1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
3 years ago
8

someone who protects valuable online information, like phone numbers and passwords would be considered​

Computers and Technology
1 answer:
charle [14.2K]3 years ago
6 0

Answer: i believe a digital citizen

i am not 100% sure about that answer but i reaserached a little and thats what i found :)

I hope this helps u out a little a thank and a brainlist would be greatly appreciatecd :)

You might be interested in
Anyone know how to fix this
gizmo_the_mogwai [7]

Put the mouse at the top of the black part and click and hold down, and then drag it down to the bottom. And don't feel embarrassed to ask somebody lol

3 0
3 years ago
Which is a subclass indicating the extent of physiological decompensation or organ system loss of function that was added to eac
stepladder [879]

The subclass indicating the extent of physiological decompensation is known to be the severity of illness.

<h3>What is psychological decompensation?</h3>

“Decompensation” is known to be a term that is often used in mental health professionals to tell about an episodes where a person's existing mental-health or psychiatric disorder is going down.

Note that The subclass indicating the extent of physiological decompensation is known to be the severity of illness.

Learn more about  physiological decompensation  from

brainly.com/question/8339958

#SPJ1

5 0
2 years ago
Andy accidentally saved a file in the wrong folder. What is the quickest way to move the file?
Degger [83]
C. is the easiest but if you dont know how to do it chose B
6 0
3 years ago
Create and code a program that uses three parallel numeric arrays of size 7. The program searches one of the arrays and then dis
Keith_Richards [23]

Answer:

Using C++, the  generated from the algorithm created in the explanation box is here by attached to this answer.

Explanation:  

To create the program, you need to analyse and design a solution before coding.  

Problem Analyses:

  • Input-The program requires the user to enter the part number to be searched and also a control number(sentinel) to allow user to continue searching. Therefor, 2 inputs are required.
  • Output-The program will display at least the part number entered, the corresponding price and quantity as the final output.
  • Process-The process that will convert the input to output will involve creating the 3 required array to store part numbers, price and quantity. There after, a search will be performed on the part number array to match and retrieve the corresponding price and quantity from their respective arrays.

Pseudo code

  • Initialize variables and the 3 arrays:run,value,i,partnum[],price[],quantity[],size
  • While run remains 'c'
  • Get value
  • Open for loop
  • If value is same as array index i
  • Print part number,price and quantity
  • Break from for loop
  • end if
  • Else if at the end of the search there is no value matching any part number
  • print not available      
  • Break
  • End esle if        
  • Update run                
  • End while
  • End program
Download pdf
5 0
3 years ago
Given a variable n refers to a positive int value, use two additional variables, k and total to write a for loop to compute the
maksim [4K]
You could do it like this (example for n=5).

int n = 5;
int total = 0;
for (int k = 1; k <= n; k++) total += k*k*k;

5 0
3 years ago
Other questions:
  • Password procedures, information encryption software, and firewalls are examples of measures taken to address:
    13·1 answer
  • 6. Which hypothesis about the fate of the universe says that it will expand continuously as the galaxies drift far apart and all
    7·1 answer
  • You manage an NLB cluster composed of three servers: Server1, Server2 and Server3. Your maintenance schedule indicates that Serv
    15·1 answer
  • Given that two int variables, total and amount, have been declared, write a sequence of statements that: initializes total to 0
    14·1 answer
  • Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages
    11·1 answer
  • If the list above is named list1 and is implemented as a list, whatstatement would you use to find the number ofelements?list1.s
    9·1 answer
  • How does the text recommend that a company operate if it wants to be successful in the information age?
    11·1 answer
  • Which of the following payment types require you to pay upfront?
    9·1 answer
  • Photoshop files are generally small in size. True or false
    13·1 answer
  • which filename refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes i
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!