1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksklad [387]
4 years ago
15

When a site is unsafe , it means?

Computers and Technology
2 answers:
jeka57 [31]4 years ago
7 0
When a site is unsafe, it means that the personal  information may be used in ways that is not proper.
Svetradugi [14.3K]4 years ago
6 0
It means that in the site any virus or malar is present.... If u will open it in your computer virus will come and your windows will corrupt.
You might be interested in
Consider a system that contains 32K bytes. Assume we are using byte addressing, that is assume that each byte will need to have
Montano1993 [528]

Answer:

n = 15

Explanation:

Using

Given

Number of bytes = 32k

At the smallest scale in the computer, information is stored as bits and bytes.

In the cases when used to describe data storage bits/bytes are calculated as follows:

Number of bytes when n = 1 is 2¹ = 2 bytes

When n = 2, number of bytes = 2² = 4 bytes

n = 3, number of bytes = 2³ = 8 bytes

So, the general formula is

Number of bytes = 2^n

In this case

2^n = 32k

Note that 1k = 1024 bytes,

So, 32k = 32 * 1024 bytes

Thus, 2^n = 32 * 1024

2^n = 2^5 * 2^10

2^n = 2^15

n = 15.

6 0
4 years ago
Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see a
elena55 [62]

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

5 0
4 years ago
Write a program that echos back any inputted integer greater than 1, and exits when a 0 is entered. Your program should use a co
denpristay [2]

Answer:

MIPS Code:

.data

newline: .asciiz "\n" #newline variable

.text

MAINLOOP:

li $v0, 5 #syscall to get user interger and store in $v0

syscall

add $a0, $zero, $v0 #moving the user input to $a0 from $v0

beq $a0, 0, EXIT #branching to EXIT when $a0 is 0

li $v0, 1 #syscall to print integer in $a0

syscall

li $v0, 4 #syscall to print newline

la $a0, newline

syscall

j MAINLOOP #jumping to MAINLOOP

EXIT:

Sample Output:

6

6

7

7

3

3

0

7 0
3 years ago
After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued
adoni [48]

Answer: NVRAM(Non-volatile random-access memory)

Explanation:Non-volatile random-access memory(NVRAM) is the memory that has a non-volatile nature.It is used for retaining of the data even when the system gets switched off .

This memory uses the power source from the CMOS battery for executing the functions. It is designed by using the pin configurations containing 24 pin in DIP(Dual inline package). So the situation mentioned in the question of storing the changes will appear in the NVRAM.

4 0
4 years ago
If you could make another device "smart" and have
konstantin123 [22]

Answer:

I would 100% make myself a SmartToaster (Trademark Pending)

Explanation:

A simple explanation would be <em>I like toast</em>

7 0
3 years ago
Other questions:
  • What is the value of i printed? j = i = 1 i += j + j * 5 print("What is i?", i)
    11·1 answer
  • Which step is done first to replace existing text in a text box?
    10·2 answers
  • A common approach of networking multiple computers as opposed to a single computer is? called:
    14·1 answer
  • What is the purpose of a Macro in Word?: *
    13·1 answer
  • Việc áp dụng khai báo hải quan điện tử có áp dụng chữ ký số, đem lại những lợi ích gì
    10·1 answer
  • You develop an app, and you don’t want anyone to resell it or modify it. This is an example of: A
    5·1 answer
  • What is the role of UPS in Computer security?<br>4 marks answer​
    12·1 answer
  • What is geospatial technology ??​
    5·2 answers
  • I wanna be the very best
    11·2 answers
  • Best definition of wind
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!