answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
2 years ago
5

1. What should you do if your computer is shared by your entire family and you install a plugin that saves user names and passwo

rds on the computer?
2. How does having weak security on your browser represent the weakest link in a network?
These questions are from pltw.
Computers and Technology
2 answers:
Citrus2011 [14]2 years ago
7 0

Explanation:

1 make sure only you know the password

2 having weak security on one browser is basically a doorway for someone to get into your network

Natalka [10]2 years ago
7 0

Answer:

1. We should always sign out and get it ready for the next person 2. Having weak security on your browser can represent the weakest link in network because you should make up a stronger password.

Explanation:

You might be interested in
Our company is only interested in purchasing a software upgrade if it leads to faster connectivity and data sharing. The old sof
Igoryamba

Answer:

Calculate the average processing time of the new software

Explanation:

Since the average processing time of the old software is already known, the simplest test to see if the new software is faster than the old software will be to calculate the average processing time for the new software and compare it with the average processing time of the old software.

If the new software have an average processing time lower/smaller than that of the old software; we conclude that the new software is faster.

If the new software have an average processing time higher/larger than that of the old software; we conclude that the old software is faster.

6 0
2 years ago
If byte stuffing is used to transmit Data, what is the byte sequence of the frame (including framing characters)? Format answer
Lerok [7]

Answer:

Correct Answers: 01h 79h 1Bh 78h 78h 1Bh 7Ah 04

Explanation:

Solution is attached below

4 0
2 years ago
Determine the value of base x if (211)x = (6A)16
elena-14-01-66 [18.8K]
211x=6A•16
211x=96A
211x=96A
___. ___
211. 211

x=96A
___
211


It's hard to show fractions on here :•)
7 0
2 years ago
Read 2 more answers
Convert the following numbers to binary numbers: 5 , 6 , 7 , 8 , 9 .​
Anon25 [30]

Answer:

log 5,6,7,8,9 is the binary number according to the computer

7 0
2 years ago
Read 2 more answers
The function below takes a single string parameter: sentence. Complete the function to return everything but the middle 10 chara
dolphi86 [110]

Answer:

def get_middle_ten(sentence):

   ind = (len(sentence) - 12) // 2

   return sentence[ind:ind + 12]

# Testing the function here. ignore/remove the code below if not required

print(get_middle_twelve("abcdefghijkl"))

print(get_middle_twelve("abcdefghijklmnopqr"))

print(get_middle_twelve("abcdefghijklmnopqrst"))

7 0
2 years ago
Other questions:
  • Grabar microphone audio icon_person click each item to hear a list of vocabulary words from the lesson. then, record yourself sa
    7·2 answers
  • What are common names for some primary discrete components used on circuit boards?
    13·1 answer
  • Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline. Ex: If letterToQuit = '
    12·1 answer
  • Frequent menu users can become annoyed if they must make several menu selections to complete a simple task. Suggest two ways you
    10·1 answer
  • For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f
    9·1 answer
  • reAay ouyay aay hizway ithway igPay atin?Lay? (Translated: "Are you a whiz with Pig Latin?") Write a program that converts an En
    6·1 answer
  • Write a class Student() such that it has an attribute 'score' (that is initialized with 10) and three methods: add_score(): adds
    12·1 answer
  • Suppose that a class named ClassA contains a private nonstatic integer named b, a public nonstatic integer named c, and a public
    14·1 answer
  • Interactive media professionals are unique among other Information Technology professionals because they have very good job pros
    6·1 answer
  • (Java) Which of the following code segments correctly declare a Strings and gives it a value of "fortran".
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!