1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
4 years ago
7

What is one way to maintain Internet safety? a) avoid interacting with people on the Internet. B) avoid giving out information a

bout where you live. C) share your passwords with only friends. D) always put your photograph on your web profile
Computers and Technology
1 answer:
Anarel [89]4 years ago
4 0
To be safe on the Internet, we must avoid giving out personal information.
You might be interested in
WHAT DO YOU KNOW?<br> Why would you want to change your Table<br> Properties?
joja [24]

read the slides ;  Table Properties are the way the table appears or looks.

6 0
3 years ago
What is a filter in excel (please keep your answer brief)
JulijaS [17]

Answer:

The Excel FILTER function "filters" a range of data based on supplied criteria. The result is an array of matching values the original range. When this array is the final result (i.e. the results are not handed off to another function) matching results will "spill" on to the worksheet.

Explanation:

3 0
3 years ago
Jenny needs to record the names of 30 students, write down the subjects they studied, and note grades in each subject after the
nevsk [136]
Mid semester and end semester. hope i helped
8 0
4 years ago
Read 2 more answers
A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection w
VashaNatasha [74]

Answer:

A. PRL

Explanation:

Mobile phone technologies like CDMA , GSM etc, are used by cell/ mobile phone to transmit and receive signals. With the limitation of fluctuation, a mobile phone was made to adapt to this problems, thereby combining this broadbands like CDMA, GSM,4G LTE etc gave rise to PRL (Preferred roaming list) database to hold information needed to establish connection to the correct cell tower for these broadbands.

3 0
4 years ago
U.S. cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate net
Triss [41]

Answer:

Organized crime syndicates based in the United State

Explanation:

U.S. cybersecurity experts and government officials are increasingly concerned about breaches from organized crime syndicate based in the United States into corporate networks, either through mobile devices or by other means.

The crime syndicate can go to any length to access corporate network through mobile device or any other means in order to commit crimes that is why the US cyber security expert and government officials are increasingly concerned.

Cyber security specialists or expert in the US are been employed to protect information or data that the crime syndicate may want to gain access to by using different variety of techniques by critically monitoring the systems network for attempted breaches by the crime syndicates and then dealing with any of them that is found guilty.

5 0
3 years ago
Other questions:
  • write the structure of an email message ques.2 what do you mean by search engine? write its component .ques. 3 what are the adva
    9·1 answer
  • Use C++:
    9·1 answer
  • Write a program that performs the following tasks: Display a friendly greeting to the user Prompt the user for the value to conv
    13·1 answer
  • Programs are normally stored in ________ and loaded into main memory as needed. the input device the output device secondary sto
    15·1 answer
  • Write a program that prompts the user to enter a number then counts the number of odd numbers and even numbers the user enter. T
    15·1 answer
  • Choose the words that make the following sentence true.<br> Primary memory is
    5·1 answer
  • Which of the following is needed to connect to the Internet? HELP ASAP
    9·1 answer
  • The router can deliver packets directly over interfaces 0 and 1 or it can forward packets to Routers R2, R3, or R4. Describe wha
    10·1 answer
  • What are real online jobs any one of any age can get pays weekly by Pay<br> Pal
    8·1 answer
  • how does the use of data abstraction manage complexity in program code? how does using lists make a program easier to develop an
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!