for your final project, you will create a public service announcement (psa) to teach your peers about digital citizenship and cyber hygiene. you can select any of the topics covered in this unit.

Answers

Answer 1

The ways to write the public service announcement (psa) to teach your peers about digital citizenship and cyber hygiene are:

Select the Topic and Decide on an the people to ask.Know one's Audience. Put together Information on the topic aboveMake use of the  Media well and rightly. Make your Script.Editing the script and then do a Story Boarding.

What is meant by digital citizenship?

Digital Citizenship is known to be a term that connote the ability of a person to be engage rightly, extensively and competently in the world of the digital platforms, working on their skills for effective communication and development.

Therefore, The ways to write the public service announcement (psa) to teach your peers about digital citizenship and cyber hygiene are:

Select the Topic and Decide on an the people to ask.Know one's Audience. Put together Information on the topic aboveMake use of the  Media well and rightly. Make your Script.Editing the script and then do a Story Boarding.

Learn more about digital citizenship from

https://brainly.com/question/27832386

#SPJ1


Related Questions

PLS HELP QUICK!!!!
Read the following scenario:
A cell phone company is launching a brand new state-of-the-art smart phone. This phone has the latest wireless communications
technology built into its system. The phone is loaded with new apps and special devices that enhance speed and efficient Internet use.
Which of the following can a consumer most likely expect with the unveiling of this new product?
increases in the cost of services from providers
increased value of older smart phone models
O increase in sound quality
O decrease in the creation of competing apps

Answers

Answer:

increases in the cost of services from providers

Explanation:

With the advancement in the quality of the product, the price of the product also sees a hike. According to the given excerpt, the cell phone company had added many new features and upgraded the version of the smartphones. Because of this reason, it's value in the market will be more as compare to the last product. New technology and advanced features would help the customers in various ways. In return, the price of the product will be more.

a. What is MS-Word ? Write its uses.

Answers

Answer:

MS word is Microsoft word and you can use MS Word in daily life and business to create professional-looking documents such as resume, letters, applications, forms, brochures, templates, business cards, calendars, reports, eBooks, and newsletters in speed with high quality.

Explanation:

Answer:

MS-Word is the popular word processor developed by Microsoft corporation, USA which allows us to create documents like notes, letters, memos, reports, etc.

uses of Ms - word are:-it helps us to prepare a document in nepali language.It provides many facilities to format a document .it helps to create documents.it is helpful in inserting tables, pictures and charts in a document .

hope it is helpful to you ☺️

With _________, users will receive recommendations for items liked by similar users.

Answers

Answer:

Collaborative filtering

Explanation:

Collaborative filtering is an algorithms family in which there are various ways to determine the same users or items also there are various ways to determine the rating depending upon the same users rating

Therefore as per the given situation, the above is the answer

Hence, the same is to be considered

If there are cyber threats and vulnerabilities to your system, what does that expose you to? check all that apply

Answers

Answer:

Social engineering tactics – using the art of deception in cyberattacks – have climbed to the top spot as the #1 cause of cybersecurity breaches. Our researchers break down common attack vectors, where we’re most vulnerable and find out why social engineering is so successful. Finally, we explore Forrester’s recommendation for the best defense against social engineering tactics like phishing. They make the case for adopting a multi-tiered cybersecurity strategy. Equipped with the right defenses, you can protect your business from social engineering.

Old systems can be useful when designing new computer software.
True or False

Answers

True! Just ask Apple incorp
correct answer:
True

I need help..
I am just trynna see if I can make an app
But it says
Debug Signing Certificate
And literally I know nothing about it
So if somebody can give me an example
I'll be very grateful
But please no cheating
And copying as well

Answers

Answer:

which app are u using u should use Android studio or if u are using mac book use xcode

A method of changing unproductive thoughts into constructive ones is called

meditation.
visualization.
positive self-talk.
deep breathing.

Answers

A method of changing unproductive thoughts into constructive ones is called meditation. Hence, option A is correct.

What is unproductive thoughts?

An inclination or habit is a mindset that doesn't offer any benefits, effects, or results. Such a mindset pulls the client's focus away from his goals, fulfillment, and empowerment. Negative thoughts may be part of an unproductive mindset.

Overthinking, sometimes referred to as rumination, is when you keep returning to the same idea or event in your mind until it starts to interfere with your life. The two primary forms of overthinking are worrying about the future and brooding on the past.

People who have previously faced difficulty for which they were unprepared may get into the habit of catastrophizing.

Thus, option A is correct.

For more information about unproductive thoughts, click here

https://brainly.com/question/16875515

#SPJ6

Answer:positive self talk

Explanation:

can someone please give me some ideas of hooks about negative affects about social media?​

Answers

I'm sure you have heard of social media, But have you heard it start's to get out of hands because kids get addicted?

1)Causes kids to be addicted

Answer well to be honest it just gives people something to do but if your on it to long you start to get addicted to that. and my parents try to get them off of it and people could post something that you don't want to. i may be 17 but i still choose not to have social media

Fatima wants to compose and send an email in Outlook. Order the steps she needs to follow to do this task.
✓Click the Send button after typing the message.
Under the Home tab, click the New Email button.
Click the To button to choose a contact
Open the Outlook application.

Answers

Answer:

The steps that Fatima needs to follow in-order to send an email on the Outlook include:

1. Open the Outlook application.

2. Under the Home tab, click the New Email button.

3. Click the To button to choose a contact

4. Click the Send button after typing the message.

Explanation:

For every new email to be sent out through the Outlook, there are steps to follow like ensuring that the Outlook application is appropriately opened. Later, a tab showing new email should be clicked to open the dialogue box for typing the email message.

After the message has been typed, a contact to whom the message is going to be sent to is selected before actually sending out the message by a click of a button.

Answer:

4  Click the Send button after typing the message.

2  Under the Home tab, click the New Email button.

3 Click the To button to choose a contact.

1  Open the Outlook application.

can someone help me complete this lab tutorial?

Answers

nskskakakskssnnsnskaak

The following program is run. Then the user click the "bottomButton TWO TIMES, What will be displayed in the console
1
onEvent("topButton","click", function ()
2
console.log("aaa"
3
4.
console.log("bbb");
5
onEvent( "bottomButton", "click", function() {
6
console.log("ccc");
7
)

Answers

Answer:

10

Explanation:

What are the duties of IT professionals before and during the deployment of computers stage? Check all of the boxes that apply.

set up basic productivity programs, such as e-mail and word-processing software

collect each employee’s e-mail username and password

back up files

install any special software needed, such as photo-editing or tax preparation programs

upgrade system components

Answers

Answer: A,C,D

Explanation:

I literally just answered it, good luck though guys !!

you administer a network with windows server 2016, unix servers, and windows 10 professional, windows 8, and macintosh clients. a windows 8 computer user calls you one day and says that he is unable to access resources on the network. you type ipconfig on the user's computer and receive the following output:

Answers

Answer:

Unavailable DHCP Server

Explanation:

If a Windows 8 client computer is configured to use DHCP and can't locate one to receive IP addressing information, it assigns itself an IP address from the APIPA (Automatic Private IP Addressing) range of IP addresses. APIPA addresses include IP addresses from 169.254.0.0 to 169.254.255.254 and are reserved for this purpose. A lit link light on your NIC indicates a connection to the network.

Copying materials from a source text without using____ is considered plagiarism.
A)quotation marks
B)the internet
C)a computer
D)punctuation

Answers

Answer:

A) quotation marks

Explanation:

When copying materials from a source text, using quotation marks allows you to identify which part is from the author of the source.

A) quotation marks

When directly quoting a text piece, always use quotation marks

Date:
Pages
who invented Pascaline? Explain its features​

Answers

Answer:

I jus need mo pointssssssssssssssssss

blaise pascal invented it. it’s the first calculator to be produced in and quantity and actually used.

What are the circular spots of light seen on the ground beneath a tree on a sunny day?.

Answers

Answer:

every spot but it is mostly facing at a 90 degree angle depending on were the sun sets

Explanation:

Information stored on CD-ROM disc must be read and then erased.True or false?​

Answers

Answer:

False

Explanation:

What are the three control statements in Qbasic?​

Answers

Answer:

branching statement

looping statement

as the interval of time during which every runnable task should run at least once. the linux cfs scheduler identifies as the interval of time during which every runnable task should run at least once. virtual run time targeted latency nice value load balancing

Answers

The Linux CFS scheduler identifies option B - targeted latency as the interval of time during which every runnable task should run at least once.

What is target latency in CFS?

The CFS scheduler is known to be made up of a target latency, and this is said to be the minimum amount of time that is known to be the ideal form to an infinitely small timeframe which is needed for all  runnable task to be able to get at least a single  turn on the processor.

Note that the CFS is seen as a kind of an implementation of  a detailed form of classic scheduling algorithm known to be called weighted fair queuing.

Therefore, based on the above, The Linux CFS scheduler identifies option B - targeted latency as the interval of time during which every runnable task should run at least once.

Learn more about latency from

https://brainly.com/question/14170094
#SPJ1

The Linux CFS scheduler identifies ____ as the interval of time during which every runnable task should run at least once

A. virtual run time

B. targeted latency

C. nice value

D. load balancing

secondary data may enhance primary data by providing a current look at issues, trends, yardsticks of performance, and so on that may affect the type of primary data that should be collected.

Answers

Secondary data may enhance primary data by providing a current look at issues, trends, yardsticks of performance, and so on that may affect the type of primary data that should be collected: True

The types of data.

Generally, there are two (2) main types of data and these include:

Primary dataSecondary data

What is a primary data?

A primary data can be defined as a type of data (information) which comprises raw information that are first-hand and original in nature. This ultimately implies that, a primary data describes a personal experience or witness of an event (occurrence).

On the other hand (conversely), secondary data are typically and generally obtained from primary data and as such it enhances primary data by providing a current perspective on the things that are most likely to affect primary data, which makes it an advantage of secondary data.

Read more on primary data here: brainly.com/question/26711803

#SPJ1

Complete Question:

Secondary data may enhance primary data by providing a current look at issues, trends, yardsticks of performance, and so on that may affect the type of primary data that should be collected. True or False?

what time is it NOW??

Answers

Answer:

Depends on your time zone. Look in the bottom right of your computer and you can see what time it is.

A _____ acts as an interface to a database, retrieving data for users and allowing users to enter data in the database.

Answers

Answer:

Explanation:

database is a computer

How do you think smartphones will have changed in 5 years?

Give 3 features that you think smartphones will have in 5 years that it does not have right now.

Answers

Smart phones will be able to be navigated with your mind

The landscape layout is more appropriate for leaflet.
TRUE OR FALSE

Answers

False im very sure its false

What is a true job in the information age?​

Answers

Answer:

apple

you get a lot of information about the technology you paid for.

if this was not helpful comment and I’ll fix it!

The quick access toolbar can be customized, but the ribbon can not be customized. True or false?.

Answers

It is false that the quick access toolbar can be customized, but the ribbon can not be customized.

Based on the support website:

There are several commands in the resizable Quick Access Toolbar that are unrelated to the ribbon tab that is now shown. The Quick Access Toolbar can be moved from one of the two potential positions, and buttons that correspond to instructions can be added to the Quick Access Toolbar.Your ribbon can be customized to display tabs and commands in the order you like, hide or reveal the ribbon, and conceal instructions you don't use frequently. A customized ribbon can also be imported or exported.

Learn more about quick access toolbar https://brainly.com/question/17441291

#SPJ4

Which type of information systems personall must communicate with and organazation's emplyees to determine witch technological improvements are needed to improve the organazations computer networks

Answers

Answer:

You didn't leave any answer choices so I will have to assume.

Explanation:

Depending on the logistics of the company the systems personal will be in charge of informing the higher ups about the current state of actions and the present state of how the servers are working.

3 advantages

of building in SDLC​

Answers

Answer:

better management control over the entire development project transparency and visibility of all process. clarity of requirements

You receive an email from your school's head of IT. There is a concern for a potential hack to the school's servers. IT knows some accounts have been compromised, with their login and passwords overwritten by the hackers. They need to reset the accounts that the hackers have changed the passwords on. However, they don't have access to the passwords directly, and the change records were corrupted by the attack. They need students and staff to confirm their passwords by logging into a secure site. If the login fails, they'll know your account was compromised and reset your account immediately.
a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments phone number and call them about the email.
b.) This is a serious issue, and the email came from the head of IT. The site also shows that it's secure. The longer it takes to reset accounts, the longer the hackers will have access to your account. Follow the instructions in the email from the head of IT.

Answers

Answer:

a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments; phone number and call them about the email.

Explanation:

This makes sense because many people do these types of scams to trick people into logging into their accounts and actually hack them from there, I actually got an email like this last week to my iCloud address. Make sure that the email actually came from the IT department by checking the domain the email comes from, and call the IT department to make sure.

Hope this helps!

Which of the following candidates would most likely be hired as a graphic artist?
o a visual design artist with seven years of experience in advertising
a multimedia artist with five years of experience in multimedia design
O a recent college graduate with a degree in multimedia design
O a recent college graduate with a degree in film design

Answers

Answer:

a multimedia artist with five years of experience in multimedia design

Explanation:

Other Questions
match these with the pictures 1. salon 2. secularism 3. feminist4. deism5. philosophes Which option is a simple sentence?O A. Before I do anything, I'm going to visit my mother.O B. The green grass covered the senator's gigantic lawn.C. She didn't have any socks for sale, so I moved on.O D. Doctors say to get flu shots, and we agree with them. When Coronado's men visited the pueblos, what did they do? a. They traveled to numerous pueblos and gave gifts. b. They traveled to only a few, then gave up. c. They always asked for directions to the gold mines. d. They left priests to remain and convert the Pueblo Indians. Please select the best answer from the choices provided A B C D Can someone help me on this? which one is it??? Describe the difference in the purpose and naming process of a criminal case and a civil case.Gina Brown injures herself on a saw left on the sidewalk of a neighbor's house. She sues the neighbor, James Blue, for negligence. The title of this __________ lawsuit would be __________. A.civil, James Blue v. Gina BrownB.criminal, Gina Brown v. James BlueC.civil, Gina Brown v. James BlueD.criminal, James Blue v. Gina Brown One's social class or class rankings do not fully correlate with economic status or pay scales.Group of answer choicesTrueFalse Whose epithet is the father of gods and men? Poseidon Hermes Zeus Apollo You are designing an internet router that will need to save it's settings between reboots. Which type of memory should be used to save these settings?a. Disk b. Does not matter c. SRAM d. Flash e. DRAM The graphic below shows quadrilateral ABCD and its dilation, quadrilateral ABCD, with the origin as the center of dilation. The scale factor is .Which statement about both quadrilaterals is true?Quadrilateral ABCD is congruent to quadrilateral ABCD.The corresponding angles of quadrilaterals ABCD and ABCD are congruent.The corresponding sides of quadrilaterals ABCD and ABCD are congruent.The corresponding angles of quadrilaterals ABCD and ABCD are not congruent. solid zinc reacts with oxide to form zinc oxide 3. State what additional information is required in order to know that the triangles are congruent by the SSS Triangle Congruence Postulate I have 17 warnings how am I not banned from the app yet? Amanda made $14.50 per hour, gets a 10% raise, and works 38 hours per week. define analogous structure and provide an example what intipact does the word "nomad," in paragraph 29, have on the overall meaning of thetext?A.B.C.It proves that the narrator is no longer welcome on the reservation.It emphasizes that the narrator does not want to leave home but has no otherchoice.It stresses that the narrator must choose between the reservation school andhis new school.It demonstrates that the narrator no longer feels a sense of belonging, or athome, on the reservation.D The legislative branch is responsible for judging lawscarrying out the lawsmaking the lawsinterpreting laws Jamal makes $186 a week at his job. He plans to save 5% of his paycheck for a P.Y.F account. How much money will Jamal put in his P.Y.F account this week. What do you call powers that are shared between the national and state government? A expressed powers B concurrent powers C reserved powers D super powers What effects did U.S. foreign policy have on Latin America? a heterotrophic prokaryote would: group of answer choices derive energy from inorganic compounds derive carbon from co2 derive carbon from organic compounds derive energy from sunlight