1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
never [62]
3 years ago
13

1.

Computers and Technology
1 answer:
podryga [215]3 years ago
7 0
1. false
2. true
3. true
4. false
5. true 

if you'd like me to elaborate, let me know.
You might be interested in
Is a practice that helps to prevent the download of viruses and other malicious code when checking your email?
Natalka [10]

Do not access links or hyperlinked media such as buttons and graphics in email messages.

<h3>What is a best practice that can prevent viruses and other malicious code?</h3>
  • View email in plain text and don't view email in Preview Pane.
  • Using antivirus software is the best way to defend your computer against malicious code.
  • If you think your computer is infected, run your antivirus software program. Ideally, your antivirus program will identify any malicious code on your computer and quarantine them so they no longer affect your system

To learn more about malicious code, refer

to brainly.com/question/9143118

#SPJ4

7 0
1 year ago
Define a function UpdateTimeWindow() with parameters timeStart, timeEnd, and offsetAmount. Each parameter is of type int. The fu
NARA [144]

Answer:

Here is a UpdateTimeWindow() method with parameters timeStart, timeEnd, and offsetAmount

// the timeEnd and timeStart variables are passed by pointer

void UpdateTimeWindow(int* timeStart, int* timeEnd, int offsetAmount){

// this can also be written as  *timeStart = *timeStart + offsetAmount;

*timeStart += offsetAmount;  //adds value of offsetAmount to that of //timeStart

// this can also be written as  *timeEnd = *timeEnd + offsetAmount;

  *timeEnd += offsetAmount;  } //adds value of offsetAmount to that of //timeEnd

Explanation:

The function has three int parameters timeStart, timeEnd, and offsetAmount.

First two parameters timeStart and End are passed by pointer. You can see the asterisk sign with them. Then in the body of the function there are two statements *timeStart += offsetAmount; and *End+= offsetAmount; in these statements the offsetAmount is added to the each of the two parameters timeStart and timeEnd.

8 0
3 years ago
What are some potential challenges that society will face given the digital revolution? You may want to think particularly of th
Feliz [49]

Answer:

Some said that technology causes more problems than it solves. ... Others said humans' uses and abuses of digital technologies are causing ... Highly technological societies have to be iterative if they hope to ... where we believe we can tell honestly delivered information from fake news and disinformation.

hope this helps...

Explanation:

7 0
3 years ago
The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos
cestrela7 [59]

Answer:

A. Helps prevent a system from being fingerprinted by port scans.

B. Can restrict a computer from receiving network traffic.

D. Stop a process or application from launching.

Explanation:

The "host-based firewall" is an important type of<em> firewall software </em>that is being installed into a computer/device in order to allow it to control the network traffic. This enables the host to protect itself from any malware or viruses that may attack. It, primarily, provides a customized protection. Thus, it is more commonly used by <em>small businesses</em> or<em> individual people</em>.

Host-based firewalls allows "packet filtering." This controls the network access which makes it hard for attackers because of the little information that it provides. So, this explains option A. This then prevents a system from being fingerprinted by port scans.

Host-based firewalls can protect the device from unwanted network traffic, so this explains option B. This then restricts the computer from receiving the network traffic.

It can disable programs that are malicious, thereby stopping the launching of those programs. This explains option D.

7 0
3 years ago
Data for which there is temporarily no Room in ram is diverted to where on your computer?
vlada-n [284]
If there isn't any room in the RAM (Random Access Memory), the program that will have the least affect on the PC will close.
Hope this helped
8 0
3 years ago
Other questions:
  • Kumar was working on his term paper and had not saved his work before the battery died on his laptop. He panics because the pape
    12·1 answer
  • Anyone wanna join a supercar/hypercar enthusiast's club?
    10·1 answer
  • Harvey is creating a presentation for his school project. He wants to have the same look on all the slides of his presentation.
    7·1 answer
  • What platform was PlayerUnknown’s Battlegrounds release on in March of 2018?
    15·2 answers
  • Dylan, an interior designer, has sketched out a layout for a client's living room. He wants the client's approval of the layout
    11·2 answers
  • Which IEEE standards define Wi-Fi technology?
    10·1 answer
  • Directory servers from different vendors are synchronized through ________.
    9·1 answer
  • What are some good digital habits?
    5·2 answers
  • What part of the meat help you identify the less tender cuts​
    13·1 answer
  • Which of the following is classified as a workgroup information system?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!