1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gwar [14]
2 years ago
12

How can computers be a threat to public safety??help asap marking brainiest ​

Computers and Technology
1 answer:
stiv31 [10]2 years ago
3 0
Loss or theft of your computer, smartphone or tablet. Malware, including spyware, on public computers. Theft of personal information from, or access to browsing history on public computers.
You might be interested in
A pointing device used mainly for computer games is known as
kolbaska11 [484]

Answer: Joystick is the only one that makes sense, a stylus and digitizer are both used on drawing tablets, not computer games.

5 0
3 years ago
11. Explain different types of program control with suitable flow chart.<br> N
melamori03 [73]

hi

Counting a sequence of statements without any decisions or branches as one control structure (as many computer scientists do),the if, if-else, and if-else-if ladders as one control structure,the three types of loops (while, do-while, and for) as three different control structures,the break and continue statements, in the context of loops, as one more (although this can be debatable),the switch/case control structure as one,the call/return mechanism as one,the ability to specify and call a callback function as one,the goto/label as one,and the setjmp/longjmp non-local goto as one,

5 0
2 years ago
What are the cons of using keyboard shortcuts?
Yanka [14]

Answer:

Mistakes can easily occur while using them.

4 0
3 years ago
What is the climax of Ralph breaks the internet?
Murljashka [212]

Answer:

As with the real internet, side quests often end up becoming main quests, and Vanellope falls in love with the gritty nature of internet gaming (through Gal Gadot's speed-racer Shank). Ralph Breaks The Internet also ends up going into the dark web and uses that to form the base of the climax of the film.

Explanation:

hope that help thanx

6 0
3 years ago
Which best describes how the government sanctions technological monopolies?
stira [4]
By simply prohibiting others from entering the markets is the best example how the government sanctions technological monopolies.
This is to avoid  competitors and give the people no choice but to buy thier products
4 0
3 years ago
Read 2 more answers
Other questions:
  • Jake and Sarah have an assignment of writing the history of American independence as a team. They divided their work in hait and
    7·2 answers
  • What is being measured using kbps, mbps, and gbps?
    7·1 answer
  • Can any existing directory beneath the system root directory be used as a mount point?
    9·1 answer
  • A word root is used to link a suffix that begins with a vowel. Which of the following words is an example of this rule? Group of
    6·1 answer
  • Hurry asap it’s times
    8·1 answer
  • What is the difference between dial up and broadband connections?
    15·2 answers
  • Which of the following keys open the spelling and Grammer dialog box
    6·1 answer
  • In order to create strong neural networks (connections) in your brain, you've got to __________ the learning process.
    14·1 answer
  • Java uses a right brace to mark the end of all compound statements. What are the arguments for and against this design?
    8·1 answer
  • From your first impressions, write down what first comes to mind as to what is good or bad about the way the website/system work
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!