1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
4 years ago
8

What is one way to maintain Internet safety

Computers and Technology
2 answers:
EleoNora [17]4 years ago
6 0
Dont give out any personal information such as your birthday, your address, how old you are, and passwords to any accounts that you have.

Furkat [3]4 years ago
5 0
To be safe on the Internet, we must avoid giving out personal information.
You might be interested in
A disk has 4000 cylinders, each with 8 tracks of 512 blocks. A seek takes 1 msec per cylinder moved. If no attempt is made to pu
shutvik [7]

Answer:

The answer is below

Explanation:

a)

If the blocks of a file are not put together, that is for nonadjacent block of files to each other, the time (t) taken to read a 100 block file is:

t = (average seek + rotational latency + transfer time) * 100 block

Average seek = 5 msec, rotational latency = 10 msec and transfer time = 20 microsec = 0.02 msec

t = (5 + 10 + 0.02) * 100 = 1502 msec

b)

If the blocks of a file are put together, that is for adjacent block of files to each other, the time (t) taken to read a 100 block file is:

t = (seek time * mean interblock distance + rotational latency + transfer time) * 100 block

seek time = 100 microsec = 0.1 msec, rotational latency = 10 msec and transfer time = 20 microsec = 0.02 msec, mean interblock distance = 2 cylinders

t = (0.1*2 + 10 + 0.02) * 100 = 1022 msec

3 0
3 years ago
Pig Latin is a nonsense language. To create a word in pig Latin, you remove the first letter and then add the first letter and "
LUCKY_DIMON [66]

Answer:

Hi there  Sandrathompson5661!  

Using Java as the language for implementation, the PigLatin translation program can simply be coded as shown below. The program uses the Scanner module in java utils package to prompt the user for input of word(s) and splits the input with any of the matching delimiters. The rule to swap the first character and append it to the end with an “ay” for a normal word, or the appending of “yay” for a vowel word, is then applied. The result is printed on the screen before the program exits.

Explanation:

import java.util.Scanner;

public class PigLatin {    

 public static void main(String[] args)     {        

   char[] delimiterChars = { ' ', ',', '.', ':', ';', '\t' };        

   String[] words_array;        

   Scanner words = new Scanner(System.in);        

   System.out.println("Please enter a word (for multiple words use any of the following delimiters {' ', ',', '.', ':', ';', '\t' }): ");        

   String input_words = words.nextLine();        

   words_array = input_words.split("[,\\s\\-:.;' '\\\t]");  

   System.out.println("PigLatin translation: ");        

   for (int i=0; i<words_array.length; i++) {

     System.out.println(makePigLatin(words_array[i]));        

   }    

 }      

 public static String makePigLatin(String word)     {        

    String vowels = "aeiou";        

    if (vowels.indexOf(Character.toLowerCase(word.charAt(0))) != -1) {          

       word = word + "yay";        

    }        

    else {          

       word = word.substring(1, word.length()) + word.charAt(0) + "ay";        

    }        

    return word;      

 }

}

7 0
3 years ago
I recently made this so I won't mind if you look at it: https://scratch.mit.edu/projects/594493248
SVETLANKA909090 [29]

Answer:

Its really good just make it so you can reload faster because the zombies keep catching up :)

Explanation:

8 0
3 years ago
When you send an echo request message with the ping program, a successful attempt will return a(n) ______ message.
svlad2 [7]

Answer:

echo reply

Explanation:

It is a test that a user performs to confirm that remote system is up and running on the network. This is needed when basic connectivity failure problem appears. Internet Control Message Protocol  renders 2 messages for this service which are Echo Request and Echo Reply. Echo Request is a request sent to a destination device. This system acknowledges with an Echo Reply message. Echo request is generated by destination system with PING program. Ping program is used for testing basic connectivity. An echo reply is sent by target system to the requesting system acknowledging that the echo request has been received.

3 0
4 years ago
Which type of device log contains the most beneficial security data?
zhuklara [117]
The security Log is your Answer.
6 0
3 years ago
Other questions:
  • If a program repeatedly shows separate feature branches rather than a true System Demo, which practice should be reviewed to add
    5·1 answer
  • "which programming language is used within html documents to trigger interactive features?"
    10·1 answer
  • If you're able to understand directions more easily when you hear them instead of reading them you are most likely
    12·1 answer
  • The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understandA.
    11·1 answer
  • How many times will the while loop that follows be executed? var months = 5; var i = 1; while (i &lt; months) { futureValue = fu
    12·1 answer
  • 50) Universal Containers has an integration that runs nightly to update the Product (Product2) object in Salesforce with updated
    9·1 answer
  • Why might you receive a tax refund from the irs
    6·1 answer
  • Write a program that calculates the average of 4 temperatures. Function 1--write a function to ask a user for 4 temperatures and
    10·1 answer
  • Select the correct answer.
    8·1 answer
  • A(n) ________ is a way of retrieving information from one or more tables that defines a particular subset of data.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!