1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trapecia [35]
3 years ago
6

There's a rising issue with bots sending links starting with 'bit'. These links are dangerous and harmful for any computer or de

vice. I'm on the hunt for these bots so that Brainly can take them down for exposing children to a harmful virus. Really appreciate if anyone found some accounts and reported them for posting harmful information on an unknown website.
-Φ
Computers and Technology
2 answers:
Paladinen [302]3 years ago
6 0

Answer:

⚠ warning, there are multiple bots that spam links, that are usually written in a link shortening form (eg, c u t . l y , b i t . l y) do NOT click on those links, as they usually contain trojan viruses, and/or adult content. please copy + paste this message so other users can be aware and stop these bots. thank you, and be safe! :)

Explanation:

hope this helps!

~evita

-Dominant- [34]3 years ago
5 0
Hi there I just posted a question and this pop up

You might be interested in
Which is a value of the Scrum Manifesto?
erma4kov [3.2K]

Answer: I think the answer is a. working software over comprehensive documentation

Explanation: Agile Manifesto is a brief document built on 4 values and 12 principles for agile software development. The Agile Manifesto was published in February 2001 and is the work of 17 software development practitioners who observed the increasing need for an alternative to documentation-driven and heavyweight software development processes.

7 0
3 years ago
The _______ "represents a set of features that enables the user to inform himself whether a security feature is in operation or
quester [9]

Answer:

Visibility and configuration of security.

Explanation:

The visibility and configuration of security represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

4 0
3 years ago
When working in Photoshop with the move tool, you can select multiple layers and use this option to arrange them into a straight
wel

Answer:

Distribute -  will put all of the layers in a straight line across the image

6 0
3 years ago
Read 2 more answers
When you open a program, the hard drive___
Papessa [141]

Answer:

When you open a program, the hard drive <u>Registers the program and runs the program accordingly. </u>

I hope this helped!

3 0
3 years ago
How do I fix this on my HiSense Roku tv this is on Xfinity Stream Beta the error number is -500
yawa3891 [41]

Answer:

it is something that you have to call your nearest xfinity store

i had the same problem but got it fixed

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What does hdtv stand for
    7·2 answers
  • What is code reuse meant to do?
    9·1 answer
  • What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?
    15·1 answer
  • A byte contains how many bits? Question 3 options:
    13·2 answers
  • _____________ helps to control and limit the number of consecutive request failures that cross a threshold. Review breaker Micro
    7·1 answer
  • A location in memory which stores a value, the value can change as the program is running is
    12·1 answer
  • My phone takes forever to load the ads, does anyone else have this problem? Is there a way to fix it? I’ve tried getting another
    12·2 answers
  • Aii so is anyone pushing P?<br> if u are u a g
    8·2 answers
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
  • External hard drives typically connect to a computer via an external port (such as a usb or ____ port) or a wireless connection.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!