1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
3 years ago
12

When using a public computer or network you should always

Computers and Technology
2 answers:
Gnesinka [82]3 years ago
4 0

Answer:

log out of any sites you have logged into.

Explanation:

when you use a public  computer or network,

you should always browse appropriately and wisely and log out of personal accounts when you're done because other people have the potential to use your information.

Amanda [17]3 years ago
4 0

answer

make sure your not logged into anyone else’s account

You might be interested in
What information will you find in the 16-bit field in an IP datagram?
faust18 [17]

Answer: This 16-bit field defines the entire packet size in bytes, including header and data. The minimum size is 20 bytes (header without data) and the maximum is 65,535 bytes. All hosts are required to be able to reassemble datagrams of size up to 576 bytes, but most modern hosts handle much larger packets.

Explanation: Hopefully this helps you with what ever u are doing.

7 0
3 years ago
"Margaret has $3,200 cash after selling off her television, DVD player, and computer. She has debts of $4,800 owing to the follo
serg [7]

Answer: Hyatt's  will be able to collect $1,365

Explanation: Composition Agreement is a kind of agreement reached between a debtor and its creditors. it a kind of agreement whereby the debtor and creditors agree to collect a percentage of their debts to fully settle their debts from the creditor.

For instance Margaret with a cash of $3,200 to settle a debt of $4,800.

In this case Margaret can decide to pay 65% of the total debts to settle the final debts. Here, Hyatt's  will be able to collect $1,365 as full settle of his debt.

5 0
3 years ago
The WAIS was designed for testing ________ intelligence, whereas the WISC was designed for testing ________ intelligence.
Blizzard [7]

Answer:

WAIS :Adult's and older adolescent's intelligence, WISC: Children's intelligence.

Explanation:

WAIS (Wechsler adult intelligence scale) is an IQ test designed by David Wechsler to measure the intelligence and cognitive skills of adults and older adolescents. The test was first published in 1955 as a revision of the 1939 Wechsler- Bellevue intelligence scale.

The WISC (Wechsler intelligence scale for children) was also created by David Wechsler and it is used to test the intelligence of children between the ages of 6 and 16.

8 0
3 years ago
You have been asked to configure a client-side virtualization solution with three guest oss. Each one needs internet access. How
ArbitrLikvidat [17]

The most cost-effective way to configure a client-side virtualization solution is by using one (1) physical NIC, three (3) virtual NICs, and one (1) virtual switch.

<h3>What is virtualization?</h3>

Virtualization refers to the creation of an abstraction layer over computer hardware through the use of a software, in order to enable the operating system (OS), storage device, server, etc., to be used by end users.

In this scenario, the most cost-effective way to configure a client-side virtualization solution is by using one (1) physical network interface card (NIC), three (3) virtual network interface cards (NICs), and one (1) virtual switch.

Read more on virtualization here: brainly.com/question/14229248

#SPJ1

4 0
2 years ago
Biometric devices are often associated with computer and data security. True False
Leya [2.2K]

Answer:

True

Explanation:

5 0
3 years ago
Other questions:
  • Gerry used html for her website. which best describes html
    15·1 answer
  • What is the difference between a fiber optic cable and a twisted pair cable?
    5·1 answer
  • Nearly all states allow citizens who are not able to go to the polls due to business travel to vote using this method: Internet
    9·2 answers
  • What are the TWO methods of copying and pasting on the AutoCAD Clipboard function?
    7·1 answer
  • Which of the following is not an example of debugging? looking for errors in programming code. fixing misspelled commands in pro
    13·1 answer
  • The program 4 should first tell users that this is a word analysis file. For any user-given text file, the program will read, an
    6·1 answer
  • Amber wants to give her audience copies of her presentation so they can follow along and take notes. What option should Amber ch
    9·2 answers
  • Edhesive code practice 6.3
    14·2 answers
  • To input lenth in meter and convert in to centimeter​
    6·1 answer
  • How do you flatten a 2D array to become a 1D array in Java?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!