Ask a New Question
Search
Questions and answers by
Johovah_Witness
Questions (310)
Why might the relatives of a suicide victim become angry? (1 point) Responses Relatives will be sorry they didn't help the
1 answer
44 views
How can you add an audio or video file to a slide? (1 point) Responses Cut and paste the link into a text box. Cut and paste the
1 answer
35 views
What is the BEST way to add a link to a Google slide? (1 point) Responses Copy and paste the URL into the text box on the slide.
1 answer
50 views
Which of the following excerpts from The Interesting Narrative of the Life of Olaudah Equiano describes how people were bought
1 answer
26 views
How did European colonizers use systemic racism to justify their cruelty to Indigenous people?(1 point) Responses European
3 answers
32 views
Question Analyze the effect of the Industrial Revolution on the global balance of power.(1 point) Responses The Industrial
3 answers
68 views
How does a framework help developers? (1 point) Responses It is the first step in the software design process. It is the first
3 answers
52 views
Hugo is troubleshooting a problem with his new smart refrigerator. The directions say to find the IP address and enter it into
1 answer
32 views
13 of 1513 of 15 Items Question Marta notices that her Wi-Fi doesn’t work; the problem seems to be that the physical cables
1 answer
36 views
What is Django an example of? (1 point) Responses a front-end framework a front-end framework a micro framework a micro
1 answer
58 views
Dave connects his smartphone to the internet connection available in a coffee shop. What technology makes this connection
1 answer
41 views
What would a social media tool like TikTok MOST likely be considered? (1 point) Responses a website because each user might see
1 answer
47 views
When using Flask, what will the view function contain? (1 point) Responses user input user input the IP address the IP address
1 answer
32 views
Hector, a new hire, was asked by his supervisor to find a framework that can be used to create both the client-side and
1 answer
50 views
Jamal, a summer intern, is asked to do some research on how a web page is divided into sections before being sent to the address
1 answer
33 views
Fatima oversees IT for a new hospital, which is trying to decide what kind of internet connectivity to use. The hospital has a
1 answer
45 views
Leo is interested in how computers are connected together. Which webinar is most likely to interest him? (1 point) Responses
1 answer
45 views
The _____ is a collection of networks, and the _____ is a collection of web pages. (1 point) Responses internet; World Wide Web
1 answer
53 views
Question Using the information you’ve acquired, identify how advances in science led to a longer life expectancy during the
1 answer
28 views
Karl Marx wrote in the Communist Manifesto that “The history of all hitherto existing society is the history of class
1 answer
43 views
Marisol is interested in finding a job in which she would work as a go-between for a company and the community it is in. Her
1 answer
36 views
Ms. Ali has been working at a company for 25 years, and she is the person new employees turn to when they have questions. She
1 answer
41 views
Which of these is NOT a good question to ask when faced with a conflict at work? (1 point) Responses Do I need to apologize for
1 answer
50 views
A consultant has been hired for a company that just experienced a huge data loss when its offices flooded. Which of these
1 answer
30 views
Which of these is NOT an effective strategy for dealing with workplace conflicts? (1 point) Responses emailing a response
1 answer
39 views
Which of these is the BEST approach to conflict at work? (1 point) Responses trying to limit communication trying to limit
1 answer
36 views
Which of these is an example of constructive criticism? (1 point) Responses “This is a disaster, but I didn’t expect any
1 answer
52 views
Which one of these is required for any relationship to be productive? (1 point) Responses good communication good communication
1 answer
33 views
Which of these is NOT a usual result of having friends at work? (1 point) Responses increased job satisfaction increased job
1 answer
42 views
Which of these is NOT a characteristic of constructive criticism? (1 point) Responses The goal is improvement. The goal is
1 answer
46 views
A manager makes decisions without getting input from anyone. They are unwilling to change anything once a decision has been
1 answer
49 views
A client calls, and he sounds furious. Which of these is NOT an effective way to respond? (1 point) Responses validate his
1 answer
42 views
Question Which one of these is a common result of good peer communication in the workplace? (1 point) Responses an increased
1 answer
56 views
Question What is the BEST response to constructive criticism? (1 point) Responses interpret it as a personal criticism interpret
1 answer
54 views
What is the best description of heat?(1 point) Responses thermal energy thermal energy the flow of thermal energy from a cooler
1 answer
40 views
Analyze how African and Black American movements countered assimilation in the colonial to post-Revolutionary War period.(1
1 answer
38 views
How can we use primary and secondary sources to analyze the resistance of enslaved peoples in the Americas?(1 point) Responses
5 answers
51 views
How can we use primary and secondary sources to analyze the resistance of enslaved peoples in the Americas?(1 point) Responses
1 answer
56 views
How did chattel slavery and the encomienda system develop and impact the Americas?(1 point) Responses Each system developed as a
3 answers
80 views
Explain why enslaving the Indigenous peoples of the Americas was largely unsuccessful in filling the need of the plantations.(1
3 answers
34 views
Question Analyze Indigenous resistance movements from the colonial period to the post-Revolutionary War period. (1 point)
3 answers
35 views
Analyze colonizer challenges to tribal sovereignty in the early United States.(1 point) Responses American colonizers did not
1 answer
32 views
What was “westward expansion”?(1 point) Responses The U.S. was trying to expand its territory west of the Mississippi River.
1 answer
41 views
Which of the following best describes the colonists’ relationships with Indigenous peoples in North America in early U.S.
1 answer
31 views
Based on the description of feudalism given in the lesson, analyze how Napoleon’s new ruling class resembled feudalistic
3 answers
32 views
Question Which statement best summarizes how Napoleon’s rise related to the death of Louis XVI?(1 point) Responses Napoleon
1 answer
45 views
Which statement best explains the development of free enterprise capitalism?(1 point) Responses Capitalism was only developed
1 answer
47 views
Which statement best investigates the relationship between the Enlightenment and laissez-faire capitalism?(1 point) Responses
1 answer
53 views
Which of the following best explains why Adam Smith is considered the father of modern economics?(1 point) Responses Adam Smith
1 answer
38 views
Which of the following statements best explains how Enlightenment thinkers challenged political authority?(1 point) Responses
1 answer
35 views
An internet-connected camera at a home’s front door is no longer working because it was used to send millions of fake requests
1 answer
42 views
Question A hacker is someone who discovers a new way to use an old technology. (1 point) Responses True True False
1 answer
37 views
7-Zip, LastPass, and AxCrypt are examples of: (1 point) Responses viruses. viruses. Trojan Horses. Trojan Horses. antivirus
1 answer
47 views
Question How does a user begin the process of uninstalling software? (1 point) Responses Go to Computer in Windows or to File on
3 answers
57 views
An email from Amazon does not use the recipient’s name, has some misspelled words in it, and has an attachment. This might be
1 answer
41 views
An algorithm that converts data so that it cannot be recognized is an example of _____, which is used to _____. (1 point)
1 answer
47 views
Avast, AVG, and Symantec are examples of: (1 point) Responses viruses. viruses. antivirus software. antivirus software.
1 answer
47 views
Which of these is not a requirement for a strong password? (1 point) Responses length length language language expiration
1 answer
40 views
What is the purpose of hovering over a link before you click on it? (1 point) Responses to see how long it will take to access
1 answer
35 views
A company recently learned that the computers in the office were infected with spyware. This means that: (1 point) Responses a
1 answer
52 views
What is the security advantage of bookmarking websites? (1 point) Responses There is less chance of mistyping the website name
1 answer
37 views
Virtual reality involves placing images on top of images of the real world. (1 point) Responses True True False
1 answer
47 views
Question Jhonni is interested in a job in which he would examine digital devices for evidence of crimes. What keywords should he
5 answers
56 views
If antivirus software identifies that a computer has a virus, the software has several possible ways to respond. Which of the
1 answer
57 views
Question Which of these statements about firewalls is true? (1 point) Responses Larger companies usually employ hardware, and
3 answers
37 views
(1 point) Responses a Trojan horse a Trojan horse a password manager a password manager a more complex password a more complex
1 answer
41 views
On average, 6,000 new viruses are released every month. (1 point) Responses True True False
1 answer
21 views
Viruses, Trojan horses, and ransomware are examples of: (1 point) Responses augmented reality. augmented reality. identity
1 answer
39 views
More than 50 percent of kids have been bullied online. (1 point) Responses True True False
1 answer
33 views
Merinda gets an email from an online store that she often visits. It asks her to click a link in the email to log in to her
1 answer
37 views
Question If someone uses their smartphone with the unsecured Wi-Fi network at a store to check their bank balance, they may
1 answer
40 views
Which of these behaviors does NOT put a user at risk for an online threat? (1 point) Responses setting social media to private
1 answer
46 views
A VPN is most like: (1 point) Responses a Trojan horse. a Trojan horse. a wall around a city. a wall around a city. a tunnel. a
1 answer
78 views
A website has free and downloadable copies of many brand-new books. This website is likely engaged in _____. (1 point) Responses
1 answer
30 views
An app lets the user see what they would look like with a different color, cut, and style of hair. This is an example of: (1
1 answer
69 views
Abbi uses unsecured Wi-Fi to check her bank balance each week from her smartphone. What risk is she taking? (1 point) Responses
1 answer
30 views
Maren copies a paragraph from an article and puts it into a paper she is writing as if she has written the paragraph herself.
1 answer
49 views
A business that manages digital medical records gets an email stating that their clients will not be able to access the medical
1 answer
49 views
How does antivirus software work? (1 point) Responses by immunizing your computer by immunizing your computer by encrypting your
1 answer
46 views
The area of a rectangular painting is given by the trinomial x2 + 4x – 21. What are the possible dimensions of the painting?
1 answer
52 views
cylinder has a radius of 5x + 2 and a height of 2x + 8. Which polynomial in standard form best describes the total volume of the
1 answer
32 views
Simplify the product using FOIL. (3x – 4)(6x – 2) (1 point) Responses 18x2 + 30x – 8 18 x 2 + 30 x – 8 18x2 + 18x – 8
1 answer
60 views
Simplify the product using the distributive property. (3p + 2)(5p – 1) (1 point) Responses 15p2 – 7p + 2 15 p 2 – 7 p + 2
1 answer
39 views
A person manages to get access to a celebrity’s smartphone through an unsecured network and then sells pictures from the phone
1 answer
47 views
2 of 502 of 50 Items Question What is the security advantage of bookmarking websites? (1 point) Responses There is less chance
1 answer
45 views
If someone uses their smartphone with the unsecured Wi-Fi network at a store to check their bank balance, they may become the
1 answer
41 views
Which is the best description of a student applying lifelong learning skills as she investigates kinetic and thermal energy?(1
1 answer
33 views
ow can a web user combat cyberbullying? (1 point) Responses by making negative comments by making negative comments by making
1 answer
46 views
Which of these is NOT a step to take to avoid identity theft? (1 point) Responses shred mail with private information shred mail
1 answer
45 views
Which of these behaviors does NOT put a user at risk for an online threat? (1 point) Responses setting social media to private
1 answer
49 views
Jasmine wanted to take out a car loan, but she was turned down because the bank told her that she already had five car loans in
1 answer
31 views
An app lets the user see what they would look like with a different color, cut, and style of hair. This is an example of: (1
1 answer
70 views
Abbi uses unsecured Wi-Fi to check her bank balance each week from her smartphone. What risk is she taking? (1 point) Responses
1 answer
39 views
Avast, AVG, and Symantec are examples of: (1 point) Responses viruses. viruses. antivirus software. antivirus software.
1 answer
48 views
Which of these is NOT a sign that a computer might have a virus? (1 point) Responses The computer has been upgraded. The
1 answer
56 views
Maren copies a paragraph from an article and puts it into a paper she is writing as if she has written the paragraph herself.
1 answer
46 views
Omar finds a website that allows him to download for free a movie that is currently being shown in theaters. This is an example
1 answer
67 views
Explain the impact of scientific ideas on Europe.(1 point) Responses New scientific discoveries were always immediately
1 answer
57 views
Identify a significant idea from the Scientific Revolution.(1 point) Responses round Earth theory: Earth is not flat. round
1 answer
107 views
In 3–5 sentences, analyze a characteristic of Spanish or Portuguese colonial rule. Determine if it would be considered a
5 answers
71 views
Pages
1
2
3
4