1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
2 years ago
11

The use of technology to observe a user's actions often without the user's knowledge is known as:

Computers and Technology
1 answer:
Margaret [11]2 years ago
5 0

Answer:

C

Explanation:

Computer surveillance refers to spying that allows the viewer to gain access of all activity on the given computer.

You might be interested in
NEED HELP NOW 25 POINTS WILL MARK BRAINLIEST!!!!!!!
Rudiy27
#1, Option D)filters let you filter out certain things or search for them. For example if i'm looking through a database with all the students grades. I could filter out everything that doesnt math a students name. This would only show results for what I searched for.
#2 Option C), filters make it easier to find specific information,
#3 Option A),the unwanted parts of the web are removed from sight!
#4 Option A) you must ad the sort feature first!
Have a splendid day!
6 0
3 years ago
Compute the bitwise XOR between 10010100 and 11101010.
Contact [7]

Answer:

The resultants bits for two strings are 0111 1110

Explanation:

Given details:

two pair of strings are

10010100

11101010

comparing two pair of strings, then perform XOR operation

Rules to follow for XOR

If both the bits are same then resultant is zero 0 and if bits are different resultant is one

XOR operation:

10010100

11 1 01010

-------------

01111110

The resultants bits for two strings are 0111 1110

8 0
3 years ago
Carbon copy others who are..
My name is Ann [436]

Answer:

Is it Multiple Choice Question?

5 0
3 years ago
Read 2 more answers
Write a program that: Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint:
Alika [10]

Answer:

Following are the code to this question:

#include <iostream>//defining header file

using namespace std;

int main()//defining main method

{

int x[]={2,3,4,6,7,8,9,1,11,12};//defining 1-D array and assign value

int i,sum=0;//defining integer variable

for(i=0;i<10;i++)//defining loop for count value

{

   if(x[i]%2==1)//defining if block to check odd value

   {

       sum=sum+x[i];//add value in sum variable

   }

}

cout<<sum;//print sum

return 0;

}

Output:

31

Explanation:

In the above-given program, an integer array "x" is declared that holds some integer values, and in the next line two integer variable "i and sum" is defined which is used to calculate the value.

In the next line, a for loop is declared, that counts all array value, and it uses the if block to check the odd value and add all the value into the sum variable.

5 0
3 years ago
Choose the term that describes each step of the cycle.
stich3 [128]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about to tell the best and suitable terms for the given descriptions in the question.

As we know that a computer program is based on sets of instructions. The CPU carries out the processing using the fetch decode and execute cycle.

It is responsible for implementing a sequence of instructions called a computer program that takes input, processes them, and outputs the result based on processing.

A CPU mainly has three components such as control unit, Arithmetic logic unit,  and register.

The control unit controls all parts of the computer system. It manages the four basic operations of the Fetch Execute Cycle such as Fetch, Decode, Executes, and Storage.

So the correct terms of this question are:

Fetch: Gets next instruction

Decode: interprets the instruction

Execute: Carries out instruction.

Store: Save results of instruction.

5 0
3 years ago
Other questions:
  • The following is true about SPAM ________.
    9·1 answer
  • To go to a specific cell, press the function key
    9·1 answer
  • 7.12 LAB: Contains the character
    12·2 answers
  • Briefly describe the client/server model.
    8·1 answer
  • Create detailed pseudocode for a program that calculates how many days are left until Christmas, when given as an input how many
    15·1 answer
  • What is keylogging attack?
    13·2 answers
  • Edhesive 3.4 practice 1
    9·1 answer
  • what is a program or collection of programs that enable a person to manipulate a visual images on a computer​
    14·1 answer
  • Which part of the computer is responsible for managing memory allocation for all applications
    12·1 answer
  • A type of attack where the adversary intercepts network packets, modifies them, and inserts them back into the network is called
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!