1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
myrzilka [38]
4 years ago
12

Having the most up-to-date web browser can: A Increase your browser speedB Allow you to view the most up-to-date version of webs

itesC Increase your online securityD All of the above
Computers and Technology
1 answer:
professor190 [17]4 years ago
3 0
The answer is D: All of the above
You might be interested in
Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la
nirvana33 [79]

Answer:

SO-DIMM DDR3

Explanation:

Based on the information provided within the question it can be said that the module that Jenny needs to order is known as SO-DIMM DDR3. This is the type of module that would work on her laptop computer. DDR3 is the most common generation of these RAM modules and SO-DIMM are rams that support 72, 100, 144, or 204 pins and is alot smaller than regular DIMM modules, coming in at about 3 inches.

8 0
3 years ago
A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data i
erastovalidia [21]

Answer:

def encrypt_digit(digit):

   if type(digit) is int or float:

       digit = str(digit)

   hold = list()

   for x in digit:

       d = str((int(x) + 3)%10)

       hold.append(d)

   first = hold.pop(0)

   second = hold.pop(0)

   third = hold.pop(0)

   fourth = hold.pop()

   print(int("".join([third,fourth, first, second])))

encrypt_digit(7836)

Explanation:

The python function accepts a four-digit parameter which represents the data transmitted over the company's telephone network. The function encrypts the data by adding 3 to each digit and getting the modulus of division 10, then the digits are swapped and printed out encrypted and ready for transmission.

6 0
3 years ago
A firewall, when properly implemented, can prevent most attacks on your system.
Verizon [17]
This is true, A firewall is used to get rid of viruses and attackers and keep them out of your computer. But if not properly implemented can do next to nothing for you.
5 0
4 years ago
Read 2 more answers
(10 points) [Edhesive] 3.6 Code Practice
Digiron [165]

Answer:

  • You need to create a variable outside (before) the input loop.
  • You need a variable inside your loop that temporarily holds the user input.
  • In your loop, you will compare if the variable outside the loop is greater than (or less than) the new user input.

I don't know what program language you are using, but I will use python since it's easy to read and you will get the idea if you're using a different programming language.

<u>Code (Python)</u>

largestnum = 0

for x in range(6): <em>#loops 6 times</em>

   newnum = int(input("Enter a number: ")) #ask user for input & converts to int.

   if newnum > largestnum: <em>#if new number is greater than largest num </em>

     largestnum = newnum     <em>#make it the largest number</em>

<em>    </em>print("Largest:", largestnum)

The reason why you need a variable outside of the loop is because after the loop is done all variables inside the loop are trashed and can no longer be accessed outside of the loop.

3 0
4 years ago
you are considering cloud services, and you concerned about the interaction of your security policies and those of the hosting p
Romashka-Z-Leto [24]

Answer:

Cloud access security brokers

Explanation:

Cloud access security brokers (CASBs) can alleviate your concern. This is a software that is between cloud service users and cloud applications. Monitoring every activity and ensuring security protocols.

It does the work of merging the security policies of users and that of the providers. Across cloud platforms, the CASB can help to identify unsanctioned use.

7 0
3 years ago
Other questions:
  • A persons decision to take action without being asked is
    9·1 answer
  • System requirements that are important in determining if a software program will work on a computer are ____.
    8·1 answer
  • What is the accounting equation?
    12·1 answer
  • A ________ is a container that provides quick access to elements at the front and the back of the list
    6·1 answer
  • A special symbol that is used as an underlining structure to an agenda
    5·1 answer
  • Explain with a few sentences and using the terms sequencing, selections and loops how they
    9·1 answer
  • Select the true statement from the choices below. Group of answer choices Invalid code may cause browsers to render the pages sl
    11·1 answer
  • Which component is a part of the CPU of a computer
    12·2 answers
  • Given the following class: Create a class MyGenerator that can be used in the below main method.
    8·1 answer
  • Convert Octal 623, to Decimal number ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!