1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa86 [58]
2 years ago
11

Cookies contain information about you. This information, if not encrypted, could be viewed by a third party. The best practice t

o prevent this from happening is: ________-
Computers and Technology
2 answers:
yarga [219]2 years ago
6 0

Answer:

Decline I think

Explanation:

Lady bird [3.3K]2 years ago
5 0

Answer:

Delete Cookies When You Can And If You Can Get A VPN But If You Can Do It, If It Doesn't Look Real Dont Click On Random Websites That Get Your Cookies

Explanation:

You might be interested in
Write a function that takes an integer value and returns the number with its digits reversed. for example, given the number 7631
lesantik [10]

//=indicating you to do the programming part on your own relating to the description provided against. This done because different programming languages require different coding for that.

n=integer value

n1=dummy storage for n

r=variable used to do the function

{

int n,r,n1,rev=0;

//do the coding here for storing the integer in the variable n

n1=n;

while(n>0){

   r=n%10;

   rev=(rev*10)+r;

   n=n/10;

   }

//now add a command for displaying the value of rev

}

this is just a logic i used for java

done.

3 0
3 years ago
Write code to define a function named mymath. The function has three arguments in the following order: Boolean, Integer, and Int
saveliy_v [14]

Answer:

public class Main

{

public static void main(String[] args) {

Main m=new Main();

System.out.println(m.mymath(true,5,2)); // calling the function mymath

}

public int mymath(boolean a,int b,int c) // mymath function definition

{

if(a==true)

{

int d=b+c;

return d;

}

else{int e=b-c;

return e;

}

}

}

7 0
2 years ago
Why is the computer uses binary why not trinary?​
Ray Of Light [21]

Explanation:

because they only function with that one the gates also prevent it from being able to use it

3 0
3 years ago
Using information from the lesson, explain how new technologies change your experience as a consumer.
densk [106]

Technological improvements allow me to have greater access to goods around the world. I can buy instantly and communicate instantly with producers. Technology can also help me to monitor economic trends, both in my country and in my own life. In summary, technology helps to give me more freedom to make economic choices.

On e2020

6 0
3 years ago
Read 2 more answers
Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 40964096-byte cache us
pogonyaev

Complete Question:

Determine the number of cache sets (S), tag bits (t), set  index bits (s), and block offset bits (b) for a 4096-byte cache using 32-bit memory addresses, 8-byte cache blocks and a 8-way associative design. The cache has :

Cache size = 1024 bytes, sets t = 26.8, tag bits, s = 3.2, set index bit =2

Answer:

Check below for explanations

Explanation:

Cache size = 4096 bytes = 2¹² bytes

Memory address bit = 32

Block size = 8 bytes = 2³ bytes

Cache line = (cache size)/(Block size)

Cache line = \frac{2^{12} }{2^{3} }

Cache line = 2⁹

Block offset = 3 (From 2³)

Tag = (Memory address bit - block offset - Cache line bit)

Tag = (32 - 3 - 9)

Tag = 20

Total number of sets = 2⁹ = 512

3 0
3 years ago
Other questions:
  • Easy STEAM question :)
    15·2 answers
  • Which of these statements is true? Steve Jobs invented the mouse as an input device. Bill Gates invented the mouse as an input d
    6·1 answer
  • When you compose a message, you want your audience to find the information it needs quickly and to understand what it finds. You
    11·1 answer
  • The ____________________ packet-filtering firewall allows only a particular packet with a particular source, destination, and po
    10·1 answer
  • Which of the following can be created when two tables contain a common field?
    14·1 answer
  • Where does a computer store it’s information
    11·1 answer
  • /*
    8·1 answer
  • You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click o
    8·2 answers
  • Assembly (Procedure and Conditional Processing). For the following program, what are outputs for register EAX, EBX, ECX, and EDX
    11·1 answer
  • Why are mobile phone called cell phones?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!