1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
3 years ago
13

How does confidentiality protect people and their online activity?

Computers and Technology
1 answer:
zlopas [31]3 years ago
5 0
The answer is C Explanation: process of elimination
You might be interested in
What is the advantage of using CSS?
Naily [24]

Answer:

c) It creates a better-structured document

Explanation:

The layout of a web page is better controlled. Style (CSS) kept separate from structure (HTML), means smaller file size. Reduced file size means reduced bandwidth, which means faster loading time.

3 0
4 years ago
Read 2 more answers
Hi guys
Anastaziya [24]
Vectors and arrays are 0-based, so they don't start at 1 but at 0

your sort works by switching positions of 2 elements, which in your case didn't happen for the pair of the first&second element
your outer-loop starts with k=1, which should be k=0 instead
6 0
3 years ago
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attack
Strike441 [17]

Answer:

Intrusion Prevention System (IPS)

Explanation:

Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer

Thus, the tool you should use is an intrusion prevention system (IPS).

6 0
3 years ago
What are some examples for Environmental Technology? Also some negative and positive effects?
lakkis [162]
Wave energy and wind power (also hydroelectric dams as well), they create energy without pollution but need a lot of maintenance and some people disagree with their aesthetic influence of the countryside as they are very industrial looking  <span />
5 0
3 years ago
Does anyone know what the name of the game is, where you click on the grey dots in a 3x3 grid and try to make them all the same
antoniya [11.8K]

Answer:

Its the pattern puzzle game.

Explanation:

The answer is straight forward. Its a pattern puzzle game, and here we need to change everything to same color, and that is a pattern of this pattern game. Many forms of such pattern games are available, but this one happens to be the most popular among them all, and is widely used by various people of all ages to pass their time.

3 0
3 years ago
Other questions:
  • How to calculate 100MB at 56 Kbps to transfer time?
    13·1 answer
  • What defines a social search?​
    6·1 answer
  • Litmus-type test strips are used to test coolant for freeze protection and ?
    12·1 answer
  • Do you believe that technology has indeed flattened the world in terms of providing
    8·1 answer
  • You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to
    8·2 answers
  • Which of the following statements is NOT true regarding the Security Configuration and Analysis (SCA) tool?
    12·1 answer
  • Which programming languages are the best choices for desktop applications? Select 3 options.
    8·2 answers
  • Collaboration, listening, and negotiating are considered __________ skills.
    11·1 answer
  • Someone, please help me w/ king.com
    10·1 answer
  • What ways does e-governance empower citizens
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!