1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataly [62]
3 years ago
7

PLEASE HELP

Computers and Technology
1 answer:
DedPeter [7]3 years ago
7 0

online stuff dont ever get permanently erased even if the person or website deletes the  file someone could download it before it is taken down. The internet has so many different websites that it flags that your computer visited them doesn't matter how long.  also cookies evaluate what you viewed on their website and act accordingly. Anyone with good hacking skills can break into any online account or website and use the digital footprint to track you to your scource.

You might be interested in
I need some help with ideas
Troyanec [42]

Answer:

Maybe make a loud noise when there is an unacceptable speed

Explanation:

If you speed above the limit you will get a ticket to if it makes a loud noise you can be annoying and speed at the acceptable speed

5 0
3 years ago
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
To create an instance of Big Decimal for 454.45, use ________.
agasfer [191]

Answer:

C.

Explanation:

Based on the Java documentation; when creating an instance of BigDecimal, we can pass a string as a constructor.

System.out.println(new BigDecimal("454.45"));

8 0
4 years ago
Is a protocol that allows users to log on to and access a remote computer?
kompoz [17]
The answer is yes I hope this help ya out

6 0
3 years ago
Setting up a home network using wireless connections is creating a _____.
Olin [163]
The answer to setting up a home network using wireless connections is creating a (C) WAN
3 0
3 years ago
Other questions:
  • Janice has a "jammed" key on her keyboard. Every time she strikes the "S" key it sticks and doesn't pop back. What should Janice
    6·2 answers
  • A(n) ____ allows others besides the manufacturer to develop software to run on the system or device.
    14·1 answer
  • The WAN connections to your regional offices are unfortunately extremely slow for your users and they are complaining about file
    14·1 answer
  • In order for bitlocker to protect the system volume without the aid of an external drive, your computer must:
    12·2 answers
  • Write a flowchart and program that does the following: Asks the user for the average temperature in each of the last 12 months A
    12·1 answer
  • What happen if there is no authentication??
    10·2 answers
  • Which two things can a user view in the Reading pane?
    6·2 answers
  • Which unknown factor affects prices in the financial markets?
    9·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
  • When performing forensics on an Apple computer, what operating system are you the most likely to encounter QUIZLET
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!