1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
3 years ago
8

Meg logs into her email account without entering her user ID and password manually every time. She also finds results from searc

h engines that are relevant to the place where she lives. Meg is aware that her personal information is not safe. What steps should Meg take for a safer browsing experience?
Computers and Technology
2 answers:
topjm [15]3 years ago
5 0
She could: Add a password to her computer, she could also memorize her password and username for her email.
netineya [11]3 years ago
3 0

Answer:

Meg should delete all the information from her current browser, change her browser, use a password manager and enable do not track

Explanation:

If Meg is concern about her privacy then she can follow these steps:

  1. Delete all the information from her current browse: this will avoid the further leak of information
  2. Change browser: If Meg is worried that the browser she is using is taking too much information, she could try changing the privacy policies of her browser but her information is already compromised if possible install a privacy-centric web browser and delete the old browser
  3. Use a password manager: a password manager is intended to be a highly secure program to store passwords, with this Meg can use the main password or biometric authentication to store all her passwords and she doesn't need to memorize all her password either save them on a web browser
  4. Enable do not track: Whether Meg follows step number two or not, she should select the do not track option, this way she can avoid to shares her location with the browser and results relevant to the place where she lives

You might be interested in
Insert XXX to output the student's ID. public class Student { private double myGPA; private int myID; public getID) { return myI
Aleonysh [2.5K]

Answer:

Explanation:

The question above is missing many details and are actually various questions in one. I will answer each one seperately below...

A. The piece of code to get the ID in this code snippet that needs to replace XXX would be the following ... System.out.println("Student ID: " + s.getID());

B. A static main() can declare and create objects. Once these objects are created their instance methods can then be called.

C. Integer score1 = 72;

    int score2 = 85;

    Character grade = 'C';

     In the above code snippet, the information stored in score1, score2, and grade are the following... obj reference, 85, obj reference. This is becasue both Integer and Character are classes and the values being passed to their variables are referencing that object class, while score2 is a primitive type of int and is therefore simply a number.

D. The statement that is true is ... Contents of a Double instance can be modified after initialization. Objects can be modified by calling its setter methods after initializing it.

7 0
3 years ago
Which of the following actions is most likely to raise legal or ethical concerns?
zavuch27 [327]

Answer:

arson, kidnapping, gun fighting

Explanation:

7 0
3 years ago
Read 2 more answers
8. T/F: At the bottom of a slide you are working on you can enter notes to indicate what yo
Crazy boy [7]

Answer: True. Hope it helps!

4 0
3 years ago
Your internet is out, and devices connected by WiFi and ethernet will not connect. You check several websites, and all your pack
tiny-mole [99]

Answer:

a) Open the DNS settings on your router and try using a different DNS.

Explanation:

The DNS or domain name service is a protocol that majorly assigns a URL string to an IP address. This is because the IP address as a number is easily forgotten.

In the question above, the operator could not access the websites with the URL name but can confirm connectivity to the site with its IP address. This means that the IP address can be used to access the websites directly, so, the DNS protocol is either not configured or is down.

6 0
3 years ago
3. (20 points) Write a C++ recursive function that finds the maximum value in an array (or vector) of integers without using any
Luden [163]

Answer:

Following are the code to this question:

In option (i):

#include <iostream>//defining header file

using namespace std;

int findMax(int B[], int x)//defining recursive method findMax

{

if (x == 1)//defining condition when value of n==1

return B[0];//return array first element

return max(B[x-1], findMax(B, x-1)); // calling recursive method inside max method and return value

}

int main() //defining main method  

{

int B[] = {12, 24, 55, 60, 50, 30, 29};//defining array B

int x= 7;//defining integer variable and assign a value

cout << "Maximum element value of the array is: "<<findMax(B, x)<<endl;//calling method findMax and print value

return 0;

}

Output:

Maximum element value of the array is: 60

In option (ii):

\Rightarrow \ T(n) = 1 + T(n-1)\\\Rightarrow  1 + 1 + T(n-2)\\ \Rightarrow  1 + 1 + 1 + ... n \ times \\\Rightarrow  O(n) \\

Explanation:

In the above-given program a recursive method "findMax" is defined, which accepts an array "B" and an integer variable "n" in its parameter, inside the method a conditional statement is used that, checks value of x equal to 1.

  • If the above condition is true it will return the first element of the array and find the max number.
  • Inside the main method, an array B is declared that assigns some values and an integer variable is declared, that also assigns some values, in the last step print method is used that pass value in method and prints its return value.
  • In the option (ii) we calculate the Big-O notation algorithm value.
5 0
4 years ago
Other questions:
  • __________ involves analyzing a large amount of data to extract knowledge and insight
    13·1 answer
  • The _____ function is a logical function that returns a TRUE value if any of the logical conditions are true and a FALSE value i
    10·1 answer
  • Explain what occurs when you synchronize computer and mobile devices.
    5·1 answer
  • Which rule should be followed to stay safe online
    5·1 answer
  • The two mathematical models of language description are generation and recognition. Describe how each can define the syntax of a
    10·1 answer
  • To accomplish a certain task when you would rsther be doing something else is an example of
    9·1 answer
  • Write the definition of a method, isReverse, whose two parameters are arrays of ints of equal size. The method returns true if a
    6·1 answer
  • Both tangible and intangible property? are not covered by intellectual property protections. are both covered by intellectual pr
    5·1 answer
  • What does an arrow after a command indicate
    13·2 answers
  • A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!