answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
koban [17]
1 year ago
7

Before buying his 12-year-old daughter her very own cell phone and laptop complete with internet access, John requires her to co

mplete a cybersecurity class at the local community center. What will John's daughter most likely learn in this class?
A.
how to gain the most followers and friends on a variety of different social media sites, including how to take and post the most flattering selfie

B.
exactly what websites will offer the best help with homework and studying for tests based on subject

C.
how to read and write various types of code in order to gain access to private or unsecure online sites and files

D.
how to protect herself against online criminal or unauthorized behavior that may put her, her information, or her assets in jeopardy
Computers and Technology
1 answer:
Ratling [72]1 year ago
5 0

Answer:

D.

Explanation:

brainliest?

You might be interested in
What kinds of unstructured data or big data might the BITS corporation want to gather in the future? What kind of devices might
charle [14.2K]

Answer:

Explanation:

There many commercial documents or formats to store like image, video, photos, audio file, web page, PDF, presentations, and we can use some tools to store this commercial data, for example, excel, microsoft access, mysql, sql, mongo db, and any tool to manage, store in our data with some structures and big data.

7 0
2 years ago
When should a developer begin thinking about scalability? 1 during the design phase 2during testing 3when traffic increases by 2
Tanzania [10]

Answer:

in my opinion 4

Explanation:

when the system is available to users

(sorry and thanks)

4 0
2 years ago
Given an integer variable strawsOnCamel, write a statement that uses the auto-increment operator to increase the value of that v
Reptile [31]

Answer:

The program to this question can be given as follows:

Program:

#include <stdio.h> //include header file for using basic function

int main() //defining main method

{

int strawsOnCamel=0; //defining integer variable and assign value

for(int i=1;i<=5;i++) //loop for increment integer variable value

{

//code

strawsOnCamel++; //increment value by 1

printf("%d\n", strawsOnCamel); //print value

}

return 0;

}

Output:

1

2

3

4

5

Explanation:

In the C language code above the header file is entered, and a whole variable strawsOnCamel is specified within the main method, which gives a value of 0.

  • Then a for loop is defined inside a loop an integer variable i declared that starts from 1 and ends with 5.
  • Inside a loop, the strawsOnCamel variable is used that increments its value by 1 and prints its value.

5 0
2 years ago
Suppose that the data mining task is to cluster points (with (x, y) representing location) into three clusters, where the points
solong [7]

Answer:

Explanation:

K- is the working procedure:

It takes n no. of predefined cluster as input and data points.

It also randomly initiate n centers of the clusters.

In this case the initial centers are given.

Steps you can follow

Step 1. Find distance of each data points from each centers.

Step 2. Assign each data point to the cluster with whose center is nearest to this data point.

Step 3. After assigning all data points calculate center of the cluster by taking mean of data points in cluster.

repeat above steps until the center in previous iteration and next iteration become same.

A1(4,8), A2(2, 4), A3(1, 7), B1(5, 4), B2(5,7), B3(6, 6), C1(3, 7), C2(7,8)

Centers are X1=A1, X2=B1, X3=C1

A1 will be assigned to cluster1, B1 will be assigned to cluster2 ,C1 will be assigned to cluster3.

Go through the attachment for the solution.

5 0
2 years ago
1. What should you do if your computer is shared by your entire family and you install a plugin that saves user names and passwo
Citrus2011 [14]

Explanation:

1 make sure only you know the password

2 having weak security on one browser is basically a doorway for someone to get into your network

7 0
2 years ago
Read 2 more answers
Other questions:
  • Suppose the algorithms used to implement the operations at layer k is changed. how does this impact services at layers k-1 and k
    10·1 answer
  • How efficient would a 6-bit code be in asynchronous transmission if it had 1 parity bit, 1 start bit, and 2 stop bits?
    5·1 answer
  • Your computer is crashing on a regular basis. Which of the following is an operation available to the user that should help rese
    14·2 answers
  • When conducting research, protecting the privacy of patients requires careful attention to ensure ?
    11·2 answers
  • Which of the following would be a considered a want rather than a need for most people?
    15·1 answer
  • Who are the founders of video-sharing site Dailymotion?
    7·1 answer
  • Consider a DASH system for which there are N video versions (at N different rates and qualities) and N audio versions (at N diff
    8·1 answer
  • I need to write a really simple python program to solve this issue. I have most of the program written but, when I run the secon
    8·1 answer
  • The results of the spec cpu2006 bzip2 benchmark running on an amd barcelona has an instruction count of 2.389e12, an execution t
    13·1 answer
  • Declare a struct named PatientData that contains two integer data members named heightInches and weightPounds. Sample output for
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!