1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
devlian [24]
3 years ago
6

Which term is used to mean the methods of a predator uses to befriend youth online?

Computers and Technology
2 answers:
sammy [17]3 years ago
6 0
Pretty sure its called the grooming process

IceJOKER [234]3 years ago
3 0

Sorry I didn't get to you first but the answer is

D) Grooming method


You might be interested in
P16 Consider the following network. ISP B provides national backbone service to regional ISP A. ISP C provides national backbone
Art [367]

Solution :

Considering the following data :

$\text{ISP B}$ provides the national backbone to the regional $\text{ISP A}$.

$\text{ISP C}$ provides the national backbone to the regional $\text{ISP D}$.

Each of the ISP consists of one autonomous systems (AS).

$\text{ISP B}$ would like to hand over the traffic of C through the $\text{West}$ Coast.

The $\text{ISP C}$ would like to receive traffic from B's peering point via East Coast.

One way for $C$ to force $B$ to hand over all of $B$’s traffic to $D$ on the east coast is for $C$ to  only advertise its route to $D$ via its east coast peering point with $C$.

7 0
3 years ago
Escribe dos diferencias entre las computadoras de la primera y la sexta generacion me pueden ayudar​
Hatshy [7]

Answer:

.N. Generación & Descripción

1

Primera Generación

El período de primera generación: 1946-1959. Base del tubo de vacío.

2

Segunda Generación

El período de la segunda generación: 1959-1965. Base del Transistor

3

Tercera generación

El período de tercera generación: 1965-1971. Circuito integrado de base.

4

Cuarta Generación

El período de cuarta generación: 1971-1980. Base del Microprocesador VLSI.

5

Quinta Generación

El período de la quinta generación: 1980 en adelante. Base del Microprocesador ULSI.

Explanation:

espero y esto te sirva de algo

3 0
3 years ago
There are 2048bytes in4megabytes true or false​
ollegr [7]

Answer:

Explanation:

bonjour,

1 MB =  1 000 000 B (bytes)

4 MB = 4 000 000B

=> false

5 0
3 years ago
A degree-constrained minimum spanning tree is a minimum spanning tree (MST) where the maximum vertex degree is limited to a cert
Bingel [31]

Answer:

A spanning tree is a subset of Graph G, which has all the vertices covered with minimum possible number of edges. Hence, a spanning tree does not have cycles and it cannot be disconnected..

By this definition, we can draw a conclusion that every connected and undirected Graph G has at least one spanning tree. A disconnected graph does not have any spanning tree, as it cannot be spanned to all its vertices.

Spanning Trees

We found three spanning trees off one complete graph. A complete undirected graph can have maximum nn-2 number of spanning trees, where n is the number of nodes. In the above addressed example, n is 3, hence 33−2 = 3 spanning trees are possible.

General Properties of Spanning Tree

We now understand that one graph can have more than one spanning tree. Following are a few properties of the spanning tree connected to graph G −

A connected graph G can have more than one spanning tree.

All possible spanning trees of graph G, have the same number of edges and vertices.

The spanning tree does not have any cycle (loops).

Removing one edge from the spanning tree will make the graph disconnected, i.e. the spanning tree is minimally connected.

Adding one edge to the spanning tree will create a circuit or loop, i.e. the spanning tree is maximally acyclic.

Explanation:

8 0
3 years ago
This standard library function returns a random floating-point number in the range of 0.0 up to 1.0 (but not including 1.0).
natulia [17]

Answer:

The answer would be A: Random

Explanation:

The random() function returns a generated random number (a pseudorandom number)

5 0
3 years ago
Other questions:
  • Marie uses a browser to visit a blog. What is the unique identifier of the blog? A. web page B. website C. web address D. email
    7·2 answers
  • Which measure should you take for the periodic maintenance of your computer?
    15·2 answers
  • ………………….. is the process of causing a system variable to conform to some desired value. Options Control feedback Design none of
    9·1 answer
  • What information medium is used to access information from the Internet in the form of HTML pages?
    12·1 answer
  • What two programming systems uses numbers and text?
    6·1 answer
  • To plan a pizza party, one may want to order enough pizza for everyone. Use the slicesPerPizza, slicesPerGuest, and totalGuests
    11·1 answer
  • Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down
    13·1 answer
  • When you first open a word processor, you’ll find a ? document. A. filled B. blank C. edited
    9·2 answers
  • A specialized output device for producing charts, maps, and very high-quality drawings is
    5·1 answer
  • Lance is at a bus station. his friend is using the atm machine to withdraw some money. lance notices a stranger deceptively watc
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!