Answer:
B: Avoid Sharing Photos
Explanation:
If you send a photo to a person, you need to be very careful not to send something that can give your information away, this includes but it not limited to Pictures of your town, Pictures of You, Pictures of Friends, Pictures of Family, etc.
Hope I could help!!
Answer:
//""Print results to screen""
Explanation:
In c,c++,java,javascript // is used for the single line comment.
syntax:- // comment.
Whatever text that is followed after // is commented means this line will not get executed by the compiler.
Comments are used to explain the code to other person who is working on the code or trying to understand that code.
Answer:
Check the explanation
Explanation:
223.1.17/24 indicates that out of 32-bits of IP address 24 bits have been assigned as subnet part and 8 bits for host id.
The binary representation of 223.1.17 is 11011111 00000001 00010001 00000000
Given that, subnet 1 has 63 interfaces. To represent 63 interfaces, we need 6 bits (64 = 26)
So its addresses can be from 223.1.17.0/26 to 223.1.17.62/26
Subnet 2 has 95 interfaces. 95 interfaces can be accommodated using 7 bits up to 127 host addresses can represented using 7 bits (127 = 27)
and hence, the addresses may be from 223.1.17.63/25 to 223.1.17.157/25
Subnet 3 has 16 interfaces. 4 bits are needed for 16 interfaces (16 = 24)
So the network addresses may range from 223.1.17.158/28 to 223.1.17.173/28
The digital living alliance network is a set of guidelines to share digital media among wired and wireless multimedia devices.
<h3>What is the digital living alliance network?</h3>
The Digital Living Network Alliance is a trade association that establishes rules and practices for home network equipment, incorporating computers, smartphones, etc.
It is a set of guidelines to share digital media among wired and wireless multimedia devices.
Learn more about digital on:
brainly.com/question/23749502
#SPJ12
Answer:
Phishing
Explanation:
Phishing = Link to a site, usually a fake replica of a legitimate site but with added implements that can be used to spy on you (how people become victims of identity theft