1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
3 years ago
8

The weird suspicious box that k12 sends the parents to put on the router. im getting strange privacy error messages on google an

d silk on every single device i try that ive never gotten before my parents put the box on our router. i used to get redirected to "meetbluecircle.com" but now it just does this error and im so annoyed and mad and just freaking confused out of my mind about how i get these errors to go away becuase its blocking any site i try to go to.EVEN THE FREAKING HELP FORUM FOR GOOGLE!!!!Please help me im going crazy trying to figure out how the heck i get this to go the frick away
Computers and Technology
1 answer:
lorasvet [3.4K]3 years ago
7 0

Answer:

34

Explanation:

WHY BECAUSE 34 IS PRIME AND THIS PROBLEM REDUCE THE NUMBER AND CHANGE THE NUMBER INTO A MIXED NUMBER

You might be interested in
Why is manual coding the best way to learn HTML?
Stels [109]

Answer:

It helps to put the code in to your working memory and you will have a greater ability to problem solve.

Explanation:

If your just a beginner, then writing the code out your self will help you learn what each line means. Also, you will see the effects that each line has. Of course, this is really dependent on how much code you've written before and how much code your dealing with.

5 0
3 years ago
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
3 years ago
An intruder with malicious intent breaks into an office and steals a hard drive
kakasveta [241]

Answer: data security

Explanation:

The company's authentication protocols and data encryption measures denotes data security.

Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.

4 0
3 years ago
Consider the following program. Assume all variables are declared and the program compiles.
Alexus [3.1K]
Hard question thx for the points give me brainlest points plz
8 0
3 years ago
Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity an
podryga [215]

Answer:

Payment Card Industry Data Standard(PCI DSS).

Explanation:

The online payment acceptance through credit cards is governed by the Payment Card Industry Data Standard (PCI DSS) and it also includes the provisions that shoulde be implemented by gwen's company before accepting any transaction through credit cards.

8 0
3 years ago
Other questions:
  • To move to the most extreme right cell containing data in your worksheet, what basic key combination can you use?
    7·1 answer
  • List and define the types of System Software. How does System Software differ from Applications Software?
    12·1 answer
  • When called upon to give an impromptu speech, it is a good idea to do all of the following, except:
    11·2 answers
  • Jamie has to enter names, grades, and scores of a group of students into a worksheet. Which option will Jamie use to describe th
    11·1 answer
  • When Amy turns on her computer, she notices a burning smell. Smoke comes out of the case, and Amy immediately turns off her comp
    7·1 answer
  • ___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
    12·1 answer
  • Why might people feel differently about their digital lives?
    11·1 answer
  • What does media saturation mean?
    15·1 answer
  • Output each floating-point value with two digits after the decimal point, which can be achieved by executing cout << fixed
    7·1 answer
  • What is the full form of MOS<br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!