1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ronch [10]
3 years ago
7

Think about your favorite technology item - phone, game, smartTV, etc. - Write about how your favorite technology item has impac

ted your life. Be sure to include positive and negative influences this item has had for you. Make sure you write in paragraph form using complete sentences and proper capitalization and punctuation.
Computers and Technology
1 answer:
grandymaker [24]3 years ago
4 0

Answer:

that is about you you put what are the good and the bads of nechnoilogy

You might be interested in
what is the role of media in our society, and how can we become responsible consumers producers of news and information in the d
alexira [117]

1.Own your image, personal information and how these are used.Pay close attention to the 2.Terms of Use on apps and websites. ...

3.Obtain permissions when posting videos or 4.images of others on your networks. ...

Scrub your accounts. ...

5.Password diligence. ...

Spread love, not hate.

7 0
3 years ago
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
How to transfer audio files from computer to android?
fenix001 [56]
U can use Bluetooth connect your computer to the android. <span />
5 0
4 years ago
When is Hytale coming out?<br><br><br> P.S it might be Mine-craft 2.0<br><br><br> :)
cluponka [151]

No release date has been announced and there's only speculation. My best guess would be maybe Spring or Summer of this year

8 0
4 years ago
Which would take more storage space, a layer file showing all the us counties or a layer file showing all the us states?
Ksju [112]
All counties. Much more info. Although most layers are just excel files with geographical reference data in them. That one file may be several MB as the state file may be 1mb or less
5 0
3 years ago
Other questions:
  • Monica needs a printer to use at home. She wants fine-quality prints at an affordable cost. Which printer will help her achieve
    9·1 answer
  • How can I get a refund of my money back
    12·2 answers
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    15·1 answer
  • Ip addresses and their corresponding domain names are used to identify computers available through the internet.
    15·1 answer
  • A bug collector collects bugs every day for seven days. Write a program in Python that finds the highest number of bugs collecte
    11·1 answer
  • What is not soured of income
    6·1 answer
  • What era was the metalwork from
    10·1 answer
  • As a computer science student, which career you will select and what do you predict about the future of that specific IT-Career.
    8·1 answer
  • Question 11 of 20
    8·1 answer
  • In which directory would a system administrator store scripts that should be run monthly by the cron daemon?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!