1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
3 years ago
15

Can you redact this image

Computers and Technology
1 answer:
spin [16.1K]3 years ago
6 0

Answer:what???

Explanation:so

What

You might be interested in
Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or
kupik [55]

Answer:

Windows Defender Using Security Updates and Antivirus Software for Clients

Explanation:

Windows Defender is a software product from Microsoft that is intended to prevent, remove, and quarantine spyware in Microsoft Windows. This program helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer.

7 0
3 years ago
Read 2 more answers
. If you have written the following source code:
taurus [48]

Answer:

SpringBreak.java

Explanation:

Java classes are saved in files having the same name as the class name.

So if the given class structure is:

public class SpringBreak{

// lots of code here

}

It needs to be saved in a file called SpringBreak.java.

The physical file should follow the package structure as provided in the class.

The java file will be compiled by the java compiler to generate the corresponding class file.

8 0
3 years ago
A computer operating system software manufacturer invests its profits in creating newer versions of its operating system softwar
PIT_PIT [208]

Answer:

False

Explanation:

Diversification involves increasing the reach of a particular software to meet the needs of different people. When a particular software is developed to provide multiple services for different individuals, it can be categorized as diversification but when the software is improved upon to meet the same users within a specific domain, the software can not be said to be diverse.

From our scenario, the operating system software is improved upon to handle the continuous changes in computer, this does not make the operating system software diverse, it just becomes better.

8 0
3 years ago
Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
3 years ago
You implement basic version control and go through the phase of creating a local repository. Initiate the commands to set up tha
notsponge [240]
Version control is the foundation of DevOps. Gain speed with Helix Core. Get the version control tools you need. Try today. Modern Collaboration. Increase Visibility.
3 0
3 years ago
Other questions:
  • Your Economics teacher has asked you to create a chart showing how supply and demand affects the price of gasoline. Which applic
    13·2 answers
  • Which of the following cannot be performed from the windows task manager?
    15·2 answers
  • Ar count = 10;
    13·1 answer
  • A5.3 1012 kg satellite is 1,800 m from another satellite that has a mass of 3.5 x 108 kg. What is the gravitational
    6·1 answer
  • How do I sign into raterhub on my phone and my mobile device at the same time to complete phase 2 of my raters exam for sykeshom
    10·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • 1. The programmer intends for this pseudocode to display three random numbers in the range of 1 through 7. According to the way
    12·1 answer
  • Write two cin statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a dash,
    7·1 answer
  • How do you award a brainliest
    8·2 answers
  • If you are a mathematics student and want to study the secret of writing cryptographic codes, algorithms, encryption and decrypt
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!