1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pav-90 [236]
4 years ago
14

If you get musicilly can your parents see

Computers and Technology
2 answers:
steposvetlana [31]4 years ago
8 0
They can only see if you use their Apple ID you could create one if you want your parents to not see
Tresset [83]4 years ago
6 0
I wouldn't think so unless they have access to your phone or account. But I don't believe this is school related.
You might be interested in
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
netineya [11]

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

7 0
3 years ago
public class Questions { public static void main(String[] args) { System.out.print("Here "); System.out.println("There " "Everyw
In-s [12.5K]

Answer:

The output of this code can be given as follows:

Output:

Here There Everywhere

But notin Texas

Explanation:

In the give java code a class "Questions" is defined inside this class the main method is defined in the main method we use three print function that can be described as follows:

  • In the first print function, we print the message that is "Here".
  • In the second and third print function, we use println that print data or message in the next line that is "There Everywhere" and in the next line  "But not" and "in Texas".
6 0
3 years ago
What kind of software would you recommend a company use if its employees are receiving e-mails that are potentially hazardous ?
scZoUnD [109]

Answer:

Microsoft project

Explanation:

I'm smart

6 0
3 years ago
A more efficient design which involves the logical separation of a switch ports into different broadcast domains is known as a _
Nataly [62]

Answer: Virtual local-area network (VLAN)

Explanation:Virtual LAN(local area network) is the network that works on the particular geographical environment/domain in separative way by pretending to be working in the same local area.

This network works to maintain the security and network management in the geographical area .It is implement to gain the scalability and adaptability to the changes occurring in the network.

3 0
3 years ago
What Are the Various Broadband Internet Connections? *​
ra1l [238]

Answer:

This is your answer

4 0
3 years ago
Read 2 more answers
Other questions:
  • 11.
    11·1 answer
  • The programming interface between an application program and the dbms is usually provided by the
    13·1 answer
  • Sarah is creating and formatting a newsletter for her school. Which page layout rules should she consider when doing this?
    13·2 answers
  • Escribe, en los siguientes cuadros, los conceptos que correspondan
    10·1 answer
  • What's another word for contact print?
    15·2 answers
  • Which method will return the first element in an ArrayList employees?
    5·1 answer
  • The first and second numbers in the Fibonacci sequence are both 1. After that, each subsequent number is the sum of the two prec
    6·1 answer
  • Please help me idk I suck at this stuff ​
    13·1 answer
  • what is one category of software mentioned in the unit materials as being example of groupware English technical
    15·1 answer
  • What changes could you make so that a message, "User input deemed invalid." during designing a simple calculator program for you
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!