1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
2 years ago
7

Which rule should be followed to stay safe online?

Computers and Technology
1 answer:
anyanavicka [17]2 years ago
4 0

Answer:

Avoid sharing photos with anyone online.

Explanation:

People can track you down. Its not worth to be kidnapped. Stay safe.

You might be interested in
What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation
Alekssandra [29.7K]

Answer:

security In-depth

Explanation:

The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole

Therefore in the given situation, the  security In-depth required to layered the safeguarding channels to detect the infiltration

Hence, the  security In-depth is the correct answer

4 0
3 years ago
Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what a
Aleksandr-060686 [28]

Answer:

1). organizing and leading religious services.

3). praying and promoting spirituality.

4). preparing and delivering sermons or talks.

5). reading from sacred texts.

Explanation:

The clergy is defined as the 'body of persons including ministers, sheiks, priests, and rabbis who are trained and ordained for religious service.' Thus, <u>the more common tasks performed by them include arranging and directing the religious services along with calling upon and encouraging spirituality amongst people</u>. <u>While the less common tasks carried out by them include assembling and carrying out sermons and studying the religious texts</u>. Thus, <u>options 1, 3, 4, and 5</u> are the correct options.

8 0
2 years ago
How do i do a mutioutput on a mac
Tcecarenko [31]
Here's what I found

To use an aggregate device with Logic:
Open Logic Pro or Logic Express.
Choose Logic Pro > Preferences > Audio or Logic Express > Preferences > Audio and select the Devices tab.
Select the Output Device drop-down menu and choose the aggregate device from the list. ...
Click Apply Changes at the bottom-right of the window.
4 0
3 years ago
What are the 5 characteristics of flowchart<br>​
olchik [2.2K]

Answer:

Here's ur answer

Explanation:

(i) Should consist of standardized and acceptable symbols. (ii) The symbols should be correctly used according to flowcharts rules. (iii) Should have short, clear and readable statements written inside the symbols. (iv) It must have clear one starting point and one ending point.

3 0
3 years ago
Turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is n
Serjik [45]
It needs an Operating System like a cable or something that will help it operate look for more and double check
3 0
3 years ago
Other questions:
  • 7.14 LAB: Word frequencies Write a program that reads a list of words. Then, the program outputs those words and their frequenci
    10·1 answer
  • The overall purpose of a food guide is________.
    11·1 answer
  • .in the array based list implementation of the ADT what is the worst case time efficiency of the getEntry method?
    14·1 answer
  • When looking at a relationship between two tables on an ERD, the _____ table can be identified by the presence of a foreign key
    8·1 answer
  • __________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
    9·1 answer
  • What command would you use to add a file to an e-mail message?
    15·2 answers
  • What is the function of a breadcrumb trail in a website ?
    10·2 answers
  • The response from a Google Form can be seen in how many ways?
    10·1 answer
  • In one to two sentences, describe how you would add a new slide to your presentation.
    11·2 answers
  • An end-user license agreement protects _____.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!