O commitment O permission

Answers

The term for the process to make sure the user has the right to access a system is called authentication. Option B is answer.

Authentication is the process of verifying the identity of a user or system. It is a security measure that ensures that only authorized users can access a particular system or resource. Authentication can be achieved using various methods, including passwords, biometric data, smart cards, or digital certificates. Once a user's identity is authenticated, they are granted access to the system or resource. Without authentication, unauthorized users could gain access to sensitive data and compromise the security of the system.

Option B, authentication, is the correct answer.

You can learn more about authentication at

https://brainly.com/question/28344005

#SPJ11

The Fibonacci sequence is 1, 1, 2, 3, 5, 8, 13. You can see that the first and second numbers are both 1. Thereafter, each number is the sum of the previous two numbers.



a. Write a function to print the first N numbers of the Fibonacci sequence.


b. Write a function to print the Nth number of the sequence

Answers

a. Fibonacci sequence: print first N numbers.

b. Fibonacci number: print Nth number.

a. To print the first N numbers of the Fibonacci sequence, we can write a function that uses a loop to generate the sequence. We start with the first two numbers as 1, and then iterate N-2 times, adding the previous two numbers to generate the next number. We print each number as we generate it.

b. To print the Nth number of the Fibonacci sequence, we can write a function that uses recursion. The base cases are when N is 1 or 2, in which case we return 1. For any other value of N, we recursively call the function to calculate the (N-1)th and (N-2)th numbers and return their sum. By recursively calculating the Fibonacci numbers, we can find the Nth number in the sequence.

By implementing these two functions, we can either print the first N numbers of the Fibonacci sequence or directly print the Nth number, depending on the specific requirement.

learn more about print here:

https://brainly.com/question/14674501

#SPJ11

Create a subtotal for the following :

Create a subtotal for the following :

Answers

The sub-total or the given Junary Monthly Order report is attached accordingly. As is evident from the same, Ciaz has the lowest order while Swift ranks the highest with 545 orders.

What is an order report?

An order report is a financial record of all purchases and registrations made inside your organization. This includes course, path, plan, and domain purchases, registrations, and credit transactions.

It should be noted that in the case of the Open Orders Report, it is a list of all open orders. This report displays critical order details such as the Purchase order (PO) Number, Order Number, Line Status, Delivery Status, and Scheduled Ship Date (SSD)

Learn more about reports:
https://brainly.com/question/14969693
#SPJ1

Create a subtotal for the following :

trying to make the baseplate red and turn off can collide then the game waits 5 seconds and turns on can collide, making the baseplate green aswell.
would this script work?

local myBasePlate = game.Workspace.Baseplate

local function makeBasePlateRed()
myBasePlate.CanCollide = false
myBasePlate.BrickColor = BrickColor.Red()
end

makeBasePlateRed()

wait(5)
local function makeBasePlateGreen()
myBasePlate.CanCollide = true
myBasePlate.BrickCOlor = BrickColor.Green()

Answers

Answer:

Explanation:

yes

but dont forget to call makeBasePlateGreen

maybe you would call it at the end of the program?

by the way you have a typo at the end

make the O lowercase

myBlasePlate.BrickColor = BrickColor.Green()

and then add this to the end

makeBasePlateGreen()

so you call the function and actually use it.

suppose you have the option of running three algorithms, alg1, alg2, alg3, with running times o(1000n ln n), o(n3), 300n2, respectively. which algorithm would you select (i.e., which one is the fastest according to big-oh analysis) to run on input instances with arbitrarily large sizes n?

Answers

Since Alg1 is n squared, I am aware that it is the fastest of these algorithms. Alg2 is presumably the slowest because it is 2^n, which is known to perform very poorly, followed by Alg4 because it is n cubed.

Define the term algorithms?

An algorithm is a method used to carry out a computation or solve a problem. In either hardware-based or software-based routines, algorithms function as a detailed sequence of instructions that carry out predetermined operations sequentially.

All aspects of information technology employ algorithms extensively. A algorithm is a series of guidelines for resolving a dilemma or carrying out a task. A recipe, that consists of detailed directions for creating a dish or meal, is a typical illustration of an algorithm. One of the most significant algorithms available now is the merge sort algorithm. It is a comparison-based sorting algorithm that overcomes an O(n2) difficulty using the divide-and-conquer strategy.

Since Alg1 is n squared, I am aware that it is the fastest of these algorithms.

Thus,  Alg2 is presumably the slowest because it is 2^n, which is known to perform very poorly, followed by Alg4 because it is n cubed.

To know more about the algorithms, here

https://brainly.com/question/15802846

#SPJ4

to help ensure that an html document renders well in many different web browsers

Answers

Answer:

Doctype Declaration

Explanation:

In order to make sure that it renders correctly in a wide range of browsers, a Doctype Declaration needs to be added to the top of the HTML code. This declaration basically makes sure that the web browser knows how the code was written so that it can correctly read it. This is used because many web browsers use different default settings for reading code and can sometimes not display code that was not designed specifically for that web browser unless otherwise specified.

Answer:

I think it is:

B. a doctype declaration

Explanation:

Which three elements are required to have a Trade Secret?

Answers

The three elements that are required to have a trade secret are as follows:

It bestows a competitive lead on its owner.It is subject to sensible endeavor to control its secrecy.It is confidential in nature.

What do you mean by Trade secret?

A Trade secret may be defined as a type of intellectual property that significantly consists of secret information that might be sold or licensed specifically in order to main its secrecy.

Trade secrets can take many forms such as formulas, plans, designs, patterns, supplier lists, customer lists, financial data, personnel information, physical devices, processes, computer software, etc. These secrets must not be generally known by or readily ascertainable to competitors.

Therefore, the three elements that are required to have a trade secret are well mentioned above.

To learn more about Trade secrets, refer to the link:

https://brainly.com/question/27034334

#SPJ1

james, a supporting technician, is trying to resolve an issue pertaining to the router. on inspecting the issue, he figured that the router was unable to move packages from one node to another. as a resolution to this problem, he intends to follow the osi model for troubleshooting. what layer of the osi model should he inspect to understand the issue relating to the router?

Answers

James, a supporting technician, is trying to resolve an issue pertaining to the router. on inspecting the issue, he figured that the router was unable to move packages from one node to another. as a resolution to this problem, he intends to follow the osi model for troubleshooting. The layer of the osi model that james should inspect to understand the issue relating to the router is The Network Layer

Technicians can be described as a man that skilled professionals who primarily work with technology in different industries. They are knowledgeable about the technical aspects of the many items they work with. They are usually working with electricity or with technological advancements. Technicians may be assigned to do the construction of equipment or materials related to their field of study. They may also be assigned to conduct other maintenance activities and diagnostics to ensure that the equipment works accurately. Technicians may also be required to conduct basic repairs in case of problems. It is esential that technicians have decision-making skills and good analytical skills.

Here you can learn more about technician in the link brainly.com/question/14290207

#SPJ4

tiny electrical paths to connect everything together is called ? A. graphic card B. audio card C. CPU D. Motherboard

Answers

Answer:

Option C, or the CPU.

Explanation:

The audio card simply translate code into sound, the graphic card turns code into graphics, CPU runs electric through tons of little electric pathways, and the motherboard is the object of which all of the above are rested on and connects them together.

what happens to information once information is shared online?

Answers

When information is shared online, it can be manipulated and taken out of context, hence personal information such as credit/debit card number, PIN etc., are not recommended to share online.

Where does your information go when you post it online?

Rather than deleting data, most apps, databases, and even hard drives just mark it as deleted. In fact, the data remains in the website's database until someone manually deletes it. Some companies may promise to delete your data if you cancel your account on their site, but even that is not a guarantee.

What information is not allowed to be shared online?

Sharing sensitive information not allowed online include addresses, phone numbers, family names, vehicle information, passwords, work history, credit status, social security numbers, date of birth, school names, passport information, driver's license numbers, insurance policy numbers, loan numbers, credit/debit card number, PIN etc.

To learn more about online information visit:

https://brainly.com/question/29886948

#SPJ4

Other Questions
which defensive strategy makes the insect hard to see? group of answer choices aposematic coloration batesian mimicry venom glands crypsis PLEASE HELP ASAPP !!!!!!!!!!!!!!!!!!!!! Suzannes school are painting a rectangular mural outside the buillding that will be 15 feet by 45 feet the students are also going to paint a smaller mural inside the building the scale is 1 unit = 3 feet A net force of 200 N acts on a 100-kg boulder, and a force of thesame magnitude acts on a 130-g pebble. How does the rate of changeof the boulders momentum compare to the rate of change ofthe pebbles momentum?a. greater thanb. less thanc.equal to What is the answer for (a^2+12c)7b-1 Which measurement scale should the scientist use to describe the amount of heat in the solution? Find the value of x.15X36 Complete the following conversions and upload a picture showing your work: a.) 52.0 kg= ??pounds b.) 16.0oz=?? mL c.) 15.5Mm= ??feet d.) 14 nano-years = ?? seconds e.) Graphite has a density of 2.25g/cm^3. what is the volume of 12.24g of graphite? Okay, I take that back... I think I am just on a watch list- A candy-maker makes 500 pounds of candy per week, while his large family eats the candy 10% of the candy present each week. Let (t) be the amount of candy present at time t. Initially, there is 250pounds of candy.a. Express the scenario described above as an initial value problem.b. Solve the initial value problem. The volume of a cube is 554cm3.Work out the length of its side rounded to 1 DP. Use partial fractions to evaluate ef -x-5 3x25x2 dr. In the situation illustrated below, (1) Car A is given a push. Almost immediately after the push, Car A collides with Car B, which is stationary. This results in (2) Car A stopping, and Car B moving away from the collision with approximately the same speed Car A had right before the collision. Then Car B gradually slows down, and sometime later, (3) it comes to a stop. Which explanation below best describes the changes in the motion of Car B in terms of energy? (Note: KE=kinetic energy, TE=thermal energy.) virtually all personal computers come with a(n) ____ that is used to store most programs and data. Eight less than the product of 9 and a number equals 2. A sunflower's height was measured at 42 inches. The second time the flower was measured its height was 70 inches. What was the percent change in the height of the sunflower between the two measurements? Increase or decrease? amount of change original amount = percent= Substitute and solve: Drainage centre is 1.5 m below the ground level. The impervious layer is 9 m below the ground level. Average annual rainfall is 80 mm. if 1% of the rainfall is to be drained in 24hr to keep highest portion of water table 1 m below ground. Find spacing if K=110 6 cm/min set m ={a,b,c} it's proper set are The third grade students collected 90 cans of food for a food drive. They want to put an equal number of cans into each of 6 boxes. How many cans will they put into each box? 1 pts which of the following refers to the conscious control of thoughts, emotions, and actions to accomplish goals or solve problems?