1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex Ar [27]
3 years ago
10

Anyone got an xb0x and wann be friends 16+

Computers and Technology
2 answers:
yarga [219]3 years ago
8 0
What your name on it?
Amiraneli [1.4K]3 years ago
4 0

Answer:pointsssExplanation:

You might be interested in
What do you think that private information like passwords pin number will be guarded or shared with the public? why?
konstantin123 [22]

The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

<h3>Why should you use passwords to protect private information?</h3>

Passwords is known to be that factor that tends to give the first line of defense against any form of what we call illegal access to your computer and also that of one's personal information.

Note that the stronger a password of a person is, the more protected one can say that one's computer will be from any kind of hackers and malicious software.

Therefore one need to or one  should maintain the use of a strong passwords for all accounts that are present on your computer.

Hence, The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

Learn more about passwords from

brainly.com/question/17174600

#SPJ1

4 0
1 year ago
Your brother is a video producer and is looking to buy some sort of new computing device. he needs a lot of memory and processin
mafiozo [28]
He should purchase a Desktop PC as it would allow him to install high-power parts such as RAM, Graphics Card and CPU.
3 0
3 years ago
What does your digital footprint say about you? Does your digital footprint
faust18 [17]
Your digital footprint says a lot about you. It represents your difference from everyone else and that you can’t be exactly like someone else. Your digital footprint also shows that there is one part of you that stays true to itself and never changes. It aligns with a purpose for almost everyone. That purpose is to be yourself because no matter how hard you try to be like someone else, something will always remain true to the real you.

Hope this helps. If this isn’t the type of answer you were looking for, I apologize.
7 0
3 years ago
The columns of a spreadsheet data source are A. form letters. B. the mailing list. C. data points. D. fields.
mojhsa [17]

I believe it is C, I'm so sorry if im incorrect.

8 0
3 years ago
Type the correct answer in the box. Spell the word correctly.
Liono4ka [1.6K]

Translators convert code written in a high-level language to the machine language.

4 0
3 years ago
Read 2 more answers
Other questions:
  • What is the different between image processing and machine vision? Please explain with an example.
    11·1 answer
  • Book checkout scenario at a library: The Worker tells the System the identity of a patron who wishes to check out books. The Sys
    8·1 answer
  • When protecting a worksheet all cells are locked by default.?
    10·1 answer
  • Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form compl
    11·1 answer
  • Who is a software engineer
    8·2 answers
  • Which of these is an aggregator?
    9·2 answers
  • Taking a group of recipes and identifying the similarities is an example of _____.
    13·1 answer
  • In 1981, the first digital icons were launched for users in _________, which was the first computer with a GUI operating system.
    12·1 answer
  • when working with smart which tab would provide the ability to change the shape or size of the smart art shapes
    15·2 answers
  • Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!