1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tasya [4]
3 years ago
6

Every time I try to look up anything on my laptop it keeps saying my connection is not priavte what do I do

Computers and Technology
2 answers:
Simora [160]3 years ago
8 0

You have a man in the middle listening to your traffic. It may be an unwanted proxy server. This is exactly why there are HTTPS sites, to warn you against this.

To check for a proxy, hit Windowskey-R (Run) and type control inetcpl.cpl,,4 (exactly like that) then hit enter.

In the Internet Properties window that pops up, click "LAN settings". In the popup, make sure all three checkboxes are cleared, especially the one for "Proxy server".

Hope this helps.

dangina [55]3 years ago
6 0

You can click "Advanced" and still proceed to the website.


Please mark this answer as the Brainliest! Thank you :)




You might be interested in
____ is another term for document properties.
MArishka [77]
Metadata is the other term for document properties. It is a data that describes another data. The word “meta” means “an underlying definition or description”. Traditionally, it was used in libraries as card catalogs. In digitals, metadata is also used to describe digital data. 
3 0
3 years ago
You started writing a paper yesterday. You worked on it again today. After a few hours, you realized that you have introduced so
mihalych1998 [28]

Answer:

I think it is manage document.

Explanation:

managing helps us to organize things and write things with ease.

3 0
3 years ago
Read 2 more answers
which program monitors the computer by looking for known trouble makers as well as suspicious behavior​
lys-0071 [83]

Answer:

i think spyware because spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers.

Explanation:

3 0
3 years ago
Given this method comment, fill in the blank in the method implementation. /* Deposits money into the bank account amount: the a
DIA [1.3K]

Answer:

"void" is the correct answer for the given question.

Explanation:

In the function body the value of balance variable is not return that means we use void return type .The void return type is used when the function does not return any value .

If the function are  int return type that means it return "integer value ".

if the function are  double return type that means it return the "double value" .

The complete implementation of this method is

public void deposit(double amount) // function definition  

{

balance = balance + amount; // statement

}

3 0
3 years ago
A digital system has been developed to measure temperatures in the range -10˚C to 100˚C. If the accuracy of the system is such t
8090 [49]

If you have 10 bits available then you can interpret any number in range [0,2^{10}-1]=[0,1023].

The system therefore could represent the actual temperature of 39°C.

Hope this helps.

7 0
3 years ago
Other questions:
  • Choosing firm goals for your business
    7·2 answers
  • You can click a web page title on the _____ list to return to that page.
    10·1 answer
  • Which of these browsers was the first widely adopted?
    12·1 answer
  • Kuta software infinite pre- algebra multiplying polynomial and a monomial find product answer key
    14·1 answer
  • Write a function chat accepts a pointer to a C-string as its argument. The function should count the number of vowels appearing
    5·1 answer
  • Assume you previously entered these lines of code.
    14·2 answers
  • Choose two browsers and compare their security features.
    5·1 answer
  • What software maintain and increase the efficiency of a computer system?
    12·1 answer
  • What are the main dimensions of information system and their components
    13·1 answer
  • Which educational qualification would help a candidate get a job as a computer systems engineer?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!