1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
3 years ago
11

Why do i have to wait and watch videos

Computers and Technology
1 answer:
Mila [183]3 years ago
7 0

The reason being is because of your search history. Google will remember everything you like to watch, look, play or buy things on the computer or any device with internet. Since you are interested in the things you like to do, you're computer will remember this and will display Ads made by companies, or people, which possibly may be a scam, or may give a virus. I would advise to avoid these things as much as you can.

You might be interested in
If the three operations were combined, O(logN) + O(N) * O(logN) + 1, the overall algorithm cost would be:________
KiRa [710]

Answer:

D. O(NlogN)

Explanation:

The computation of the overall algorithm cost is as follows:

Given that

O(logN) + O(N) × O(logN) + 1

In the case of complexity we considered the high order that dominates the other terms

Thus, that term would be  

O(N) × O(logN)

It could be rewrite as

O(NlogN)

Hence, the correct option is D.

All the other options are wrong

3 0
3 years ago
Which of the following is a school-to-work program that provides the student with paid employment, school credit, and school gra
vovangra [49]

Cooperative education program

6 0
3 years ago
Read 2 more answers
A technician is training a new hire on sealing an RJ-45 connector to the end of an Ethernet cable. Which tool is the technician
Aleonysh [2.5K]

<em>The answer is Crimper. </em>

<em> </em>

<em>Crimper is a networking device that would allow RJ-45 pins to get attached to UTP(Unshielded Twister Pair), CATs (Category Ns) and STPs (Shielded Twisted Pair) Cables. These are common type of cables used in computer networking. A crimper looks like a pliers only it has narrow ends with a hole where you would put RJ-45 devices together with the cables. In order to make the cable hold on to the RJ-45, the two hands must be squeezed together with an exact force (not too much force). Once the crimper made a sound, that means, your RJ-45 is now locked with the cables inside.  </em>

<em> </em>

<em>You must be very careful when using this device. Sometimes crimpers has blades that could peel off cables or cut them for alignment and proper attachments. A pair of gloves and googles are also advisable to wear when you use this device for safety measures.</em>

8 0
4 years ago
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
Other questions:
  • ___ is the branch of computer science that explores techniques for incorporating aspects of intelligence into computer systems.
    5·1 answer
  • A good reference point for determining the position of a line or curb in front of you is your __________ . A. Hood ornament B. L
    10·1 answer
  • The cold war actually helped in the development of the internet true or false
    8·1 answer
  • 1- How should an operating system support communication between applications? explain your reasoning?
    10·1 answer
  • A large software development company employs 100 computer programmers. Of them, 45 areproficient in Java, 30 in C, 20 in Python,
    9·1 answer
  • What is the name for the size and style of text?
    8·2 answers
  • WAP to find area of circle​
    12·1 answer
  • Will, there be any presents this year
    15·1 answer
  • Giusp minfg gấp vs ạ đáp án thôi nhé
    15·1 answer
  • Which workbook view is used most often in Excel?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!