1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
2 years ago
5

Why is it important not to leave your personal information on a public computer?

Computers and Technology
1 answer:
zheka24 [161]2 years ago
7 0

Answer:

B. Someone can steal the information and hurt you.

Explanation:

People can hack into your accounts using your informations and spread hurtful things that can make people hurt. The people will think that you posted this (even if you didn't) and blame you.

You might be interested in
Select two netiquette guidelines. In three to five sentences, explain why these guidelines make professional online communicatio
meriva
Netiquette is etiquette when using the internet. The first guideline refers to posts on social media. Individuals should be mindful that posts can be read by anyone including employers and family members. Individuals need to ensure that material shared is not offensive. The next guideline refers to materials or content that is posted. Users must ensure that material posted does not belong to someone else or is copyrighted. Permission must be sought the owner must be cited or recognized. 
7 0
3 years ago
Read 2 more answers
Which technique is used for overcoming the CPU Waiting Time Problem of
PIT_PIT [208]

Answer: Its a method of transferring data between the CPU and a peripheral, such as a network adapter or an ATA storage device. Each data item transfer is initiated by an instruction in the program, involving the CPU for every transaction.

Explanation: idk if this helps but hope it does

8 0
3 years ago
How do the principles behind the Agile Manifesto suggest approaching architecture?A. Architecture emergesB. Architecture is not
Ne4ueva [31]

The principle behind the Agile Manifesto suggests that Architecture emerges in regard to approach architecture.

<u>Explanation:</u>

  • Based on the Agile Manifesto's principles or the Manifesto for the best architecture, designs and requirements emerge from self-organizing teams.
  • The principles deal with changing requirements even late in development. Agile processes harness change for customer satisfaction.
  • Business people and developers working throughout the project exposes the fact that both functionality and architecture is important.
  • Agile software development is defined as the development through which requirements and solutions evolve through collaboration and cross-functional terms.
  • Architecture is used in this Manifesto for the following reasons.
  1. Adaptable to change
  2. Minimized risk
  3. Maximized business value
5 0
3 years ago
Which of the following is a good precaution to take when making online purchases? (1 point)
Fantom [35]

Answer:

A.

Explanation:

A is the answer..

This is because you can use a private browser for safety precautions so no hackers would target you and steal your personal information. Also the other options make no sense at all. Option B states that you can use the same strong password for all online accounts and that's not good. It's not recommended because hackers or other people on the dark web can hack into your accounts and steal your data. Option C states that you must make sure http: and an open padlock displays on the address bar. This means that your connection is insecure and people can track you down. Option D is a good thing to do but option A is the best option overall. It's the right step to take when making online purchases <3

5 0
3 years ago
Imagine the user types in a complete sentence, but we want to read only the first word and place it in the String variable word.
Vladimir [108]

Answer:

import java.util.Scanner;

public class FirstWord {

   public static void main(String[] args) {

       //NOW YOU WANT TO COLLECT INPUTS FROM THE STUDENT OR USER

       //IMPORT THE SCANNER CLASS FIRST  outside your class

       // THEN YOU CREATE AN OBJECT OF THE SCANNER CLASS

       Scanner input = new Scanner(System.in);

       

       //CREATE A VARIABLE TO HOLD THE USER INPUT

       String text = input.nextLine();

       

       //The variable holder will be used to store characters from the for loop

       String holder="";

       

       //Create a for loop that loops through the user's input

       for(int i=0; i<text.length(); i++){

           //As the loop increases, we get the character in the user's input and store them one by one in the variable holder

           holder+=text.charAt(i);

           if(text.charAt(i)==' '){

               //If the loop encounters a space, it means a complete word has been gotten from the user's input

               //Then the break below Breaks the loop, and the loop stops running

               break;

           }

       }

       System.out.println(holder);

}

Explanation:

text.length() returns the length of the sequence of characters present in length

text.charAt(a number) Returns the char value at the specified index. An index ranges from 0 to length() - 1. The first char value of the sequence is at index 0, the next at index 1, and so on, as for array indexing.

Create a for loop

How does a for loop work?

It collects a starting point, an end point and an increment respectively....all these are passed in as arguments into the for loop

For example, the code above starts from 0, calculates the number of characters in the user's input and sets it as the end point, the loop runs from zero to the length of the text of the user...

Note: i++ in the loop is the increment, it means the loop increases by 1

8 0
4 years ago
Other questions:
  • A computer that delivers requested web pages to your computer or mobile device is a(n) _____.
    6·1 answer
  • 1) ________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly
    5·1 answer
  • What do you need to know to access a website?
    10·2 answers
  • Which programming language should I learn in order to build basic websites? I'd like to learn how to make my own websites, just
    8·1 answer
  • Laura is using a rent to own store to purchase a computer valued at $1,000. She is paying $25 per week for 104 weeks(2 years). W
    13·1 answer
  • Draw a flowchart that ask the user to enter number: if the number is less than then 10 number it is doubled if the number is mor
    7·1 answer
  • What is the long tube on a microscope called​
    15·1 answer
  • A firm uses BitLocker for volume encryption. Normally, BitLocker performs its task well. However, an administrator was recently
    6·1 answer
  • What is the output of the following code?int *p; int *q; p = new int; *p = 43; q = p;*q = 52; p = new int; *p = 78; q = new int;
    5·1 answer
  • Kevin would like to ensure that his software runs on a platform that is able to expand and contract as needs change. Which one o
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!