1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trapecia [35]
2 years ago
6

if i am on a personal laptop and at school using the shcools wifi, can they still use go gaurdian. Or can go gardian only be use

d on school chromebooks, not just devices on their network
Computers and Technology
2 answers:
Art [367]2 years ago
7 0

Answer:

if ur using ur own profile, they wont be able to but if ur logged into chrome then it will. (its a chrome extension only so ur safe if ur not using chrome)

Explanation:

'The Go Guardian extensions are deployed via the GA Console to each individual user and will only be present when the user is logged into the Chrome browser.'

dalvyx [7]2 years ago
5 0

Answer

No I believe that it works on the computers instead of the wifi

You might be interested in
In programming, what is a string?
vovikov84 [41]

Answer:

B.

Explanation:

A. is not the correct answer because that is called a LAN cable (ethernet)

C. is not correct because it has nothing to do with text messages or printing

D. is called a Bus, and isn't the right answer either

3 0
3 years ago
Read 2 more answers
your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you
nlexa [21]

The protocol that should be used for establishing a secure network connection is SSH.  

The following information is to be considered:  

  • SFTP is secure also it is a protocol for file transferring that applied SSH.
  • IP, FTP, and DHCP should not be for safety purposes as they are not secure.
  • SSH is a secured connection for the remote sites so here the SSH protocol should be used.

Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.

4 0
2 years ago
: Each individual data items of record is called a
musickatia [10]
Each individual data items of record is called field (letter A).
The client may communicate with Proxy server to use a protocol to proxy the communication between the client and the DBMS. Proxy servers lets you hide your real Ip address and replaces it with a new IP obtained from proxy server sites.

6 0
4 years ago
What is the memory of a computer called
Nataliya [291]
It is called Ram in another term for memory :)
6 0
3 years ago
Read 2 more answers
5. Robotics deals with the design, construction, operation, and use of robots, as well as computer systems for their control, se
Law Incorporation [45]

The answer would be

True

3 0
3 years ago
Other questions:
  • What is your understanding of the difference between a stream cipher and a block cipher?
    14·1 answer
  • How can you tell if a website is secure
    13·1 answer
  • The position of a _____ is a nontechnical position responsible for defining and implementing consistent principles for setting d
    15·1 answer
  • Charles would like to visit a specific page on the World Wide Web. How should he do it? Enter the address in a search engine cli
    15·2 answers
  • One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
    12·2 answers
  • A Windows application which demands a lot of raw processing power to execute repetitive complex calculations is a good candidate
    9·1 answer
  • You are a domain administrator for a large domain. Recently, you have been asked to make changes to some of the permissions rela
    11·1 answer
  • What word describes a violation of copyright laws? What rights do copyright holders have over their work of art
    5·2 answers
  • A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a devic
    7·1 answer
  • The rectangle shape in flowchart is used for
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!