1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
3 years ago
8

5 things that i learned about internet safty

Computers and Technology
2 answers:
77julia77 [94]3 years ago
8 0
Keep It Real, Protect Your Passwords,Post With Caution,Keep It Clean,<span>Don’t Meet Online Friends Offline</span>                                                            
Ksenya-84 [330]3 years ago
7 0
1. To not put your real name in a username
2. Don't give people your personal information
3. Tell your parents if someone messages you something and you don't know them
4. make your social media accounts private
5. Ask for a adult for help if you see something that confuses you
You might be interested in
Which are three possible text formatting actions in wordpad?
DaniilM [7]

Answer:

Font, Bold, italic, colored, centered text...

7 0
3 years ago
Describe how to deploy a website and make it as secure as possible while reducing its resources used
erastova [34]

Answer:

Explanation:

in order to deploy a website, you use these 5 steps, the first step is the preparation step, the second step is to set up DNS record, in step 3 a live testing is set up, in step 4 you set up email accounts while in step 5, you back up and now go live.

in order to secure your website from any threat, malware it hacker it it is necessary to use HTTPS. HTTPS, protects the websites integrity. it also provides data protection as data encryption provides such security. parameterized queries can also be used.

5 0
3 years ago
Which of the following is a way to sell the network proposal to management?Group of answer choicestalk about upgrades from 10Mbp
Assoli18 [71]
Ethernet is the best in reliability and speed
5 0
3 years ago
The outstanding disk requests are for tracks 6,10,4,20,36,8, and 40 in that order. Assume that the seek time speed is 5 msec/tra
kirill [66]

Answer:

a. FCFS

seek: 9+4+6+16+16+28+32 = 111 cylinders, 555 ms

b. SSTF

seek: 5+16+4+30+2+2+2 = 61 cylinders, 305 ms

c. C-LOOK

seek: 5+16+4+30+2+2+2 = 61 cylinders, 305 ms

Explanation:

a. FCFS: requests are served in the order they are received. It is used when load is low and has long waiting time for long requests queues.

order: (15), 6, 10, 4, 20, 36, 8, 40

seek: 9+4+6+16+16+28+32 = 111 cylinders, 555 ms

b. SSTF: requests are served using shortest seek time first. It minimizes arm movement, and maximizes request rate

order: (15), 20, 36, 40, 10, 8, 6, 4   15 10 8 6 4 40 36 20

seek: 5+16+4+30+2+2+2 = 61 cylinders, 305 ms

c. C-LOOK: requests are served in one direction until when done then reverses. It does not go to end of disk.

Assume maximum track is 50 then reverses

order: (15), 20, 36, 40, (50), 10, 8, 6, 4

seek: 5+16+4+30+2+2+2 = 61 cylinders, 305 ms

4 0
3 years ago
Which type of secondary storage has a fast reading access among the secondary storage​
Marrrta [24]

Answer:

RAM provides much faster accessing speed to data than secondary memory. By loading software programs and required files into primary memory(RAM), computer can process data much more quickly. Secondary Memory is slower in data accessing. Typically primary memory is six times faster than the secondary memory.

3 0
3 years ago
Other questions:
  • In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
    14·1 answer
  • Choose the correct answer base on the Components of Computer System
    14·1 answer
  • Pick 2 different operating systems and discuss how they can be used in daily operations.
    5·1 answer
  • Match each word to its correct meaning.
    7·1 answer
  • Write an algorithm which gets a number A, if it is even, prints even, and if it is odd prints odd.
    7·1 answer
  • import java.io\.\*; import java.nio.file\.\*; public class TestFileReader { public static void main(String[] args) { Path p = Pa
    14·1 answer
  • How are satellite radio, Internet radio, and podcasting different?
    11·1 answer
  • PHOTOSHOP IS A GRAPHICS EDITING PROGRAM CREATED WITH IMAGES KNOWN AS________ ​
    6·1 answer
  • How does naming affect a variable’s creation and use?
    6·1 answer
  • Help please! <br>Will give brainliest! ​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!