1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GuDViN [60]
3 years ago
11

Do you know how i can text my mom (and tell my mom to tell dad) that i want to get a new phone and get my ipad back without it b

eing taken away for another year and do you guys know how i can use social media correctly too (i know how, i just wanted to know more information so i can use them better y'know)?
Computers and Technology
1 answer:
posledela3 years ago
7 0

You can clean your room, do chores without being told, and being nice to your siblings, or being very helpful around your house. I don't have social media myself, but from what I know, you just have to follow the directions correctly on the site or ask a friend. Plze mark me brainiest:) Hopefully this was helpful:)

You might be interested in
The first step in the information processing cycle is _____, which involves entering data into the computer.
Dmitry [639]

Answer:

INPUT

Explanation:

Information Processing Cycle is defined as the series of stages followed in processing information. Those stages include:

  • Input
  • Processing
  • Storage
  • Output

Input involve entering the data/information into the computer

Processing involve the computer performing some computation on the data

Storage involve saving the data and/or result to the any medium for future use.

Output involve displaying or presenting the results to the user.

4 0
3 years ago
. List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
Flura [38]

In cyber security, an exploit is a way attackers take advantage of certain vulnerabilities and gain malicious access to systems. There are very many types of exploits that exist in the cyber security world. However, I will mention those ones most commonly used.

DoS attacks – The denial of service attacks is very common. Hackers will gain access to servers and send so many packet requests at the same time. The servers become overwhelmed due to too much memory allocation and the huge amount of traffic ends up crashing the servers.

Unauthorized access – When an attacker has an illegal access to host machines

<u>Application Exploitation</u>

Code injection – This exploit can be used to maliciously inject invalid code into an application program or software and as a result change how the program behaves.

Cross-site scripting – Enable hackers inject malicious scripts on a website of a client. Once they have gained access, they will escalate their privileges and have more access to the site.

Clickjacking – A type of attack that tricks unknown victims into clicking links of a web page they believe are legitimate and end up revealing confidential information of themselves.

6 0
3 years ago
What OS is most commonly used by businesses? Linux Macintosh Microsoft Windows
alexira [117]
It's often Linux since Linux is free, but it could be Windows.
4 0
3 years ago
A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2,048 sectors and there are 131,072 (217)
marysya [2.9K]

Answer:

128 GB

Explanation:

Here, we are interested in calculating the total capacity of the disk.

From the question, we can identify the following;

Number of surfaces = 4

Tracks per surface = 131,072

Number of sectors = 2,048

Each Block size = 512 bytes

Mathematically;

Total data capacity of the disk = no of tracks * no of sectors * block size

= 131,072 * 2048 * 512 bytes

= 2^17 * 2^11 * 2^9 bytes = 2^37 bytes

1 GB = 2^30 bytes

So 2^37 = 2^7 * 2^30

= 128 GB

8 0
3 years ago
The set of instructions that tell the computer what to do are called ____.
CaHeK987 [17]
Hi,

The word you are looking for is "programs".

Hope this helps.
r3t40
4 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following can you NOT apply for at any FLHSMV office? A. Certificate of title B. License plates C. Vehicle registra
    15·2 answers
  • In addition to not parking where signs prohibit it, you should never park __________________.
    12·1 answer
  • What is the windows server 2012 r2 feature that enables you to maintain previous versions of files on a server, so that if users
    10·1 answer
  • There is no way to see how another project in Scratch was made.<br><br> True<br> False
    11·1 answer
  • What is the full form of icimod?
    6·1 answer
  • Controlling access of information on the internet
    15·1 answer
  • How do u type faster
    5·1 answer
  • Please answer the following essay question:
    13·1 answer
  • You want a cable that could be used as a bus segment for your office network. The cable should also be able to support up to 100
    5·1 answer
  • How do we Rewrite the following Python code to avoid error. mark=inpt("enter your mark ")
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!