1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
3 years ago
10

Scott does not use privacy settings on his social media

Computers and Technology
2 answers:
likoan [24]3 years ago
7 0

Answer:

ARREST HIM!!!

Explanation:

Alborosie3 years ago
6 0

Answer:

Explanation

arrest him

You might be interested in
Anybody wana play 2k21
Vaselesa [24]

Answer:

no

Explanation:

no

4 0
3 years ago
Read 2 more answers
Explain briefly why we say that the "Web" exists only in our minds.
hammer [34]

Answer:

The Web is the system of web pages and sites that uses the Internet to pass the files across. It was developed in the late 1980’s by Tim Berners-Lee, and you <em>need a Web Browser to access it</em>. This could either be in a PC, a mobile phone or one of the new iPods.

Explanation:

I guess you could look at it as just one of many services that use the Internet – other services include e-mail, internet telephony and peer-to-peer file transfers. Hope this helps ^-^

4 0
3 years ago
Plz answer it’s timed
MAVERICK [17]

Answer: the third one

Explanation:

just trust me, the other ones dont mke sense to what I know about the subject, which is a lot

7 0
3 years ago
In terms of shaping the future of cybersecurity in the United States, how influential do you think the Russian hacking efforts o
Norma-Jean [14]

The influence of the Russian hacking efforts of the 2016 election was known to be greater when compare to things like the Creeper Virus, Morris Worm, or Captain Zap’s hacking of the AT&amp;T online computer system.

<h3>What aspects of this incident could get in the way of the U.S. government responding effectively to the risks the hacking poses?</h3>

The aspect that government that government need to guard against is  stealing of government and business secret as well as people's personal information.

Note that they are a lot of tools that are known to be made up of the National Cybersecurity Protection System such as the EINSTEIN cyber intrusion detection system  and others.

Therefore, The influence of the Russian hacking efforts of the 2016 election was known to be greater when compare to things like the Creeper Virus, Morris Worm, or Captain Zap’s hacking of the AT&amp;T online computer system.

Learn more about Cybersecurity from

brainly.com/question/28004913

#SPJ1

6 0
2 years ago
In this exercise, you are agiven a phrase that may or may not contain the word “plate”. If the word does exist, replace all occu
Aloiza [94]

Answer:

Is in the provided screenshot!

Explanation:

Steps required to solve this problem

1) Take the input sentence and split it up into its separate words

2) Go through each word and see if it starts with the word plate.

- We need to check that it starts with plate and not if it equals plate so we can make sure that we keep any punctuation that is on the end of the word.

3) We also need to check if the word is not plates, so we can do that here.

4) If the word is plate, but not plate - then we can replace it with bowl

5) Now we just put our individual words back into a full sentence

7 0
3 years ago
Other questions:
  • List two reasons why buying a computer is no easy task?
    7·1 answer
  • Write a pseudocode that will take marks of physics, chemistry and math as input, calculates the average and displays output.
    7·2 answers
  • Create a method called fixArray(int[][] array, int row, int col, int value) that sets the [row][column] to the correct value. Th
    5·1 answer
  • Will mark brainliest if correct. First come, first serve.
    10·1 answer
  • You will be given a grocery list, followed by a sequence of items that have already been purchased. You are going to determine w
    7·1 answer
  • What is the grooming process as it relates to online predators?
    12·2 answers
  • Which function in Ecels tells how many numeric entries are there​
    7·2 answers
  • Why do you think it is important to know typography and color when designing web sites?
    15·2 answers
  • Write a code segment that will store a dinner selection in option1 based on the values of rsvp and selection. The intended behav
    5·1 answer
  • Which term refers to a shorthand method for identifying network and host bits in an ip address?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!