1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
4 years ago
12

Many people object to increased cybersecurity because _____.

Computers and Technology
2 answers:
yawa3891 [41]4 years ago
5 0
Depending on what kind of security measures are implemented, D would definitely be a contender. However, B is also something to take into consideration. I would answer D.<span />
faust18 [17]4 years ago
4 0

Answer:

d. it may violate personal freedoms and privacy

Explanation:

You might be interested in
What predefined match policy allows viewers to watch a claimed video but does not allow ads to display on the video
Alona [7]

Answer:

The correct response is "Track".

Explanation:

  • Tracks encourage the individual that listens to that same music video to miss or ignore that same starting of almost any soundtrack at a certain moment.
  • It might also impact an individual who accompanies a facility that implements or obeys guests.

For obvious reasons, a digital ad service can track client's internet search engine behavior patterns to continue providing accurate recommendations.

6 0
3 years ago
Please design a Java GUI application with two JTextField for user to enter the first name and last name. Add two JButtons with a
Ede4ka [16]

Answer:

Check the explanation

Explanation:

Code :

import java.awt.*;

import java.awt.event.*;

import javax.swing.*;

public class nameFrame {

private JFrame mainFrame;

public nameFrame(){

prepareGUI();

}

public static void main(String[] args){

nameFrame nameFrame = new nameFrame();

}

private void prepareGUI(){

mainFrame = new JFrame("Name Frame");

mainFrame.setSize(450,250);

mainFrame.setLayout(new GridLayout(5, 2));

 

mainFrame.addWindowListener(new WindowAdapter() {

public void windowClosing(WindowEvent windowEvent){

System.exit(0);

}

});  

JLabel fname= new JLabel("First Name : ");

JLabel lname = new JLabel("Last Name : ");

JLabel fullname = new JLabel("Full Name : ");

JTextField fnameText = new JTextField(15);

JTextField lnameText = new JTextField(15);

JTextField fullnameText = new JTextField(30);

fullnameText.setEditable(false);

JButton submit = new JButton("submit");

submit.addActionListener(new ActionListener() {

public void actionPerformed(ActionEvent e) {  

String data = fnameText.getText() + " " + lnameText.getText();

fullnameText.setText(data);

}

});

JButton clear = new JButton("clear");

clear.addActionListener(new ActionListener() {

public void actionPerformed(ActionEvent e) {  

fnameText.setText("");

lnameText.setText("");

fullnameText.setText("");

}

});

mainFrame.add(fname);

mainFrame.add(fnameText);

mainFrame.add(lname);  

mainFrame.add(lnameText);

mainFrame.add(fullname);  

mainFrame.add(fullnameText);

mainFrame.add(submit);

mainFrame.add(clear);

mainFrame.setVisible(true);

}

}

Kindly check the attached output image below.

5 0
3 years ago
3. What do you need to do before you can sort and filter data in a database?
Digiron [165]

3. format the table

4. idk

5 0
3 years ago
A two part circular linked chain implementation of a queue
dem82 [27]

Answer:A) All other answers

Explanation:

Circular linked chain is the type of the linked list formed that has the first component attached to the last component and every other are connected consecutively .

The circular linked list which is in two section is implemented in the form queue by the methods such as the initializing the nodes and using them when there is the requirement of it or it can also keep the node for the future use.

6 0
3 years ago
Jabari is writing pseudocode for a new video game he wants to create. What should he include in his pseudocode?
erastova [34]

Answer:

The answer is "Option c".

Explanation:

The Pseudocode is a definition of actions in an algorithm or some other method of software engineering. It also uses regular programming language, formal conventions, and is associated with human learning rather than computer learning, and the wrong choice can be defined as follows:

  • In choice a, It is wrong because there are so many languages, and it is not easy to understand all.
  • In choice b, It is wrong because it is used for better understanding.
  • In choice d, it is wrong because words are also not only common to programmers.
5 0
3 years ago
Other questions:
  • Write a cout statement that prints the value of a conditional expression. The conditional expression should determine whether th
    7·1 answer
  • Data bars describe a graphic element that
    9·2 answers
  • Se citește un număr natural nenul N. Se umple, pe linii, partea de sub diagonală, inclusiv aceasta, a unui tabel pătratic de dim
    9·1 answer
  • Explain why computer users should use the cloud?
    14·1 answer
  • Forms are used to a provide a more user-friendly way to work with data in tables
    14·1 answer
  • Why have the 'taskmasters' been answering questions so long but they're still only at the ambitious rank?
    14·1 answer
  • 100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from
    6·1 answer
  • Create a method to search an un-ordered array of integers for a value, if the value is found return the index of its position in
    10·1 answer
  • How does digital camera differ than manula camera?​
    6·1 answer
  • Which will touch the ground first an elephant or a rock?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!