1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
3 years ago
6

What are practical things people can do to protect their privacy and security online? What can we do, and what can we avoid doin

g?
Please help this is due today and I really need help.
Computers and Technology
1 answer:
Tamiku [17]3 years ago
7 0
There are multiple ways people can protect there privacy like you don’t even have to get online just block yourself away from the world or you can make sure that your always connected to a vpn with hides you from being online or you can avoid putting in your real information if it’s not needed
You might be interested in
What is the purpose of the ISOWEEKNUM function
stellarik [79]

Answer:

Explanation:

The ISOWEEKNUM Function in Excel is a Date & Time Function. This cheat sheet covers 100s of functions that are critical to know as an Excel analyst used for finding out the ISO week number of the year for the given date value (e.g., week number 37 of 52 weeks in a year). The function was introduced in MS Excel 2013.

7 0
3 years ago
Read 2 more answers
What naming scheme identifies the rows in a worksheet?
german
Rows are identified numbers and columns are identified by letters. Cell is A3, that means the cell is in column A and row 3.
7 0
4 years ago
Which of the following is needed if a computer with the IP address 172.31.210.10/24 wants to communicate with a computer with th
ozzi

Answer:

The answer is <em>since both ip addresses are not within the same subnet,   only router can be used for the two computers to communicate together.</em>

Explanation:

From the statements in the question, since  the two ip addresses are not on same subnet value i.e 172.31.210.10/24 and 172.31.209.122/24 then both computers cannot communicate except a router is used for network connections for the two different subnets as they are not on the same network.

Explanation:

4 0
4 years ago
You're in the process of downloading some email messages when your antivirus software displays an alert. you assume the software
Y_Kistochka [10]
Please provide additional information in order to provide an answer to your question.
7 0
3 years ago
if ( (ans == 'Y' &amp;&amp; errors &lt; 5) || numTries &lt; 10 ) // note uppercase 'Y' count++; Which combinations of values res
Shkiper50 [21]

The correction options to the case abode are:

Option B. ans = 'Y' (upper case)

errors = 6

numTries = 5

Option C. ans = 'y' (lower case)

errors = 4

numTries = 5

Option D. ans = 'Y' (upper case)

errors = 100

numTries = -1

<h3>What is Coding?</h3>

Computer coding is known to be the act that entails the use of computer programming languages to instruct the computers and machines on a given number of instructions on what need to be  performed.

Note that in the statement above,  the combinations of values results in count being incremented after the statement is complete is option B, C and D.

See full question below

Learn mode about coding from

brainly.com/question/22654163

#SPJ1

3 0
2 years ago
Other questions:
  • What is the result of segmenting a network with a bridge (switch)? (Choose two)
    14·1 answer
  • Design two subclasses of Employee…SalariedEmployee and HourlyEmployee. A salaried employee has an annual salary attribute. An ho
    12·1 answer
  • A ____ is a synonym for a virtualization application.
    5·1 answer
  • Here is free points im leaving
    11·2 answers
  • What is the name of a button on a website?
    11·1 answer
  • What do flowcharts communicate to programmers ?
    10·1 answer
  • Explain the iterative nature of the database requirements collection, definition, and visualization process.
    14·1 answer
  • kayah has created a website that explains what her business does. what type of computer program is needed to access/view kayah's
    7·2 answers
  • The Backstage view is where you can see information and options pertaining to the user account and settings. How is the Backstag
    14·1 answer
  • List and describe the five moral dimensions that are involved in political, social, and ethical issues. Which do you think will
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!