1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilia_Sergeevich [38]
3 years ago
8

You live "out in the middle of nowhere" and feel there is no need to protect your internet connection because there is no one th

at lives near you. one day you are unable to connect to the internet. after calling tech support you find that someone has hacked into your router and has changed all the settings. fortunately the hacker only wanted to use your internet connection and did not view any information on your computer. your decision to leave your router unprotected risked the integrity of the information on your computer. select yes or no.
Computers and Technology
1 answer:
dlinn [17]3 years ago
4 0
Yes, it put you at risk, and could have actually gotten you killed.
You might be interested in
Chapter 20 reading and vocab review
aev [14]

Answer:

Essentially additive editing and stringing “the good stuff” together, whereas subtractive is more about stringing all your raw footage together and “removing the bad stuff”

Additive editing feels confident and concerned with the pursuit of a specific, existing vision. And it’s faster. Subtractive editing feels like a deeper listening to what the footage is saying, and holding on to many potential permutations.

Explanation:

Addictive editing -  creating a program from raw footage by starting by starting with nothing and adding selected components

Subtraction editing  - creating a program by removing redundant or poor quality material from the original footage

7 0
2 years ago
Answer: x = 3<br>#1 -2x + 5 = -31​
OLga [1]
#1 answer:X=-18
Mdkdkkdkdkdkkdkdkdk
3 0
3 years ago
List and describe the five moral dimensions that are involved in political, social, and ethical issues. Which do you think will
lukranit [14]

The five moral dimensions are:

  • Information rights and obligations.
  • Property rights and obligations
  • System quality.
  • Quality of life,
  • Accountability and control.

I see that Quality of life is most difficult for society to deal with as there ae lots of rich and poor people and the government have not been able to bridge the gap between them.

<h3>What are the morals about?</h3>

The five main moral dimensions that are known to be written above are said to be tied together in regards to ethical, social, and political issues that are seen in any information society.

Therefore, The five moral dimensions are:

  • Information rights and obligations.
  • Property rights and obligations
  • System quality.
  • Quality of life,
  • Accountability and control.

Learn more about moral dimensions from

brainly.com/question/15130761

#SPJ1

3 0
2 years ago
What effect can camera tilt create? Do you think this is effective? Why or why not?
Naily [24]
<span>Camera tilt can help you capture more of your subject in vertical terms, this can be effective when you do portraits, but sometimes ineffective when doing landscape.

Hope this helps!</span>
7 0
3 years ago
Read 2 more answers
Tuklasin<br>awain 2: Grapiko ng Pananagutan<br>Isulat sa graphic organizer pa​
mrs_skeptik [129]
What are you saying????
7 0
3 years ago
Other questions:
  • When you ____ a method, you write multiple methods with a shared name but different parameter lists?
    10·1 answer
  • He primary purpose for attackers to send port scanning probes to hosts is to identify which ports are open. true false
    5·1 answer
  • The domain in an email message tells you what?
    11·1 answer
  • Each of the major DBMS products changes quite rapidly, and keeping DBMS software up-to-date can be a difficult task. As a DBA, w
    14·1 answer
  • 3. The channel bit error rate is 0.00001, and each packet’s total length is 1024 bytes including all overheads. Assume there are
    12·2 answers
  • Which encryption standard goes with the WPA2 protocol?<br> AES<br> DES<br> TKIP<br> WPS
    15·1 answer
  • You wrote a program to allow the user to guess a number. Complete the code to generate a random integer from one to 10.
    8·2 answers
  • What's a website layout
    15·2 answers
  • A numeric literal that is written with a decimal point is called a ________. real number floating-point value decimal literal do
    6·1 answer
  • Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain control
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!