1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juliette [100K]
3 years ago
9

How do you get banned? By getting reported? Or do admins watch whats posted?

Computers and Technology
1 answer:
Andrew [12]3 years ago
4 0
By mostly getting reported by people 

You might be interested in
Given that add, a function that expects two integer parameters and returns their sum, and given that two variables, euro_sales a
Evgesh-ka [11]

Answer:

int eurasia_sales = add(euro_sales,asia_sales);

Explanation:

Kindly find the explanation attached

Download txt
7 0
4 years ago
A web crawler uses a search _______ to traverse the web.​
aliina [53]
<span>A web crawler uses a search algorithm to traverse the web.
</span>The web crawler is responsible for the process of browsing the net. It systematically browses the World Wide Web<span> by looking at the keywords in the pages, the kind of content each page has and the links, and then return this information to the search engine.</span>
The process is called Web crawling or spidering.
7 0
4 years ago
How to install specific microsoft office 2016 aoos
Mandarinka [93]
Go onto their website and download it.
6 0
4 years ago
A safety procedure that enables a trusted party to have a copy of the encryption key is called key __________.
Anuta_ua [19.1K]

The safety procedure that enables a trusted party to have a copy of the encryption key is called key escrow.

<h3>What is encryption?</h3>

The process to convert data into a coded message that conceals its real meaning is known as encryption.

As we know,

Key escrow is the security measure that makes it possible for a reliable third party to own a copy of the encryption key.

Electronic cash systems employ encrypting to secure traditional transaction information like account information and activity amounts.

Thus, the safety procedure that enables a trusted party to have a copy of the encryption key is called key escrow.

Learn more about encryption here:

brainly.com/question/17017885

#SPJ4

7 0
2 years ago
Explain what is a database schema and mention one example
Taya2010 [7]

Answer:

Database schema is a structure that are used to represent the logical base in the database. Database schema is the logic arrangement of objects in the form of tables. It basically defines the entities and the relationship between them. Schema is the organisation of data in the database system.

It is divided into two main parts that is:

  • Logical database schema
  • Physical database schema

Example:

When we create a table with the student name then, the logical database schema contain the student name, student ID and the project name. Then, the student table basically stored in the physical database schema in the form of file.

4 0
4 years ago
Other questions:
  • When communicating with sockets, a client process initiates a request for a connection and is assigned a port by the host comput
    5·2 answers
  • Computer ________ involves identifying, extracting, preserving, and documenting computer evidence. a. inoculation b. forensics c
    8·1 answer
  • Diagnosing is solving the problem, and trouble shooting is figuring out what the problem is.
    15·1 answer
  • Design a database to keep data about college students, their academic advisors, the clubs they belong to, the moderators of the
    12·2 answers
  • is an interviewing method in which a mall interviewer intercepts and directs willing respondents to nearby computers where each
    7·1 answer
  • A network administrator was testing an IPS device by releasing multiple packets into the network. The administrator examined the
    13·2 answers
  • Assume variables SimpleWriter out and int n are already declared in each case. Write a while loop that printsA. All squares less
    11·1 answer
  • Is there an alternative website of https://phantomtutors.com/ to get guidance in online classes?
    15·1 answer
  • What type of programing code do game developers use.
    13·1 answer
  • Combining data and code in a single object is known as
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!