1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrrafil [7]
3 years ago
5

What concerns do you need to have with individuals hacking your information, computer, personal devices, and car? How can you pr

otect these?
Computers and Technology
1 answer:
jeka57 [31]3 years ago
3 0

Explanation:

When you break into your computer, when you kept them at your home, you can use all private data and passwords. These data provide them with an opportunity to burden you with doing things you don't want to do. Within one day you can go bankrupt.

Following are the precautions to be taken:

  • Regular update of software-helps to patch the last vulnerabilities.
  • Keep the password of your computer secure and never share it with anybody who may be excluding your kids.
  • Doesn’t jail break your computer or root it. Although this can improve the device's efficiency, it is a profuse basis for hackers that do not use other built-in defenses. This is something people often do.
  • Use trusted sites to download the software.
You might be interested in
3.A ball is thrown into the air with an initial velocity of 15 m/s. a.How long does it take the ball to reach maximum height?b.W
ehidna [41]

Answer:  a) = 1.5 sec.  b= 11.5 m. c=0  d= 1.5 sec.

Explanation:

a) Once thrown into the air , the only influence on the ball is gravity, so, we can conclude that the acceleration acting on the ball is the one due to gravity, i.e., g= 9.8 m/sec².

Applying the definition of acceleration, we can write the following equation:

a= (vf-vo) / t   ⇒ g = vf-vo / t. (1)

Now, when the ball reaches to his maximum height, it stops momentarily, and then starts to fall, so for this height, we can write vf=0.

Replacing  in (1), and solving for t, we get:

t = (0 -vo) / g = -15 m/s/ - 9.8 m/sec² (Taking upward as positive  direction)

a) t= 1.5 sec.

Replacing this value in the kinematic equation for displacement, when vo=15 m/s, we get:

hmax: 15 m/sec . 1.5 sec -1/2. 9.8 m/sec². (1.5 sec) ² (2)

b) hmax= 11.5 m

c) vf= 0 (as explained above)

Finally, in order to know how long the ball takes to return to its initial height, we know that for the falling part of the trajectory, vo=0, so we can write the equation for displacement as follows:

h=-hmax (because it returns to the same starting point)= 1/2 gt²=-11.5 m

Solving for t, we get:

d) t=1.5 sec.

It can be seen that the time used in going up, it is the same for going down, to travel the same distance.

This result is completely general and applies to any free fall problem.

3 0
3 years ago
Bargain Bob's auto dealership sells vehicles. He sells Chrysler, Jeep, and Dodge brand vehicles. He tracks customer and manufact
marusya05 [52]

Answer:

Customer(1) - (1) Vehicle.

Explanation:

Cardinality is the mapping of entities or group of entities to a cardinal value. It tries to show the relationship between two objects like a cups in a shelf or plates in racks.

The car dealer in the question, sells one car to a customer and keep or prioritise the record of the main owner of the acquired vehicle. So the maximum cardinality assignment of the customer and vehicle is one (1) to one (1) mapping.

6 0
3 years ago
Print ___________ command is used for adding numbers.​
quester [9]

Answer:

phyton is the answer....

5 0
3 years ago
Which of the following statements are true?
Mamont248 [21]

Answer:

The answer is: c. Adding external CSS is a good practice for various reasons, including code organization.

Explanation:

External CSS improves maintainability in code.  

Internal CSS has precedence over external CSS, it means that internal will overwrite external CSS, but abuse of internal CSS  often makes hard to maintain HTML code on a large website.

Furthermore, it is much easier to modify one CSS(external) file that can impact multiple web pages than go into every HTML page and modify your styles per page. Many sites have hundred or more pages, go through each one wouldn't be productive.

3 0
3 years ago
To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Mod
oksano4ka [1.4K]

Answer:

Deny

Explanation:

Under the New Technology System, the Deny permission is applied when the administrator wants to overrule the permission given to members of a group. The Allow and Deny options help in regulating access to the components of the system. Only authorized groups are granted access to the files.

Most times, the Deny permission is considered before the Allow permission. If the user is denied access to some files and granted access to some, the deny permission is most times considered first.

4 0
3 years ago
Other questions:
  • Consider a file system that uses inodes to represent files. Disk blocks are 2KB in size and a pointer to a disk block requires 4
    13·1 answer
  • The ____ function sums the numbers in the specified range and then divides the sum by the number of cells with numeric values in
    14·1 answer
  • Which of the following things must you do if you are parked on a rural highway?
    8·1 answer
  • Although “dog.jpg” and “dog.JPG” and “Dog.jpg” and “DOG.JPG” all appear to be the same file, they are not considered the same wh
    6·1 answer
  • An electronic storage file where information is kept is called a cpu. true false
    11·1 answer
  • (01.05 LC)
    7·2 answers
  • Project Description:
    8·1 answer
  • Question 1(Multiple Choice Worth 5 points)
    9·2 answers
  • What is the difference between php and html?​
    13·2 answers
  • What is the meaning of s used in 0 and 1 in computer .​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!