1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
3 years ago
12

It is safe to tell an online acquaintance (someone you have never met in person) your

Computers and Technology
2 answers:
Anna [14]3 years ago
7 0
It is safe to give out information that the other user can't use to track you. Generally, these include favorite music, favorite bans, hobbies.

It is never safe to give our personal and identifying information about yourself. This includes your full name (in most cases), place of residence, or any other contact information you may have - such as social media information.

D. Favorite music
Stolb23 [73]3 years ago
4 0
Hi!

The correct answer is D. <span>Favorite music 

You never want to share any sensitive personal information to anyone online especially to someone you don't know. Doing so can lead to your identity being stolen and used in ways which can be harmful to you or someone else.</span>
You might be interested in
Which of the following resources can be used by an OS to communicate with hardware? (Select 2)
faust18 [17]

Answer: Device drivers and system BIOS

Explanation:

The device drivers and the system BIOS are the resources that can be use by the operating system to communicate with the hardware.

Device drivers basically provide the software interface to the hardware devices and enable the operating system and many type of program to access the different hardware functions.

BIOS stand for the basic input and output system and it basically provide the link between the software and the hardware in the system. Technically the BIOS refers to the set of the device drivers in the computer system.  

3 0
3 years ago
Which option allows users to access the handout master to modify it?
Colt1911 [192]

Answer:

in the school store

Explanation:

4 0
3 years ago
I need like 10 sentences to delineate and discuss societal issues related to computing . “Including the guiding principles of pr
beks73 [17]

Answer:

Kindly check Explanation

Explanation:

Advancement in technology spurred largely due to the advent of the computer and internet has resulted in a notable change in the behavior, lifestyle and engagement of many individuals. This include ; providing a faster and more convenient way of computing and completing tasks. Accelerating the global rate of technological development due to great computing capabilities. Educational enhancement and development through online education.

Computing also pose some societal issues which needs to addressed. This include :

Issues regarding privacy and identity theft are widespread. Addiction to games and other engaging content often pose distraction to youth and child development. Computing could be said to have placed increased pressure on human power and engagement with the advent of automated robots and programs. Increased exposure to electromagnetic rays. Promotion of indecency and immoral contents has become increasingly easier. Peer influence through fake promotion and display of wealth by some overrated individuals.

Therefore, it is imperative that informations conveyed through the internet are treated with utmost confidentiality in other to avoid privacy issues which may arise from leakage.

8 0
4 years ago
"When analyzing the IDS logs, the system administrator notices connections from outside of the LAN have been sending packets whe
lakkis [162]

This is false negative. To be marked for alert.

<u>Explanation:</u>

The network administrator or network engineer when he or she is analyzing IDS logs and founded the ip address is same on source and destination both in outside side.

So the either TCPIP address has to change to be scanned across the network. Since same IP address is same pinging rate will high and pinging the same workstation or desktop or laptop.

Alert will not generate because both tcpip address same and if pinging is success.  Ids logs generates based true negative, true positive and false positive will not generate any alert.

5 0
4 years ago
Add the following line of code to the end of your script, replacing any function calls: nested_sum( eval(input()) )
masha68 [24]

The program is an illustration of loops; Loops are program statements used for repetition of operations

<h3>How to complete the code?</h3>

The complete question is added as an attachment

The code written in Python that completes the missing parameters in the question are:

def nested_sum(mylist):

   total = 0

   for other_list in mylist:

       total += sum(other_list)        

   print(total)

   

t = [[1,2],[3],[4,5,6]]

nested_sum(t)

nested_sum( eval(input()))

Read more about loops at:

brainly.com/question/24833629

#SPJ11

8 0
2 years ago
Other questions:
  • Some touch screens recognize when you touch the screen with two fingers or two hands. If you are looking for a device on which y
    11·1 answer
  • Package hw1;
    10·1 answer
  • Which of the following would you not see on a windows 10 start menu?
    6·1 answer
  • How do productivity programs most benefit the way we work and live?
    12·2 answers
  • Explain why you will do these particular things when driving.
    11·1 answer
  • Write a program that prompts the user to enter three cities and displays them in ascending order. Here is a sample run: Enter th
    8·1 answer
  • How to delete the last element in array
    15·1 answer
  • . What is piracy? ???????????????????​
    5·1 answer
  • Help me guys plssssss​
    10·1 answer
  • Need help with this one​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!