1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
4 years ago
6

Need answer ASAP!!

Computers and Technology
1 answer:
kotykmax [81]4 years ago
3 0
They can also track you by your IP address which is kind of like a thumbprint for your computer. They can also find your channel and your youtube account as well. 
You might be interested in
In ____, data can move in both directions at the same time, such as with a telephone.
gtnhenbr [62]

The answer is d. full-duplex transmission. This communication setup allows for simultaneous transmit and receive for both parties. As signals are able to be transmitted at the same time two way for both parties, for both directions along the same data carrier medium.

4 0
3 years ago
A runner has a speed of 5m/ s and a mass of 130 kg. what is his kinetic energy?
kondaur [170]

Answer:

0.001625

Explanation:

if the velocity of an object is lower than 1% of light speed

8 0
3 years ago
General description of the problem
Elden [556K]

Explanation:

problem is the misunderstanding misbehaviour etc which harm us and others

4 0
3 years ago
By default, after how much time has elapsed in a client's DHCP lease will the client attempt to renew the lease?
maw [93]
The client will attempt to renew halfway through the time of the lease.
3 0
3 years ago
Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availabil
Mars2501 [29]
If I'm not mistaken firewalls should be enough as now the automatically  back up all data
4 0
3 years ago
Other questions:
  • Checking the ___________ will reduce the possibility of having to rebuild or replace the engine.
    9·2 answers
  • What is a break in the content that forces takes on to the next line
    10·2 answers
  • The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer sy
    14·1 answer
  • PLEASE HELP SOMEONE!!!!!!!!! WILL GIVE BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!! Fill in the blanks.
    15·1 answer
  • Which of the following is true regarding the use of instance variable j in class B1?
    15·1 answer
  • Write a program that uses nested loop or for statements to display Pattern A below, followed by an empty line and then another s
    5·1 answer
  • Write a function findWithinThreshold that identifies the elements of a given array that are inside a threshold value. Takes the
    13·1 answer
  • Can you please answer the question in the picture ! :)
    6·1 answer
  • 2. What is MOST TRUE of a mature technology?
    7·1 answer
  • eocs can be fixed locations, temporary facilities, or virtual structures with staff participating remotely.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!