1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanzania [10]
3 years ago
12

All of the following are ways to limit what is tracked about you online, except:

Computers and Technology
1 answer:
Veseljchak [2.6K]3 years ago
5 0

Answer:b

Explanation: turning off your screen does nothing on the cyber side and people and companies can still access your internet history even while your screen is off

You might be interested in
Write two lines of code to draw the following circles centered at 600,600. The radius of the smallest circle is 200. There are 5
Bad White [126]

Answer:

canvas.draw_circle((600, 600), 200, 3, "Black")

canvas.draw_circle((600, 600), 250, 3, "Black")

Explanation:

# include < conio.h>

# include < iostream.h>

int canvas.draw_circle,

namespace std

{

canvas.draw_circle((600, 600), 200, 3, "Black")

canvas.draw_circle((600, 600), 250, 3, "Black")

}

return,

7 0
3 years ago
What are the different methods of enhancing/decorating<br> bamboo product​
Zepler [3.9K]

Explanation:

Methods of this technique include glueing, chemical gilding, and electroplating.  Staining is used to color wood to give an illusion of texture. This may come in two varieties.

7 0
3 years ago
This form of opera used existing popular ballads and operatic arias, usually in such a way that the original title or lyrics of
almond37 [142]

Answer:

Option C i.e., Ballad Opera.

Explanation:

This type of music used actual famous ballads and opera arias, typically in a manner that introduced a subutex to the original title or lyrics of a music that is Ballad Opera.

  • Option A is not true about the scenario because Pantomime describes the skill or strategy of communicating thoughts, behavior, sentiments and so on.
  • Option B is some where true but it is not totally true because Ballad opera is a type of comic opera but its is ballad opera.
  • Option D is not true about the scenario because Opéra bouffe describes a common type of luminous or satirical opera.
6 0
3 years ago
there are primarily three methods of programming in use today: procedural, recursive, and object oriented true or false
Elodia [21]

Answer:

False.

Explanation:

In Computer programming, there are primarily two (2) methods of programming in use today:

1. Procedural programming: it is an early form of programming (coding) in which software developers make use of a top to down approach in instructing the computer on what actions to take through logical or step-by-step processes. This top-down approach is known as an inline programming, it basically involves calling a procedure such as functions, routines or sub-routines. Some examples of a procedural programming language are Java, Pascal, C, BASIC and FORTRAN.

2. Object-oriented programming (OOP): it is a high level programming language which is based on creating objects that comprises of data (fields) and code (procedures). This procedure includes a method while the data that makes up the object is generally referred to as fields and includes arrays, variables, class etc. Some examples of object-oriented programming language are Python, Ruby, Raku, Java, C++ etc.

<em>Generally, in computer programming a procedural programming is primarily based on creating procedures while an object-oriented programming is based on the creation of objects. </em>

6 0
3 years ago
Given a effective delay of 99ms when network usage is 74%, what is the effective delay when network usage = 84% ?
NARA [144]

148.5 ms is the effective delay when network usage = 84% .

<h3>what is a computer network?</h3>
  • A group of computers sharing resources that are available on or offered by network nodes is known as a computer network.
  • Over digital links, the computers communicate with one another using standard communication protocols.
  • These connections are made up of telecommunication network technologies, which are based on physically wired, optical, and wireless radio-frequency means and may be set up in a number of different network topologies.
  • Personal computers, servers, networking equipment, and other specialized or general-purpose hosts can all function as nodes in a computer network.
  • They can have hostnames and are identifiable by network addresses.
  • After being assigned, hostnames act as recognizable labels for the nodes and are seldom updated.
  • Network addresses are used by communication protocols like the Internet Protocol to locate and identify the nodes.

To learn more about the topic, refer to the following link

brainly.com/question/8118353

#SPJ4

3 0
2 years ago
Other questions:
  • Which of the following guidelines about forwarding e-mail messages is most appropriate?
    12·2 answers
  • php Exercise 3: Function Write a function named word_count that accepts a string as its parameter and returns the number of word
    5·1 answer
  • What specific database stores local user accounts on local computers, and allows users to sign in to and access resources only o
    9·1 answer
  • 1.<br> The correct way to use a seat belt is
    8·1 answer
  • Which device or appliance emits radio waves
    7·1 answer
  • Complete the body of the decrement static method using only the NaturalNumberKernel methods (multiplyBy10, divideBy10, and isZer
    10·1 answer
  • Write a program to input the TotalCost and display the Assured gift as per the following criteria TotalCost(TC) Assured Gift Les
    6·1 answer
  • Select the best answer from the drop-down menu. ________ networks use cables connected directly to the computer. Signals sent in
    11·1 answer
  • Simon would have regarded with impotent fury the disturbance between the North and the South, as it left his descendants strippe
    9·1 answer
  • Ginny faced an application error while executing the recorder in opera. Which web browser is generally recommended to use with r
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!