1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rus_ich [418]
3 years ago
12

ALRIGHT SO- There's this link that's been going around, it's like- "tinyclick" then a buncha letters, please don't click on it,

it's apparently a virus/website that shows very- explicit images. BUT. Here are some of the users of people that carry the link
Broadcastbroiler
Horilinkee55
Andypandy33
Zackattacko33
Xire4444ha3k
Zintihacklink4455666
Hackalink666time5
Hintorie999

They normally say "The answer is in the link below" or "The answer is in the file below."

Please report any of these that you see, stay safe!
Computers and Technology
2 answers:
IgorLugansk [536]3 years ago
7 0
I have been getting a lot of these thank you for warning others!
fenix001 [56]3 years ago
5 0

Answer:

Thank you for spreading awareness about this situation!

Explanation:

You might be interested in
Zenmap's topology tab displays a __________ that shows the relative size and connection type of all discovered ip hosts.
VladimirAG [237]
<span>Zenmap's topology tab displays a "Bubble Chart" that shows the relative size and connection type of all discovered IP hosts.
</span>A kind of chart which shows three dimensional data is known as Bubble chart. It also can be seen as the variation of scatter plot where bubbles replace the data points.
4 0
3 years ago
A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
mel-nik [20]

Answer: True

Explanation:

Digital forensic analysts are the people who examine digital devices such as cameras, mobile phones and computers in order to get evidence of crime.

The evidence gotten by them can then be used to provide support to criminal investigations and can also be given to the intelligence agencies. Their function is to get back and safeguard the digital data which are related to cybercrime investigations as well as criminal investigations.

6 0
3 years ago
in a mechanism ,when the input goes from a small gear to an output which is a larger gear the speed will _____
dsp73
The speed (rotations per minute) will decrease.
3 0
3 years ago
Software piracy is acceptable as it helps us obtain software cheaper or sometimes even for free.
ELEN [110]

Answer: 1. False 2. True

Explanation: Piracy in any capacity is in fact illegal and might possibly be a felony I'm not quite sure. But it's just like stealing a toy from the store, somebody worked hard to make it and you best be paying for it.

Software licenses on the other hand usually give you permission to install the software on one or many machines depending on the license you purchase, but usually, if you paid for it once, you can use it anywhere.

8 0
3 years ago
Read 2 more answers
4. An abstract data type is defined as _____.
marusya05 [52]

Answer: object that persist set of values and operations as behavior

Explanation: Abstract data types(ADT)are those object value which are dependent upon the collection of the values and collection of the operations.The organization of the data object is not specified in ADT but the operations that are to be carried out are defined in it.

The implementation individuality displayed by the ADT and hiding of the representation or design makes it abstract.

8 0
3 years ago
Other questions:
  • Keyboard shortcut could you use instead of clicking the icon
    11·1 answer
  • 01110111 01101000 01100001 01110100 00100000 01101001 01110011 00100000 00110001 00101011 00110001
    7·1 answer
  • Memory, as a general construct, is best defined as A) the ability to briefly retain information in the senses. B) the long-term
    12·2 answers
  • a sign is to be hung from the end of a thin pole, and the pole supported by a single cable. your design firm brainstorms the six
    13·1 answer
  • The following characteristics are common to the majority of cloud environments, except: 1. on-demand usage 2. resiliency measure
    12·1 answer
  • A network administrator was testing an IPS device by releasing multiple packets into the network. The administrator examined the
    13·2 answers
  • If you were practicing keyboarding and the exercise contained the letters, q, o, e, p, r, and t, what section of the keyboard ar
    12·1 answer
  • Jennifer has written a short story for children. What should be her last step before she submits the story for publication?
    6·1 answer
  • How do you change the colors of files?
    11·1 answer
  • What is resource pooling?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!