Susan is excited to learn various safe ways to browse the Internet. She is looking for suggestions that would help her. Which are the valid suggestions for Susan? The Internet is a medium used by numerous individuals. As a user of it, the responsibility of privacy and security rests with the user. Susan should be aware of the potential risks associated with improper use of the Internet. She should hence share her Social Security number whenever asked for it. She should be careful when using third-party applications and download applications from trusted and secure sites only. Susan should also be careful while using social networking websites. Susan should update her location information whenever possible. She should not click on any unknown links and use secure browsing and strong passwords. An example of a strong password is susanishere.

Answers

Answer 1

Answer:

a

Explanation:


Related Questions

In your opinion., which Zelda character is the hottest? Be honest.

Answers

Answer:

link<3

Explanation:

how do ""night modes"" on computer screens help people fall asleep?

Answers

Answer:

it doesn't really help people fall asleep but

Explanation:

When it gets dark, your pineal gland secretes the hormone melatonin, which tells your body to get tired and go to sleep.

Answer:

Answer it doesn't really help people fall asleep but some people it can

Explanation:

Most people dont fall asleep while on computers but the people who do it helps because the screen is not all bright and doesn't keep your eyes wide open

what is the term used to describe image file that contains multiple small graphics?

Answers

The answer sir should be Sprite

what is the most popular game design engine today

Answers

Unreal Engine and Unity

Answer:

i think its an gamemaker

Explanation:

this endpoint does not support blobstorageevents or softdelete. please disable these account features if you would like to use this endpoint.

Answers

Answer:

A

Explanation:

Endpoint mover is one of the graph tools that has gives the tendency for manipulation of lines or curves. When this manipulation is done, it add some few values to the ploted points so as to achieve a desired line or curve.

What is content filtering ?

Content filtering has been the process of the screening and or restricting access to objectionable email, webpages, executables, and other suspicious items using software or hardware. Filtering software can detect objectionable or criminal content, such as hate sites, illegal content, and social media.

As the part of their internet firewalls, businesses frequently employ content-based filtering, also known as information filtering. Content filtering, a common security measure, assists businesses in enforcing corporate policies regarding the use of information systems, such as the filtering and blocking of employee access to social media platforms.

Therefore, Endpoint mover is one of the graph tools that has gives the tendency for manipulation of lines or curves. When this manipulation is done, it add some few values to the ploted points so as to achieve a desired line or curve.

To learn more about content filtering , visit

https://brainly.com/question/13129235

#SPJ2

ASAP! WILL MARK BRAINLIEST + 100 POINTS!!

Match each word to its description.

Answers

Answer:

Windows- operating system most commonly used by businesses

Spreadsheet, word processing- types of application software

data- type of file created when word processing document is saved

system calls- instructions for the OS provided by application software

documents- folder where documents you create go by default

Recycle Bin- where documents go when you delete them.

toggling- switching from one setting to another

Help menu- best place to get assistance in a word-processing program

I hope this helps, please let me know if any are incorrect.

Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.

Answers

Answer:BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.

No food or drinks near the computers. NO EXCEPTIONS.

Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.

Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.

Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.

Do not change computer settings or backgrounds.

Ask permission before you print.

SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.

If you are the last class of the day, please POWER DOWN all computers and monitors.

Keep your files organized

Don’t let a student’s desktop become the digital version of his hectic book bag. Set aside a few minutes at the beginning or end of working on an assignment to ensure that students are saving unfinished work somewhere that they will be able to find it next time.

Log off

Logging off is like the digital version of cleaning up after yourself in the classroom. Students need to leave the computer ready for the next user. Logging off is also important to make sure that student work and accounts stay private.

Each person may only use one computer at a time

Computers and peripherals are not to be moved or reconfigured without approval of Lab and Classrooms staff.

Behavior and activities that disturb other users or disrupt the operations of the lab are not allowed. This includes, but is not limited to: physical activities such as "rough-housing," loud music, etc.

Children are only allowed in computer labs if they are well-behaved and supervised at all times. Children may not use the computers or occupy workstation areas. At no time are children to be left unattended.

.Explanation:

sorry about only 9 rules

The String otherObjects() method relies on the ____________.

a) name.indexOf() method
b) name.equals() method
c) name.compareTo() method
d) name.length()

Answers

B name.equals() method

What is a process of adding details to a model to make it less abstract

Answers

Answer:

refinement

Explanation:

https://brainly.com/question/19274876

Determine the lines that refer to specialty accommodation.

Budget travelers can stay in lodges or hostels. Couples on a honeymoon may prefer to stay in a resort. A student can probably only afford to stay in a hostel. Hostels are very different from hotels. In a hotel, guests tend to keep to themselves. In a hostel, customers may share accommodations. Guests have an opportunity to interact with others. Because the price of a hostel is much less, privacy may not be an option. Hotels may charge you a fair amount more, but basic amenities such as toiletries are provided. However, hostels are an excellent option for the budget traveller

Answers

The short passage largely describes two different types of speciality accommodations which are shelters which offers a certain range of personal space.

The specialty accomodations described are hostels and hotels where one seems to offer more than the other largely due to the cost involved.

Hotels offer more level of privacy than hostels which are in turn a cheaper alternative than the more expensive hotels.

Hence, all lines of the passage discusses the services offered by the specialty accomodations ; hostel and hotels.

Learn more :https://brainly.com/question/25140153

most computers have temporary holding areas called __________.

Answers

Answer:

Random Access Memory (RAM)

RAM (Random access memory)

Can someone help me code the statments in the picture?

Answers

Answer:

(In this section I will put the code with no comments and I'll put the code plus comments in the explanation below :)

public class Main

{

   public static void main(String[] args)

   {  

      double cost = ParkingSpot.getPrice(4);

      System.out.println(cost);

   }

}

//End OF Main class

//ParkingSpot class

public class ParkingSpot

{  

   public static double getPrice(int hours)

   {

   double cost = 4.25 * hours;

     

       if (cost < 7.00){

           cost = 7.00;

       }

       if (hours > 3){

           cost = cost * 0.25;

       }

       return cost;

 

   }

}

Explanation:

(Here I will add the comments so you better understand what is written and whats going on :)

public class Main

{

   public static void main(String[] args)

   {

    /* the code should be written in the ParkingSpot

      * class. You may use this main method to call

      * methods to test your code

      */

       

      /*We send an integer representing x amount of hours, also calling the

       method and displaying the result

      */

      double cost = ParkingSpot.getPrice(4);

      System.out.println(cost);

   }

}

//End OF Main class

//ParkingSpot class

public class ParkingSpot

{

   /* Finish the static class getPrice. The parameter hours indicates the time parked.

    */

   public static double getPrice(int hours)

   {

   //Here we set the rates

   /*

       It costs 4.25 per hour to park in the ParkingSpot

       If the total cost come in at less than 7.oo, the price should

           be adjusted UP to 7.00, the minimum Price Allowed

       If the number of hours is more than three hours,  

           a 25% discount should be appllied  

   */

   

   double cost = 4.25 * hours;

   

   //If the cost is less than 7.00 we set the price up to 7.00

       if (cost < 7.00){

           cost = 7.00;

       }

  /*If hours is more than 3 (meaning 4 or it would have said 3 and/or more),  

   a 25% discount will be appllied*/

       if (hours > 3){

           cost = cost * 0.25;

       }

   

   //Return cost of parking for x amount of hours

       return cost;

 

   }

}

18. WHICH MENU WOULD MOST LIKELY ALLOW YOU TO ADJUST YOUR LINE SPACING? *

EDIT
FILE
F0RMAT
INSERT

Answers

Explanation:

FORMAT

because it is used for the general appearance of the page

For any of you coding experts. I'm just beginning to take coding seriously and I want to know which coding language is the easiest for beginners. Any tips?​

Answers

Personally Python was the easiest for me. It truly is personal preference. Just keep dedicated, and motivated to learn! Once you know one language very well, you’ll understand the base of every language good luck bud
I believe HTML & MySQL are the easiest coding languages for beginners. If you are a starter you might prefer to take HTML which is comparatively really easy & understandable as well. HTML allows you to create webpages in no time with simple coding & there's no use of binary digits. Moving onto MySQL..this is also easy but it's advanced when compared to HTML. But, the work is more neat & good if you program it through SQL. After mastering both of them you can go for Python / Java, which are hard but it should be ok if you studied the first 2 languages. There's Xojo as well, lesser known but still good.

what is the correct keyboard shortcut to cut a cell value

Answers

Answer:

Cntrl+X

Explanation:

Do it on your computer

The keyboard shortcut to cut a cell value is Ctrl +X.

What is Ctrl X?

Control x can be written as ctrl x

To cut a text means to remove the text from where it was initially and retain the ability to paste the cut text in a desired cell.To do this, we use the cut function which is ctrl x. This cuts the text while ctrl v would paste the text in the desired location.The shortcut ctrl x can be clearly described as the action removes the text or item and stores it in the clipboard, rather than copying it to the clipboard.

For example, you can cut a picture out of the beginning of a Word document and paste it further down within your document. Alternatively, you can cut a block of text out of Word and paste it onto a PowerPoint slide.

So, the keyboard shortcut to cut a cell value is Ctrl +X.

Learn more about ctrl x,

https://brainly.com/question/14447287

#SPJ6

All of the following can provide source data except a. a scanning device at the grocery store b. a utility bill received in the mail c. a bar code reader d. software to process the source data​

Answers

Answer: A: a scanning device at the grocery store

Explanation:

Crazy Sentence Program. Create a program that prompts the user for the name of an animal, a color, the name of a vehicle, and the name of a city. Then print a sentence that contains the user input in the following order. Include the additional words in the sample output as part of your output. Example: Assume the user enters the words: tiger, green, motorcycle, and Wildwood. The output would be: The green tiger drove the motorcycle to Wildwood.

Answers

I agree with you ✔✔✔

What is wrong with the following code? publicstatic char grade(int score) { if (score >= 9) { return 'A'; } else if (score >= 8) { return 'B'; } else if (score >= 6) { return 'C'; } else if (score > 4) { return 'D'; } else if (score < 4) { return 'F'; } }

Answers

Answer:

c) No return statement for all possible logic paths

PLS HELP WITH MY PYTHON HW ILL GIVE YOU BRAINLIEST

Answers

Answer:

class Cat:

   isHungry = None

play = Cat().isHungry = True

eat = Cat().isHungry = False

if play:

   print("I am hungry, I cannot play")

else:

   play = Cat().isHungry = False

if eat:

   print("I am full, I cannot eat")

else:

   eat = Cat().isHungry = True

Explanation:

Just simple if and else statements.

Which type of basic building blocks (constructs) is the following algorithm?

Answers

Answer:

Sequence

Explanation:

Help me please please i need it tommorow​

Answers

Since brochures are for marketing purposes,

I'll choose to introduce an internet service provider(ISP).

1. My service is targeted to people in need of secure and fast internet connection. Thus, home owners, corporate companies, institutions or individuals.

2. My brochure is to highlight the service that I'll produce and explain the significance it'll have in people's daily lives.

3. The most important message to be conveyed by the brochure is that the ISP is highly reliable, safe, available, inexpensive and easy to use and access.

4. Here use Canva to format the brochure. (Let me try to create one and I'll add). Personally, my brochure will include an introduction, importance, impact and awareness of my service,and contacts.

5. Graphics I'll use are,

* High resolution photos(like 300 dpi to make sure it's clean during printing).

* Right font for the text.

* The right folds to allow easier folding after printing.

* Highly designed brand logo and name.

* Inviting color tone.

* White space must be used strategically to avoid information cluttering.

please answer it is important!!!! i will mark you branliest

Answers

Answer:

Machine - consists of the numeric codes for the operations that a particular computer can execute directly

Assembly - provides the information of any error in the code.

High level - Require translation.

Require translation.Portable.

Require translation.Portable.Easier to read, write and maintain as commands are similar to English.

Require translation.Portable.Easier to read, write and maintain as commands are similar to English.Allow access to module libraries.

how many levels of heading tags are allowed in html?

Answers

Answer:

six levels

Explanation:

HTML defines six levels of headings. A heading element implies all the font changes, paragraph breaks before and after, and any white space necessary to render the heading. The heading elements are H1, H2, H3, H4, H5, and H6 with H1 being the highest (or most important) level and H6 the least.

Answer:

six levels

Explanation:

how to prevent truncation of data when importing into sas studio

Answers

Answer:

Set the length BEFORE pulling the dataset. You cannot change the length of character variable after it has already been set. Then remove any format that might be attached to it. In fact why not just remove any formats attached to any of your character variables.

You have answered 12 of 23 questions.
ing
1
Question # 13
A group of computers that share resources are called what?
2
O A server
3
O A personal computer
O A router
1
O A network
Read Question

Answers

Answer:

the answer is a network because the others are for different things

RAM is like a computers ___, while a hard drive is like a computers___



A. brain/ nervous
B. nervous system/ brain
C. long-term memory/ short-term memory
D. short-term memory/long-term memory

Answers

Answer:

D. short-term memory/long-term memory

Explanation:

RAM is like a computer's short-term memory, while a hard drive is like a computer's long-term memory. Then the correct option is D.

What are RAM and Hard drive?

Random Access Memory is referred to as RAM. RAM is referred to as Basic Memory or Main Memory. Each RAM memory location may be accessed at the same speed. The computer will slow down if RAM is low. RAM has a brief read/write (R/W) period. Transistors and other electronic components make up RAM, which has no moving mechanical elements.

Hard Disk Drive is referred to as HDD. Another name for HDD is supplementary memory. HDD has mechanical moving components like an arm, a pin, etc. HDD read/write times are faster. It could take longer or shorter to access different parts of the HDD. The impact of HDD on system speed is minimal.

A hard drive is comparable to a computer's long-term memory, whereas RAM is like short-term memory. D is the best choice in that case.

More about the RAM and Hard drive link is given below.

https://brainly.com/question/17944253

#SPJ2

this device enables connectivity between two lans or a lan and a larger network.

Answers

Answer:

I'm pretty sure it's a cable. A lan cable specifically.

Explanation:

what tv show inspired the term spam for junk email?

Answers

Answer:

a 1970s monty python's flying circus TV sketch

write measure five safety measures can be taken to stay safe in social media​

Answers

Answer:

*Use a strong password for your accounts

*Set your account to private if given the chance to do so

*Be very selective with friend requests

*Click links with caution

* Don't over share your life

What device on a network enables work to be performed for a business?
server
router
endpoint
modem

Answers

Answer:

Option B or Router must be correct.

Kind request:

Please give me brainliest if my answer was useful :D

Other Questions
What direction would the net force acting on this box be pointed?northeastnorthwestsoutheastsouthwest niaz's car breaks down, and he is convinced that it was a predictable event even though there was no way of knowing it could happen. this exemplifies ________. Proper Place for Sports by Theodore Roosevelt1. What is Theodore's attitude towards his son playing football?2. What makes football a good game and also makes it a hard game?3. What is Theodore's perspective on the role of sports in a man's life?4. According to Theodore, what is the bad aspect of athletic proficiency?5. Describe the two internal conflicts in Theodore Roosevelts letter to his son. You need to use at least 3 out 5 key words in your answer: strict, character, over-athleticism, academic, support.To Elison Begbie by Robert Burns 1. According to Robert Burns, why is telling the truth the safest and the easiest thing to do in a romantic relationship? 2. What does a man of integrity and truth would do to the woman he loves with regard to courtship?3. What are such detestable practices, according to Robert Burns? what is the answer to the question Bohr models do not correctly show the location of electrons in an atom explain why they are still useful to predict bonding of atoms Under the terms of the Reconstruction Acts of 1867, what did southern states have to do to rejoin theUnion?A. pay a large indemnityB. execute Confederate leadersC. ratify the Fourteenth AmendmentD. renounce racism Which of the following is the term associated with an individual's ability to speak publicly from a position of power and be listened to?A. federalismB. bully pulpitC. plural executiveD. ceremonial figurehead We breathe more quickly and deeply when we exercise. why does this make sense? In a movable pulley system, where does the other effort come from? Rewrite the sentence to correct the error--either a misplaced modifier, a squinting modifier, a dangling modifier, or an instance of faulty parallelism.After mopping the floor, the house was ready for guests. how does education transform people and their gender roles towards a better and unbiased society? Assignment: Sexual and Asexual Reproduction ExplorationCommon Name Process of Sexual Reproduction Process of Asexual Reproduction Advantages/disadvantages involved in methods of reproductionKomodo Dragon Hammerhead Shark Honey Bees Jellyfish here is the page of my question 100 points!! They say he has . . moneya. plentyb. lotsc. manyd. a lot of Triangle ABC has vertices A(-3,2) B(0,1) and C(-2,-3).1. Graph triangle ABC and its reflection across the line x=-2?2. What are the coordinates of triangle A'B'C' if triangle ABC is reflected across the x-axis?3. What are the coordinates of triangle A'B'C' if triangle ABC is reflected across the y-axis? 4. What are the coordinates of triangle A'B'C' if triangle ABC is reflected across the line y=x? Why do you think it is important to reflect on our personal transformations? *Use the R.A.C.E method*. Use life examples. Which one is the most venomous snake in the world What was the writer's first opinion in the wealthy mare. List two characteristics of Coelenterata and Nematoda each. HELPIn order to isolate the variable term in the equation 6 -2x = -3 using the subtraction property of equality, which numbershould be subtracted from both sides of the equation?-336-2 What is the origin, development, and importance of ethics in business?