1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
12

1. What are you going to do if someone ask for your personal information online?​

Computers and Technology
2 answers:
Stells [14]3 years ago
7 0

Answer:

Ask them why they need such information.

Explanation:

If they can't give you a good reason, please don't share your personal info. ♥

horsena [70]3 years ago
6 0

Answer:

<em>If someone ask my personal information online i'll  trun off  my mobile data or wi-fi  and then i'll block the user's Id</em>

Explanation:

<h2>hope it is helpful to you</h2><h2 />
You might be interested in
An educational institution has a number of buildings in the campus. Each building has its own independent network system, and al
Aloiza [94]
Answer: star topology.

Explanation:

The layout of the way how the computers in a netword are interconnected is called network tipology.

Some types of network topologies are:

1) Point-to-point tipology: all the computers are connected to each other directly (computer-to-computer, in pairs, this is a direct link between each two computers).

2) Bus topology: all the nodes (computers or server) are connectect to a maing cable.

3) Star topology: all the computers are connected to a central computer or server which is called central hub. This is the layout described in the question.

4) Ring topology: the computers are connectec in a circular path; each computer is connected to the next computer.

5) Mesh: every computer is connected to every other computer.




8 0
3 years ago
Read 2 more answers
Please Help Me <br> Why is IT important to different businesses?
Vesna [10]

Answer:

Technology has important effects on business operations. No matter the size of your enterprise, technology has both tangible and intangible benefits that will help you make money and produce the results your customers demand. Technological infrastructure affects the culture, efficiency and relationships of a business.

Explanation:

your welcome but ew..

6 0
3 years ago
If you want to share files on your computer with other Windows computers, what should you have installed and enabled on your com
Troyanec [42]

Answer: One Drive

Explanation:

5 0
3 years ago
Slide transition can be defined as ____ of one slide after another​
UkoKoshka [18]

Answer:

visual effect

Explanation:

A slide transition is the visual effect that occurs when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of transition effects.

6 0
3 years ago
Which wireless communication is typically limited to six feet of distance?
Nutka1998 [239]

Answer:

Bluetooth

Explanation:

Bluetooth is a standard to share data between Mobil devises, typically less than 10 m (33 ft), up to 100 m (330 ft), but the Bluetooth 5.0 has a range of 40–400 m (100–1,000 ft), in addition, NFC is something similar because needs a separation of 10 cm or less, and with RFID we can read to hundreds of meters.

3 0
3 years ago
Other questions:
  • Plz tell me a storage device that should be used for this and why
    11·1 answer
  • Which step can most directly help your team follow up on decisions made during Web development meetings?This task contains the r
    6·1 answer
  • 2. Suppose you want to write a method that prints a heading on a new output page, along with a page number that is 1 in the firs
    15·1 answer
  • In addition to the decimal number system, the number systems used most often in PLC operationand programming are ________.
    9·1 answer
  • Which of the following statements is true of a server? Question 18 options: A) It supports processing requests from remote compu
    11·1 answer
  • Write a program that reads in 10 numbers and displays the number of distinct numbers and the distinct numbers in their input ord
    14·1 answer
  • Maria is creating a program where the user will enter their name to begin. What kind of variable should be used for the user’s n
    15·2 answers
  • What Microsoft feature enables you to represent text as colorful visuals
    12·1 answer
  • Find an interesting case on the concept of intellectual property
    14·1 answer
  • The network of safe houses that assisted runaway enslaved people was known as:.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!