1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
3 years ago
7

Help me plssssss which rule should be followed to stay safe online

Computers and Technology
2 answers:
max2010maxim [7]3 years ago
7 0

Answer:

B: Avoid Sharing Photos

Explanation:

If you send a photo to a person, you need to be very careful not to send something that can give your information away, this includes but it not limited to Pictures of your town, Pictures of You, Pictures of Friends, Pictures of Family, etc.

Hope I could help!!

Bess [88]3 years ago
7 0
B: avoid sharing photos
You might be interested in
Any Body have a zoom class goin on<br> i wanna bomb
Norma-Jean [14]

This site is only for education related questions. You should only answer or ask questions. That's what we are here for. Whoever is reading this answer, please spread it to stop people from zooming, hurting others, or just posting non-related to education questions. Thank you.

6 0
2 years ago
Write a program that accepts a time as an hour and minute. Add 15 minutes to the time
Anastaziya [24]

Answer:

The code is given below

hours = int(input("Enter time in hour: "))

minutes = int(input("Enter time in minute: "))

total time = (hours * 60) + (minutes + 15 )

total hours = int(total minutes  / 60)

minutes  = total hours/ 60

print("Hours: " + str(hours))

print("Minutes: " + str(minutes))

5 0
3 years ago
Wardrobe engineering is important because
levacccp [35]

Answer:

The answer is "Option d"

Explanation:

The wardrobe engineering consists of choosing clothes that are so simple in design and better in the style that they are acceptable to the existing show-up and perfect for the future years. This design Originally coined Dressing for Confidence author John Molloy, which describe that clothes and accessories can also be used to create a certain picture, and wrong choices can be described as follows:

  • In option a, It's right, that we know about current fashions, but selecting suitable career apparel is not important, that's why it is incorrect.
  • In option b, It is wrong because whatever you wear is not to make choices of any sort.
  • In option c, It is wrong because it can't provide promotion.

3 0
3 years ago
What are the means of hardware security?​
sdas [7]

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

5 0
2 years ago
Read 2 more answers
Consider a planet where everyone belongs to a family of six, every family lives in its own house, each house has a unique addres
rjkz [21]

Answer:

1. For sending a letter, the family member is required to give the delegate the letter itself, the address of the destination house, and the name of the recipient. The delegate clearly writes the recipient's name on the top of the letter. The delegate then puts the letter in an envelope and writes the address of the destination house on the envelope. The delegate then gives the letter to the planet's mail service. At the receiving side, the delegate receives the letter from the mail service, takes the letter out of the envelope, and takes note of the recipient name written at the top of the letter. The delegate then gives the letter to the family member with this name.

2. No, the mail service does not have to open the envelope; it only examines the address on the envelope.

Explanation:

Hope this helps? Please rate my answer brainiest.

3 0
3 years ago
Other questions:
  • The operating system of a computer is an example of ________ software. science-forum
    7·1 answer
  • . Reorder the following efficiencies from smallest to largest:
    9·1 answer
  • Csc105 final graded project
    9·1 answer
  • a rule that states each foreign key value must match a primary key value in the other relation is called the
    5·1 answer
  • A bastion host allows the firewall to connect to the internal network and the perimeter network.TrueFalse
    15·1 answer
  • Emma lives in Pennsylvania, what climate does she live in?
    7·1 answer
  • What is the full from of CPU?​
    5·2 answers
  • What are benefits of using debugging tools? Check all that apply.
    7·1 answer
  • What feature allows you to access previous copies of a document on OneDrive?
    15·2 answers
  • A _____ is a character or group of characters that has a specific meaning. a. field b. record c. file d. database
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!