1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
8

The weird suspicious box that k12 sends the parents to put on the router. im getting strange privacy error messages on google an

d silk on every single device i try that ive never gotten before my parents put the box on our router. i used to get redirected to "meetbluecircle.com" but now it just does this error and im so annoyed and mad and just freaking confused out of my mind about how i get these errors to go away becuase its blocking any site i try to go to.EVEN THE FREAKING HELP FORUM FOR GOOGLE!!!!Please help me im going crazy trying to figure out how the heck i get this to go the frick away
Computers and Technology
1 answer:
lorasvet [3.4K]3 years ago
7 0

Answer:

34

Explanation:

WHY BECAUSE 34 IS PRIME AND THIS PROBLEM REDUCE THE NUMBER AND CHANGE THE NUMBER INTO A MIXED NUMBER

You might be interested in
How can development in ICT be utilized to speed up the development and integration efforts
valina [46]

Answer:

Research question 1:

How do exposure to and use of ICTs in school affect future employment?

The impact of ICT use in school and student exposure to ICTs, and the nature of use and exposure, on student employability in developing has not been well documented. Tracer studies of the impact of ICTs on further study and employment would be useful, as this could be a useful additional measure of educational quality, beyond standardized testing results.

Research question 2:

What is the impact of ‘computer-literacy’ instruction in schools?

In most circumstances in LDC schools, ICTs are used almost exclusively to provide instruction in “computer literacy’. Emerging research from OECD experience suggests such instruction may not be a productive use of time or resources – is this true in LDCs?

Research question 3:

What is the gender impact of ICTs in education on access, use of, attitudes toward, and learning outcomes?

Studies of the potential differential impact of ICT use by gender on student access to learning in a variety of LDC contexts need to be done.

Research question 4:

How can ICTs be used to present, comment on and discuss student work, and what are the implications of such impact?

The effects of using ICTs to present and discuss student work are not well researched.

Research question 5:

Are some school subjects better suited for ICT integration than others?

Given that access to ICTs in schools is quite limited, it would be useful to know if certain ICT applications are better suited to use in certain school subjects and others and, if so, how ICTs can be utilized to aid teaching and learning in such subjects.

Explanation:

6 0
3 years ago
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
2 years ago
Read 2 more answers
Which of the following symbols is a part of all spreadsheet functions?
NARA [144]

Answer:

the answer is B and is part of all spreadsheet functions

8 0
3 years ago
Read 2 more answers
Windows _____ is a system notification utility and gives quick access to settings for items like screen brightness and network c
jasenka [17]

Answer:

Windows notification and action settings

Explanation:

Notification and action settings is a system settings as well as a notification utility that enables quick or easy access to settings for a number of items or features.

The items include network, tablet mode, mobile hotpot, night light, brightness, Bluetooth, airplane mode, all settings, VPN, focus assist, location, project and connect. It is important to note that all the listed items can be found in the notification and action settings of a windows 10 computer.

4 0
4 years ago
____________________________ and _________________________ are 2 negative impacts of the internet on businesses.
Bogdan [553]

Answer:

i no you its me remember and the answer is b.

Explanation:

7 0
3 years ago
Other questions:
  • Which type of communication is usually handwriten
    11·2 answers
  • To determine what to study, one should first
    8·1 answer
  • Which online resource is usually not free?
    10·2 answers
  • Blank determines the overall brightness or darkness of an entire image
    5·1 answer
  • Allison’s computer is displaying a strange error message saying that Allison, who is an administrator, does not have access to a
    15·1 answer
  • In Python, parentheses are used in calculations where the order of operations affects the outcome. (5 points)
    9·1 answer
  • -(-13) P binary using signed. 2's complement representation
    11·1 answer
  • Recommend how could you integrate positive aspects of digital literacy into your own
    13·1 answer
  • One of the most notable impacts of IT on business is improved
    11·1 answer
  • Frequently used _____________ can be saved as _____________ for use in analysis, dashboards, reports, tickets, and alerts.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!