1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alisha [4.7K]
3 years ago
13

Talk about a time in your life where technology most hurt you. This story can involve any time that technology in any form eithe

r got in your way of something, slowed you down, or literally hurt you. Be very specific.
Computers and Technology
1 answer:
STatiana [176]3 years ago
8 0

In my lifetime Face Book has most hurt me. Hackers hacking my account. Saying things I never said and pretending to be me. It disconnected me from my freeinds literally. They never wanted to talk to me. It really was sad.

You might be interested in
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
How do you know when energy is moving in a lightbulb circuit?
vagabundo [1.1K]
When energy flows in the Electric Circuit then Light bulb blows and emits light energy and thermal energy. By that sign, we can get an idea that energy is flowing.

Hope this helps!
4 0
3 years ago
Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
sertanlavr [38]

Answer:

Network

Availability is an essential part of Network security, and user behavior analysis and application analysis provide the data needed to ensure that systems are available.

7 0
3 years ago
(True or False) When you set styles in the Pages Properties dialog box, they will overwrite styles in an external style sheet?
levacccp [35]

Answer:

That will be True.

Explanation:

7 0
2 years ago
You would check the automatic transmission fluid at normal operating temperature with the engine running and the transmission in
MakcuM [25]

Answer:

the answer is "D". Park

Explanation:

Automatic transmission fluid is a oil use in vehicles to keep the gears working normal.

Checking the Automatic transmission fluid (ATF) with the engine running is necessary to warm up the fluid so that the original level of the fluid is picked correctly when using a dipstick or a rod, hence the reason for normal operating temperatures.

Virtually, nobody can check a vehicle at motion because a vehicle only move at First, second, third, to fifth gear. the temperature of a moving vehicle increases as the engine works. A normal temperature is needed to check the ATF, and the best time recommended is before moving the vehicle (immediately after starting the engine).

Therefore, the best gear position recommended for checking automatic transmission fluid is at PARK.

6 0
3 years ago
Other questions:
  • Mike wants to build an amplifier. Which technology can he use?
    15·1 answer
  • Which of these is not a modifier?<br><br> short<br><br> unsigned<br><br> nest<br><br> long
    15·1 answer
  • Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to
    11·1 answer
  • You have developed a prototype of a software system and your manager is very impressed by it. She proposes that it should be put
    5·1 answer
  • "A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, an
    5·1 answer
  • Think back on the Font Tester App. Can you think of an example of another app or feature of an app which would use a loop to con
    14·1 answer
  • How many total bits are required for a direct mapped cache with 16 KB of data and 4 word blocks Assuming a 32 bit address
    12·1 answer
  • Which item best describes fiber optic transmission?
    14·1 answer
  • is the practice of using the internet to provide healthcare without going to a doctor’s office or hospital.
    15·1 answer
  • According to Okun's law, if the unemployment rate goes from 7% to 4%, what
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!