1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
3 years ago
8

As a student how can i stop Goguardian from seeing my screen or know when teacher are looking at my screen

Computers and Technology
2 answers:
Solnce55 [7]3 years ago
7 0

Answer:

what-

Explanation:

natka813 [3]3 years ago
7 0
Just simply hide your phone or put on low brightness
You might be interested in
The theory of continental drift suggests that at one time,
MakcuM [25]
The Continents were all joined into one land mass
3 0
4 years ago
Read 2 more answers
he Saffir-Simpson Hurricane Scale classifies hurricanes into five categories numbered 1 through 5. Write an application named Hu
AnnyKZ [126]

Answer:

The program plan requires the design of the gui program form

Explanation:

The program plan will be as follows:

take 4 label and 4 text box and 1 button and modify the property of controls to design the gui form.

use 6 if statements and 1 else statement.

use or operator for comparison.

show message in textbox.

program code:

using System;

using System.Collections.Generic;

using System.ComponentModel;

using System. Data;

using System.Drawing;

using System.LINQ;

using System.Text;

using System.Threading.Tasks;

using System.Windows.Forms;

namespace...

4 0
3 years ago
Read 2 more answers
Match each of the following steps of SDLC development to its position in the development process.
Arisa [49]

Answer:

Step One - problem/opportunity identification  (V)

Step Two - Analysis (III)

Step Three - Design (II)

Step Four - Development (I)

Step Five - Testing and Installation (IV)

Explanation:

In the field of software development, or systems engineering, SDLC which refers to software development cycle refers to a systematic way of building software applications, it shows unique stages with the outcome of each stage dependent on the previous, step has a unique task which range from the planning, analysis, development, testing and installation of the information system.

5 0
4 years ago
computer hardware without software is useless while computer software without hardware is meaningless. explain what do you under
Rainbow [258]

Answer:

That the software is useless

Explanation:

6 0
3 years ago
Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You've been assigne
Klio2033 [76]

Answer:

See the explanation for the answer.

Explanation:

Australian regulations makes extremely difficult for the enterprises to move organizations sensitive data to the cloud which is storing outside the Australian network. These are all managed by the Office of Australian Information Commissioner(OAIC) which provides oversight on the data privacy regulations designed to govern the dissemination of the sensitive information.

One rule they applied under this is The Australian National Privacy Act 1988 which tells how the organizations collect, use, secure, store the information. The National Privacy Principles in the Act tells how organizations should use the people's personal information. The NPP has a rule that An organization must take the responsibility to hold the information without misuse or modified by unauthorized access. They require enterprises to put security service level agreements with the cloud service providers that define audit rights, data location, access rights when there is cross border disclosure of information.

In later time they introduced a new principle called The Privacy Amendment Act 2012. This principle gives set of new rules along with the changes in the many rules in the previous act and also this is having a set of new principles those are called Australian Privacy Principles (APP).

In this there is principle for cross border disclosure of personal information which is APP8. This rule regulates the disclosure or transfer of personal information by an agency or company to a different location outside the country.

Before disclosure the information outside they have to take responsible steps that the company outside the Australia must not breach the APP 's.

3 0
3 years ago
Other questions:
  • Make the correct match.
    11·1 answer
  • The quality of a language that allows a programmer to express a computation clearly, correctly, concisely, and quickly is called
    7·1 answer
  • What is the maximum number of fonts that should be used on a slide?
    13·1 answer
  • Which of these expressions evaluates to 4.0?
    12·2 answers
  • True or false A ClassB fire involves live electrical equipment
    5·1 answer
  • Why do contour lines never cross?
    5·1 answer
  • Which of the following economic systems leaves production decisions completely up to the producers?
    15·2 answers
  • Hvhblfffffffff<br> eafafaefafsa
    9·2 answers
  • It's a holiday poop in my bitt
    10·2 answers
  • Exam Instructions
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!