1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
3 years ago
13

Which statement is true about mobile devices and your personal information?

Computers and Technology
1 answer:
sdas [7]3 years ago
4 0

Answer:

B Mobile devices must be protected because they contain private information about the owner.

Explanation:

B is correct because people do need to keep their mobile device protected from people who want to take their information because a mobile can carry a lot of personal information about someone and if stolen, a person could potentially steal someone's identity. Answer A is not true because at some locations mobile devices can be very cheap. The answer is not C because mobile devices CAN be stolen because anyone could easily take your phone out of your hand and run away with it. The answer is not D because your phone could get a virus and in many cases the virus can easily steal all of your information with knowing or not knowing your password because it might be downloaded already into you device.

You might be interested in
Consider sending a 10000-byte datagram into a link that has an MTU of 4468 bytes. Suppose the original datagram is stamped with
AfilCa [17]

Answer:

Number of fragments is 3

Explanation:

The maximum size of data field in each fragment = 4468 - 20(IP Header)

= 4448 bytes

Hence, the number of required fragment = (10000 - 20)/4448

= 3

Fragment 1

Id = 218

offset = 0

total length = 4468 bytes

flag = 1

Fragment 2

Id = 218

offset = 556

total length = 4468 bytes

flag = 1

Fragment 3

Id = 218

offset = 1112

total length = 1144 bytes

flag = 0

5 0
3 years ago
24 ________ are graphical represenattaion of distribution of data. a) bar graph b) pie charts c) histogram d) frequency chart
coldgirl [10]
A bar graph is a great graphical representation of disributiation of data
8 0
3 years ago
What is the value of count after this nested FOR loop executes fully.
Alisiya [41]

Answer:

168 (although the =< must be corrected to <=)

Explanation:

int count = 0;

for (int row = 4; row <= 15; row++)

for (int col = 0; col < 13; col = col +2)

count+=2;

The inner for loop runs 7 times (for col = 0,2,4,6,8,10,12). Anything higher is not less than 13. Therefore the inner loop increments count by 2 seven times, i.e. it increments count by 14.

The outer for loop runs 12 times (for row = 4,5,6,7,8,9,10,11,12,13,14,15).

If the count is incremented by 14 twelve times, you are incrementing it by 14*12 = 168.

Therefore the count goes from 0 to 168 after the nested loops.

5 0
3 years ago
What is the disadvantage of a series circuit? A. The lights in a series circuit shine too brightly B. A series circuit can have
zhuklara [117]
The answer is B or C
4 0
4 years ago
Assume the following variable definition appears in a program:
AnnZ [28]

Answer:

cout << setprecision(2)<< fixed << number;

Explanation:

The above statement returns 12.35 as output

Though, the statement can be split to multiple statements; but the question requires the use of a cout statement.

The statement starts by setting precision to 2 using setprecision(2)

This is immediately followed by the fixed manipulator;

The essence of the fixed manipulator is to ensure that the number returns 2 digits after the decimal point;

Using only setprecision(2) in the cout statement will on return the 2 digits (12) before the decimal point.

The fixed manipulator is then followed by the variable to be printed.

See code snippet below

<em>#include <iostream>  </em>

<em>#include <iomanip> </em>

<em>using namespace std;  </em>

<em>int main()  </em>

<em>{  </em>

<em> // Initializing the double value</em>

<em> double number = 12.3456;  </em>

<em> //Print  result</em>

<em> cout << setprecision(2)<< fixed << number;  </em>

<em> return 0;  </em>

<em>}  </em>

<em />

4 0
3 years ago
Other questions:
  • DHCP and FTP servers listen for and send network traffic on:
    5·1 answer
  • A computer application such as Microsoft Access that is used to store data and convert it into information is a ________________
    6·1 answer
  • ​A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around th
    14·1 answer
  • Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
    8·1 answer
  • When you're working on an image, it's a good idea to make a ____________ of the image, so that you'll have the original image in
    12·2 answers
  • Write a program which populates an array with integer values read from a file. We do not know how many integers are in the file,
    8·1 answer
  • Describe the process of normalization and why it is needed.
    12·1 answer
  • In the language of the World Wide Web, "this page cannot be displayed" means A. your computer's software is damaged. B. the ISP
    10·2 answers
  • Which view would you need to use to make changes to the design theme for the entire presentation?
    10·2 answers
  • FIRST TO Answer for free brainlest. GOG GOGOGO
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!