1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka-Z-Leto [24]
3 years ago
6

How might the website owner use theses details other than to verify login details?

Computers and Technology
2 answers:
Naddik [55]3 years ago
7 0

Answer:

They might choose ads based on your activity from your search history or to track location, and to send notifications to you.

Lilit [14]3 years ago
3 0

Answer:

the website owner can hack your account or sometimes let say u save ur login and password. and u use a community computer that person can go through ur account and do whatever but the owner of the website will not take blame for it and can use ur info

You might be interested in
Of the measures of feasibility, questions such as "Does the proposed platform have sufficient capacity for future needs?" and "W
larisa [96]
Operational feasibility !!!!!!!
8 0
4 years ago
SMART PEOPLE NEEDED
mario62 [17]
D doesn't make much sense, it's valid, but not what we're looking for. B also has a correlation with D, same reasoning applies. As for A, it seems pretty legit, but I don't believe that's what we're looking for.

Choice C is the most obvious one though. We're talking about a network and as may or may not know it's a wireless one in a manner of speaking. A <span>couple of computers in the network that have trouble maintaining a signal will indefinitely lead to failure of a network since both the links and nodes of certain computer systems are incapable of maintaining a signal. </span>
6 0
3 years ago
What is required to become a good critical thinker? Use a process when dealing with a big issue. Practice the right skills over
Damm [24]

Answer:

Evaluate issues based on logic and reason

Explanation:

Critical Thinking is the ability to think scientifically & logically, analysing based on both formers - rather than rule of thumb.

Critical thinker engages clearly in conceptual, rational thinking. So, an important desirable characteristic of a critical thinker is 'evaluating issues based on logic and reason'.

6 0
3 years ago
Joaquin is considering a career as an animator and wants to know more about the daily work of an average animator. Which strateg
Advocard [28]
Lacking a response to my question, I'll assume there's no "correct' answer here. 

Joaquin could contact the university's graphic arts department, or if he's interested in the programming side of it, the computer science department, and ask if they have any information on the topic. If he's already majoring to become an animator, then he should talk to one of his professors to see if they know someone in the business that would speak with Joaquin. 

The faster and better way would be to go to reddit, or some site at which animators congregate (most probably found through Google), read the forums, and create if he's not finding a suitable answer.
3 0
4 years ago
What level of damage to national security can you reasonably expect top secret information to cause if disclosed?.
Vinvika [58]

Exceptionally grave damage is the level of damage to national security can you reasonably expect top secret information to cause if disclosed.

When it is conceivable that information's unauthorized exposure could result in exceptionally severe harm to the country's security, it may be given the "Top Secret" classification. The strictest caution should be exercised while applying this classification.

Armed hostilities against the United States or its allies, a breakdown in international relations that has a significant impact on national security, the compromise of crucial national defense plans or sophisticated cryptologic and communications intelligence systems, the disclosure of sensitive intelligence operations, or the disclosure of scientific or technological advancements that have a significant impact on national security are examples of "exceptionally grave damage."

The level of harm to national security that can be expected from the disclosure of top-secret material is exceptionally grave damage.

To know more about exceptionally grave damage click here:

brainly.com/question/2802958

#SPJ4

3 0
1 year ago
Other questions:
  • _______ are special incentives or excitement-building programs that encourage consumers to purchase a particular product, often
    7·1 answer
  • Three of the most important jobs of security management are to ensure _____ are organized according to sensitivity, ensure that
    10·1 answer
  • Why should ERP architecture include a discussion on organizational structure, business processes, and people, instead of just in
    5·1 answer
  • Define Technology In Your Own Words.
    8·1 answer
  • Bill is building a project network that involves testing a prototype. he must design the prototype (activity 1), build the proto
    5·1 answer
  • Assume the existence of a Building class with a constructor that accepts two parameters: a reference to an Address object repres
    7·2 answers
  • If you receive an email message you suspect is spam, what should you do?
    11·1 answer
  • What can always be seen in the styles gallery??
    12·1 answer
  • What is another word for: a location in memory that contains a value?
    7·2 answers
  • What is information technology ?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!