1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr402 [8]
3 years ago
5

Which rule should be followed to stay safe online

Computers and Technology
1 answer:
yan [13]3 years ago
5 0

Answer:

The rule that should be followed to say safe online is to never give out your personal information

Explanation:

because they can hack you.....

You might be interested in
What is x squared times b squared
Pie

Answer:

x^2 * b^2

Explanation:

Like 3 squared times 2 squared is 3*3*2*2. Similarly the expression given in the question is equal to x*x*b*b. And that explains what is mentioned in question.

3 0
3 years ago
1) Which of the following would you NOT see on a Windows 10 Start menu?
Sati [7]
Task view

I hope this helps you :)
3 0
2 years ago
Mezcla de una señal con otra para facilitar su transporte o transmisión.
Brrunno [24]

Answer:

telecomunicaciones

Explanation:

6 0
3 years ago
Write down the functions of network layer in your own words.ASAP
sergeinik [125]
Hrhnebevevebnenebebenene
8 0
2 years ago
..........................................
Scilla [17]

Answer:

jhhgvjgfhvbnbjvjn

Explanation:

7 0
2 years ago
Read 2 more answers
Other questions:
  • What is a computer??????????????????????????????????????????????????????????
    12·2 answers
  • What kind of printer is used with multipart forms such as those with point of sale machines?A) dot-matrixB) daisy-wheelC) inkjet
    5·1 answer
  • How would you define data science ?
    10·1 answer
  • Assume that ip has been declared to be a pointer to int and that enrollment has been declared to be an array of 20 elements . As
    13·1 answer
  • While software vendors generally provide evaluation or demonstration copies of their products, hardware vendors never provide ev
    15·1 answer
  • The key schedule results in generating multiple keys from the one secret key. These multiple keys are used:
    9·1 answer
  • Whats a hybrid wired network
    9·1 answer
  • Select three advantages of cloud computing.
    12·1 answer
  • Does anyone else have edge and think its not the awful?
    12·2 answers
  • 15 _____ 3 = 0 Question 11 options: a) / b) % c) * d) //
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!