1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semmy [17]
3 years ago
6

I was just called a man in a wig ugh Any tips for doxxing someone?

Computers and Technology
1 answer:
kondaur [170]3 years ago
6 0

Answer:

Explanation:

hope this help

You might be interested in
An important result of the development of anesthesia was?
Ksju [112]
It could be #2 since the patient would be asleep under the anesthesia they would be able to perform amputations more often since the patient would not be able to feel the pain during the procedure. It could also be #3 because if the patient is asleep you could use a more direct approach instead of avoiding certain procedures that would put the patient in a lot of pain if it was performed while they were awake. In all I would say the answer is #2, please comment which is the right answer, thank you.
7 0
4 years ago
Complete the code to finish this program to analyze the inventory for a store that sells purses and backpacks.
suter [353]

Answer:

import <em>csv</em>

fileIn = open("data/bags.txt","r")

countPurse = 0

Explanation:

Edge 2021

4 0
3 years ago
Required by the Fair and Accurate Credit Transaction Act of 2003 (FACTA), which of the following is an anti-identity theft rule
oksian1 [2.3K]

Answer:

Red Flags Rule

Explanation:

The Red Flags Law relies upon commercial banks and investors to put red flags in order to identify and deter identity fraud. Institutions must have a documented policy for the protection of fraud to control the organization and secure their clients.

Other options are incorrect because they are not related to the FACTA that is anti-identity theft rule.

3 0
3 years ago
What are two specific Netstumbler features that are related to cybersecurity? Name one feature that is related to improving cybe
NikAS [45]

The feature that can improve cybersecurity is the detection of interferences, and the one that can be used by hackers is checking the configuration of networks.

Netstumbler is a program used to identify surround wireless networks. This program is mainly available for Window systems and includes the following features:

  • Detecting wireless networks.
  • Detecting interferences.
  • Checking the configuration of networks.

These features have both a positive and a negative side as they can be used to increase cybersecurity, which is positive, but they can also be used by hackers to attack networks and the devices in them.

One positive feature is the detection of interferences because this can be used to detect possible external or threatening networks. On the other hand, checking the configuration can be a negative feature because hackers can use this information to enter and hack the networks.

Learn more in:  brainly.com/question/17021829

4 0
3 years ago
How does a layered pattern make use of abstraction and encapsulation?
maxonik [38]

Answer and Explanation:

The ways in which a layered pattern make use of encapsulation and abstraction are as follows:

  • This framework lays its focus mainly on the bundling of related functionalities inside an application into different layer that are vertically stacked over one another.
  • Functionality in between each layer is related by common function or role.
  • Communication in between the layers is clear and exact and is coupled loosely.
  • Providing a layered structure to the application indirectly supports its maintainability and flexibility.

Encapsulation:

Since, features like data type, properties, methods or implementation while designing are not exposed at the boundary of the layer thus No assumptions are required for these features.

Abstraction:

The layered framework abstracts the entire system's view and provides adequate details for better understanding of the roles of each layer individually and the relation that exist between these layers.

7 0
4 years ago
Other questions:
  • Bryan knows that it takes him fifteen minutes to drive to work, or twenty minutes if every traffic light is red on the way there
    14·2 answers
  • If you had a chance to see what your life would be like in 20 years
    8·1 answer
  • How to eject a flash drive from chromebook?
    6·1 answer
  • The type of human hair wig that is the most costly is:
    12·1 answer
  • How do computers use input and output to get and give the information that they need to solve problems?
    10·1 answer
  • Ryan is looking to buy a new HDTV set. He knows from friends that LCD set screens reflect less light than plasma set screens, bu
    10·1 answer
  • Programming a computer to win at chess
    7·2 answers
  • Where is the fill handle located
    7·1 answer
  • Which insert image option allows a user to insert images from the internet?
    5·2 answers
  • Being technologically literate requires being able to ______. a. use advanced graphics manipulation tools (adobe photoshop) b. u
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!