1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
3 years ago
8

someone who protects valuable online information, like phone numbers and passwords would be considered​

Computers and Technology
1 answer:
charle [14.2K]3 years ago
6 0

Answer: i believe a digital citizen

i am not 100% sure about that answer but i reaserached a little and thats what i found :)

I hope this helps u out a little a thank and a brainlist would be greatly appreciatecd :)

You might be interested in
Write a program that asks the user for three strings. Then, print out whether the first string concatenated to the second string
zepelin [54]

Answer:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) throws Exception {

          Scanner myObj = new Scanner(System.in);

        //Request and receive first String

       System.out.println("Enter username");

       String firstString = myObj.nextLine();

       

       //Request and receive second string

       System.out.println("Enter second string");

       String secondString = myObj.nextLine();

       

         //Request and receive third string

       System.out.println("Enter third string");

       String thirdString = myObj.nextLine();

       //Concatenate the first and second string

       String concatA_B = firstString + secondString;

       

       if(concatA_B.equals(thirdString)){

           System.out.println("First String Concatenated to Second String is equals to the third String");

       }

       else{

            System.out.println("First String Concatenated to Second String is NOT equals to the third String");

       }

   }

}

Explanation:

  • Import Scanner Class
  • Request and Receive three variables from the user using the Scanner Class
  • Concatenate the first and second
  • Use the .equals() method to check for equality
5 0
2 years ago
Web definition what means web
yan [13]
A network of fine threads constructed by a spider from fluid secreted by its spinnerets, used to catch its prey.
7 0
3 years ago
Suppose you have one particular application that is trying to send data on the Internet but none of the data is making it to the
CaHeK987 [17]

Answer:

Firewall is blocking that application.

Explanation:

i got it right on the test and i hope yall have a great day :3

4 0
2 years ago
Read 2 more answers
Which one do we use to send signals as IR light waves?
Reika [66]

Answer:

ir sensor

Explanation:

4 0
2 years ago
4 types of system software
Elina [12.6K]
Operating systems.
Device drivers.
Middleware.
Utility software.
8 0
3 years ago
Read 2 more answers
Other questions:
  • In an inheritance situation, the new class that you create from an existing class is known as the:
    5·1 answer
  • How do you ask brainy a question without it not liking the question and saying it hurts their feelings?
    14·1 answer
  • The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future
    13·1 answer
  • Subana is writing a program which will calculate the mean average of a set of numbers by adding the numbers and dividing the res
    11·2 answers
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    9·1 answer
  • To display the Color gallery, with the graphic selected, click the Color button in the ____ group on the PICTURE TOOLS FORMAT ta
    14·1 answer
  • You are a database administrator. Chantelle comes to you asking for help on how to access all the data in one row of the databas
    11·1 answer
  • You are given a 5-letter word (for example, abcde). Write a C-Program which outputs all possible unique 5 letter permutations of
    13·1 answer
  • The TCP _____ is the amount of information that a machine can receive during a session and still be able to process the data.
    5·1 answer
  • The memory used by the CPU to temporarily hold data while processing is called _______. random access memory central processing
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!