1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
3 years ago
8

What can you do to help create a safe online environment?

Computers and Technology
2 answers:
Olin [163]3 years ago
5 0
Be mature, be careful with who you have on social media and watch for scams
jonny [76]3 years ago
3 0

Answer:

by not adding a scam proof app

Explanation:

because thats life

You might be interested in
________ a file transfers a copy of the file from the storage media into your computer memory
frez [133]
Is coping one of the answers? If so, I would say that.
6 0
3 years ago
Why now days 3D images are used in cartoons? What are the drawbacks of 2D image?
antoniya [11.8K]

Answer:

There are no drawbacks

Explanation:

People just think 3D is more modern-ish. I liked 2D better, but whatever- things are changing.

5 0
3 years ago
Read 2 more answers
The non-conditional boolean logical and operator is written as ____.
bixtya [17]
False because whhy would it be true. words of logic

3 0
3 years ago
he IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you do
Kamila [148]

Answer:

Check that virtual machines have always had the upcoming services packs as well as patches set up.

Explanation:

  • Among the very most essential preventive measures, you could even begin taking would be to download the application security relies on upon and splotches. The whole principle applies to routine OS, implementations as well as virtualization software.
  • It would not be appropriate for software applications to have been multihomed even though it will not seem to significantly boost their protection.
  • Penetration testing is being managed to complete before the implementation of virtual servers. Subnetting isn't necessary for virtual servers, and while it may improve safety. It must be factored into the equation during most of the capacity building phase.
7 0
3 years ago
In this problem you are to compare reading a file using a single-threaded file server and a multithreaded server. It takes 12 ms
borishaifa [10]

The answer & explanation for this question is given in the attachment below.

3 0
3 years ago
Other questions:
  • Ann wants to create a bookmark. She should
    9·2 answers
  • What is authentication?
    8·1 answer
  • While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes
    7·1 answer
  • ?trophic levelNYIGVU.;/IO9YK7,'0;
    12·1 answer
  • What is the top folder of the file tree called
    5·2 answers
  • Darren wants to substitute every occurence of the word bulky in his spreadsheet with the word strong. which of these options sho
    11·1 answer
  • Edhesive coding practice 3.4​
    12·1 answer
  • Slide layouts can be changed by _________
    6·1 answer
  • TRUE OR FALSE - SQL language is used to query data in a Relational Database?
    5·1 answer
  • Why accessing information over the internet is so convenient.​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!