1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
2 years ago
7

_ can be added to your computer to track your browsing activity and preferences.

Computers and Technology
1 answer:
VladimirAG [237]2 years ago
3 0
The answer is cookies!

Cookies can be added to your computer to track your browsing activity and preferences.

Hope I helped! :)
You might be interested in
Which type of loop only runs while a condition is true?
Oksanka [162]

Here is some ranting.

You haven't specified programming language. And every type of loop runs only when a condition is true (that is the definition of a loop).

And here is the answer.

Well, there is [code]for[/code], [code]while[/code] and in some languages even [code]do while[/code].

Hope this helps.

3 0
3 years ago
Read 2 more answers
1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
lawyer [7]

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

6 0
3 years ago
Explain and give examples of at least two search engines.
ale4655 [162]
Search engines are programs that search for and identify items based on a user input keyword, phrase, etc. Examples include google, bing, etc.
5 0
3 years ago
Kitchen Gadgets
Scilla [17]

Answer:

hehe

Explanation:

7 0
2 years ago
Question 1 (True/False Worth 15 points)
liraira [26]

It is a programmer's responsibility to contribute to society and human well-being is true.

Explanation:

  • It is a programmer's responsibility to contribute to society and human well-being is true.
  • The Association for Computing Machinery (ACM) is known as  the world's largest educational and scientific computing society.
  • It has its own Code of Ethics and another set of ethical principles which were also approved by the IEEE as the known standards of teaching and practicing software engineering.
  • Programmers contribute to develop computer systems which can reduce negative impression to the society.
  • The negativity includes as threats to safety and health, which can be reduced and make everyday activities and work easier.
  • software developers should reduce the risk of harming others due to the coding errors or the security issues which could impact human well-being.

3 0
3 years ago
Other questions:
  • A person planning to file for bankruptcy must receive credit counseling within two years before filing the petition.
    7·1 answer
  • A file must be ________ before data can be written to or read from it. closed opened buffered initialized none of these
    11·2 answers
  • When employees are hired, they agree to only use cell phones during breaks. How would you classify this?
    13·2 answers
  • Hello, please help write code in C++. Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 or 95) go nort
    12·1 answer
  • Assume that an array of integers named a that contains exactly five elements has been declared and initialized. Write a single s
    15·1 answer
  • Which camera mode gives the photographer the greatest amount of control?
    7·2 answers
  • !WILL MARK BRAINLIEST!
    8·1 answer
  • Which statement uses the example type of context clue for the underlined word?
    5·2 answers
  • What is a computer class from 8​
    12·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!