answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
2 years ago
5

1. What should you do if your computer is shared by your entire family and you install a plugin that saves user names and passwo

rds on the computer?
2. How does having weak security on your browser represent the weakest link in a network?
These questions are from pltw.
Computers and Technology
2 answers:
Citrus2011 [14]2 years ago
7 0

Explanation:

1 make sure only you know the password

2 having weak security on one browser is basically a doorway for someone to get into your network

Natalka [10]2 years ago
7 0

Answer:

1. We should always sign out and get it ready for the next person 2. Having weak security on your browser can represent the weakest link in network because you should make up a stronger password.

Explanation:

You might be interested in
1.Which of the following class definitions defines a legal abstract class?a. class A { abstract void unfinished() { } }b. class
xxMikexx [17]

Answer:(c) abstract class A { abstract void unfinished(); }

Explanation:

A legal abstract class must have the keyword abstract before the class and an abstract class has abstract functions with the keyword abstract written and a void as the return type.

8 0
2 years ago
Check your tire pressure every _____. A. month B. two months C. six months D. year
ohaa [14]

Answer: I'd say (B) Two months

Explanation: Hope its correct and helps, Good luck :)

6 0
2 years ago
Read 2 more answers
Type two statements.
UNO [17]

Answer:

Following are the program in Python langauge

person_name = input() # Read the person name by the user

person_age=0  #declared a vaiable person_age  

person_age = int(input()) # read person_age by the user

person_age=person_age+5  # add 5 to person_age

print('In 5 years',person_name,'will be',person_age) # display the output

Output:

  Amy

   4

   In 5 years Amy will be 9

Explanation :

Following is the description of code:

  • Read the value of the "person_name" variable by the user by using the input function.
  • Declared a variable person_age and initialized 0 with them.
  • Read the value of "person_age" variable by user by using input function and convert into int by using int function
  • Add 5 to "person_age" variable and store again them into the "person_age" variable.
  • Finally, display the output which is mention in the question.
7 0
2 years ago
Nancy would like to configure an automatic response for all emails received while she is out of the office tomorrow, during busi
Stella [2.4K]

she can appoints someone she trust to act on her behalf

4 0
2 years ago
Read 2 more answers
Suppose that the data mining task is to cluster points (with (x, y) representing location) into three clusters, where the points
solong [7]

Answer:

Explanation:

K- is the working procedure:

It takes n no. of predefined cluster as input and data points.

It also randomly initiate n centers of the clusters.

In this case the initial centers are given.

Steps you can follow

Step 1. Find distance of each data points from each centers.

Step 2. Assign each data point to the cluster with whose center is nearest to this data point.

Step 3. After assigning all data points calculate center of the cluster by taking mean of data points in cluster.

repeat above steps until the center in previous iteration and next iteration become same.

A1(4,8), A2(2, 4), A3(1, 7), B1(5, 4), B2(5,7), B3(6, 6), C1(3, 7), C2(7,8)

Centers are X1=A1, X2=B1, X3=C1

A1 will be assigned to cluster1, B1 will be assigned to cluster2 ,C1 will be assigned to cluster3.

Go through the attachment for the solution.

5 0
2 years ago
Other questions:
  • 1. A pure aggregator is best defined as a blog that
    9·1 answer
  • Email, instant messaging and most web traffic go across the internet in the clear; that is, anyone who can capture that informat
    15·2 answers
  • In cell B16, enter a function to calculate the total attendance for the years 2014 through 2018 using the totals in the range B1
    10·1 answer
  • Information gathered from observing a plant grow 3 cm over a two-week period results in _______.a. inferences. b. variables. c.
    11·1 answer
  • Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two character
    8·1 answer
  • The attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the v
    10·1 answer
  • Ana works in the medical records department at a large medical office. Her job includes scanning and uploading medical records i
    15·1 answer
  • TQ Artificial Intelligence (AI)
    15·1 answer
  • 3. Write a program to find the area of a triangle using functions. a. Write a function getData() for user to input the length an
    10·1 answer
  • In a particular field, there are trees in a l single row from left to right. Each tree has a value V You cut trees from left to
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!