1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miv72 [106K]
2 years ago
12

A user complains because the social media apps on his mobile device always note his location. The user is worried about privacy,

and would like to keep this information from being broadcast on his social media. Which of the following features should the user adjust in order to accomplish this?
Computers and Technology
1 answer:
stich3 [128]2 years ago
5 0

Answer:

Geotracking feature needs to be adjusted.

Explanation:

You might be interested in
What is the Kali Linux's kernel?<br><br> Sorry for english, but help me.
fenix001 [56]

Answer:

I don't knwo if thsi is what you mean, but Kali is a Debian-derived Linux distribution

Explanation:

8 0
3 years ago
A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
Lynna [10]

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

6 0
3 years ago
1. Write a function that will ask the user to enter a value in dollars. The function should calculate and display the equivalent
julia-pushkina [17]

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

   

    valueInDollars();

}

   public static void valueInDollars() {

       double currentMoney, quarters, dimes, nickels, pennies;

       Scanner input = new Scanner(System.in);

       

       System.out.print("Enter a value in dollars: ");

       currentMoney = input.nextDouble();

       currentMoney *= 100;

       quarters = (int)currentMoney / 25;

       currentMoney = currentMoney % 25;

       

       dimes = (int)currentMoney / 10;

       currentMoney = currentMoney % 10;

       

       nickels = (int)currentMoney / 5;

       currentMoney = currentMoney % 5;

       

       pennies = currentMoney;

       

       System.out.print("Quarters: " + quarters + "\n" + "Dimes: " + dimes + "\n" + "Nickels: " + nickels + "\n" + "Pennies: " + pennies);

   }

}

Explanation:

<u>Inside the function:</u>

- Declare the variables

- Ask the user for a value in dollars

- Multiply that value by 100

- Find the amount of quarters, dimes, nickels, and pennies

- Print the values

<u>Inside the main:</u>

- Call the function

3 0
3 years ago
What will be the output of the following lines of code and the user's response?
Arte-miy333 [17]

Answer:

The answer is C. 85

Explanation:

The int() function is usually used to turn a float, to an int<em>.</em> When you use the int() function, it just cuts of everything past the decimal. It doesn't round the float. Leaving you with the option C. 85

hope this helped you :D

6 0
2 years ago
Which of the following best explains how symmetric encryption are typically used?
Y_Kistochka [10]

A: Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

6 0
3 years ago
Other questions:
  • A slightly tapered thread is characteristic of a _______ tap.
    15·1 answer
  • 7.12 LAB: Contains the character
    12·2 answers
  • What are the five resources paid for by local taxes
    15·1 answer
  • Does the brain play a role in smartphone addiction
    7·2 answers
  • This is not a feature provided by most GUIS.<br> icons<br> windows<br> forms<br> menus
    14·2 answers
  • What is the function of a breadcrumb trail website
    7·1 answer
  • According to the video, what kinds of projects would Computer Programmers be most likely to work on? Check all that apply.
    13·2 answers
  • Dr. Kim divides a programming class into groups. Each group will create a large program as their
    15·2 answers
  • what is cicada 3301? i will give brainliest if you give me a correct answer (not copy and pasted) and somewhat well detailed, i
    8·1 answer
  • a central issue in the microsoft antitrust lawsuit involved microsoft's integration of its internet browser into its windows ope
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!