1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill [66]
3 years ago
15

Jana keeps receiving friend requests from strangers on a social media site. This is making her uncomfortable.

Computers and Technology
2 answers:
Hoochie [10]3 years ago
7 0

Answer:

She should talk about it with a trusted adult.

Explanation:

valentina_108 [34]3 years ago
3 0

Answer:

She should talk about it with a trusted adult.

Explanation:

Social media sites are great but they can be used by evil people to help them to commit crimes. So, if you are a minor and strangers try to contact you, ask you for personal information, videos or photos; it's recommended that talk about it with a trusted adult before accept stranger's requests.

You might be interested in
A technician is troubleshooting a small network with cable Internet service in which a user is receiving a message in her web br
expeople1 [14]

Answer:

Option E is correct.

Explanation:

A professional is fixing a cable internet access network by which a person in their internet browser receives a text saying that a link could not be reached. It would be known that each and every server along the network is having the individual problem across whole websites when interviewing a person.

So, connect the system to the wired connection directly, & try to access the internet for troubleshooting the following issue.

6 0
3 years ago
Which formula is a simple formula?<br> O =E10/5+1<br> 0 -5+A1*B1<br> O =C3+10-E3<br> 0 =10-(A3-D13)
steposvetlana [31]

Answer:

O =C3+10-E3

Explanation:

Only addition and subtraction :D

8 0
2 years ago
20<br>Calculate the kinette energy of a body the speed<br>that will be a mass tragm​
jolli1 [7]

Answer:

20

Explanation:

4 0
3 years ago
__________ states that network connection speeds for high-end users will increase by 50 percent per year, enabling new companies
Liula [17]

Answer:

Nielsens law

Explanation:

4 0
1 year ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Other questions:
  • Pollution or waste that is generated from a business is called a
    6·2 answers
  • The equipment that processes data in order to create information is called the _______.
    8·2 answers
  • PLEASE HELP ASAP!!!
    15·2 answers
  • The largest group of Linux users is likely to be
    7·1 answer
  • .The __________ comes in handy when I'm using Microsoft Word to type an essay with a specific word number requirement
    6·1 answer
  • Here is a list of storage devices:
    5·1 answer
  • The concept of "plug and play" is demonstrated by which of the following<br> scenarios?
    13·1 answer
  • HELP FAST PLS<br> Do you care more about avoiding fees/costs, accumulating perks, convenience, etc?
    14·2 answers
  • Question #7
    11·1 answer
  • The concepts of ________________, _________________, and _________________ for covert acts are pivotal to understanding state-on
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!