1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
3 years ago
8

What can you do to help create a safe online environment?

Computers and Technology
2 answers:
Olin [163]3 years ago
5 0
Be mature, be careful with who you have on social media and watch for scams
jonny [76]3 years ago
3 0

Answer:

by not adding a scam proof app

Explanation:

because thats life

You might be interested in
What process does a system use to officially permit access to a file or a program CIS 502 ?
ipn [44]

Answer:

Authorization                                

Explanation:

Authorization is a security process to determine access levels related to system resources such as files, services, computer programs, data and application features. This is the method of allowing or denying access to a resource which enables the user to get access to various services and resources depending on the user's identity.

Authorization is the process that checks if a user has the permission to get access to a particular file or perform a particular action, ensuring that user has successfully authenticated himself. It refers to defining access policy.

For example a system administrator determines for the system device, in multi-user computer systems, which users are granted access to system and its resources and privileges are granted.

4 0
3 years ago
What is the value of this expression?
Ahat [919]

Answer:

C. 4

Explanation:

typedef enum{

       red,orange,yellow,green,blue

}

color_t;

defines an enumeration type color_t with the values red,orange,yellow,green,blue.

If we print out the values of these individual elements they will be as follows:

red : 0

orange : 1

yellow: 2

green: 3

blue: 4

Note that the integer values are dependent on the position in the definition.

6 0
3 years ago
In 1948, a Bell Labs researcher named Claude Shannon wrote a technical report in which he proposed that all information media co
antiseptic1488 [7]

Answer: true

Explanation:

Claude Shannon’s law says that the highest obtainable error-free data speed, expressed in bits per second (bps), is a function of the bandwidth and the signal-to-noise ratio.

Claude Shannon is regarded as the father of Information technology and he was a researcher of Bell Labs. The report he presented is known as the Information report.

8 0
3 years ago
How do i describe a strategy for avoiding nested conditionals.
Rzqust [24]

Answer:

The target code is in the middle here and has a nice path up to it, however connecting the dots for the else conditions isn’t quite as clear. While this code might be understandable in the heat of writing, if you decided later that userOwnsCat() needed to be true for a user to log in, and you wanted a specific error condition for it…things get messy, quickly. Essentially, this code is not maintainable.

There’s no issue with the logic in this nested example – it’s just badly organised. The very same logic can be written in such a way that it only ever goes one level deep, and there’s not much to it either.

6 0
2 years ago
Word processing is the use of computer software to enter and edit text.
balu736 [363]

Answer:

True

Explanation:

Word processing software or word processing program handles functions related to entering and editing text in a text document. In essence a word processor processes text documents which includes processing entire papers, paragraphs, pages. With a word processing software text is entered  in the document mainly through typing in the letters with a keyboard and a word processor allows copying, deleting and formatting text through the use of built in commands

Examples of word processing programs are Microsoft Word, AppleWorks and OpenOffice.

7 0
3 years ago
Other questions:
  • What uses HTML hypertext links that users can click to access different locations or information?
    11·1 answer
  • Enter the number 2568 into the box below
    14·1 answer
  • A coworker is concerned about the veracity of a claim because the sender of an email denies sending it. The coworker wants a way
    6·1 answer
  • A manager would like information on the knowledge base searches conducted by customers and call center agents. Which two metrics
    10·1 answer
  • XYZ Corp.’s facilities in Nashua, New Hampshire, are two office buildings 400 feet apart, each with its own LAN. To connect the
    9·1 answer
  • You are asked to develop a cash register for a fruit shop that sells oranges and apples. The program will first ask the number o
    11·1 answer
  • To give your app users the ability to open your app directly from other apps by clicking a link, you should use:.
    11·1 answer
  • One friend claims that a dual-core system runs at twice the speed as a single-core system; another friend disagrees by saying th
    13·1 answer
  • What is an outcome in a game? Don't search google just give me an answer
    9·1 answer
  • What is professionalism and unprofessionalism in the work place?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!