which of the following is a benifit of googling yourself ?

Answers

Answer 1

Answer:

you are protecting yourself from identity theft


Related Questions

A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem

Answers

Answer:

A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem? The PC default gateway address is missing or incorrect. The PC has an incorrect IP address. The network cable connected to the user PC is faulty.

Explanation:

A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem? The PC default gateway address is missing or incorrect. The PC has an incorrect IP address. The network cable connected to the user PC is faulty.

A possible cause of the problem is that the default gateway address of this personal computer (PC) is missing or incorrect.

What is a default gateway address?

A default gateway address can be defined as an internet protocol address that is designed and developed to allow a particular device to communicate with other networks and equipment, including the Internet.

In this scenario, a possible cause of the problem is that the default gateway address of this personal computer (PC) is missing or incorrect and as such must be provided or configured.

Read more on printers here: https://brainly.com/question/17100575

#SPJ2

A ______ system spreads data across several disks and stores parity information that can be used to reconstruct data if a disk drive fails. Select the two correct answers, then click Done.

Answers

A disc stripping system spreads data across several disks and stores parity information that can be used to reconstruct data if a disk drive fails.

What is a stripping system?

Disk striping has been around for a long time. To improve disk performance, data can be "striped" across multiple disks.

Instead of using a single disk read/write head to write data, multiple heads from multiple disk drives can be used to improve performance.

Thus, the correct option is a disc stripping system.

Learn more about stripping system

https://brainly.com/question/14924341

#SPJ1

Why have Social Security numbers traditionally been used as primary keys for database tables that store personal data on individual people

Answers

Each person has a unique Social Security number. Therefore each Social Security number is not shared, and thus each number represents one person only.
We can use the number to identify a person in a database


When you use a number such as 45 in a C# program, the number is a

a. figurative constant
c. literal variable
b. literal constant
d. figurative variable

Answers

Answer:

b it has to be if u look in and use a cauclator

You are a game designer and are going to give a presentation to a group of high school students to try to get them interested in a career in the video game industry. You decide you will use a PowerPoint presentation to guide you through your discussion. Your PowerPoint presentation must include:


an explanation of what a video game is;

some history of video games and the video game industry;

why a career in the video game industry is a good choice; and

some examples of what students could do to begin to prepare themselves for an application to college and a career in gaming

Answers

Answer:

Pick a concept. Generate a few game concepts to see what kind of game you want to make. ...

Gather information. Game creation involves extensive research. ...

Start building. ...

Refine your concept. ...

Test your game. ...

Market the finished product.

Explanation:

A video game immerses players in a virtual environment and is an interactive form of electronic entertainment. It involves story-telling, user experience, aesthetics, sound design, and gaming mechanics.

The earliest arcade machines and home consoles like the Atari may be found in the history of video games. As technology developed over time, 3D graphics, virtual reality, and augmented reality experiences were introduced.

For those who are passionate, a career in the video game industry offers fascinating options. The sector is renowned for its quick expansion, with new platforms and technologies appearing on a regular basis.

Technical expertise and the creation of a solid portfolio are prerequisites for pursuing a career in the video game industry.

For the creation of games, learning programming languages like C++, Java, or Python is useful. Additionally, learning 3D modelling, animation, and game design fundamentals can be helpful.

For people who love games and creativity, a career in the video game industry provides intriguing opportunities.

Thus, you can contribute to the creation of engaging and innovative games that engage gamers all over the world if you have the necessary abilities, portfolio, and commitment.

For more details regarding gamers, visit:

https://brainly.com/question/25829996

#SPJ5

Why shouldn’t you add taxes to schools to keep technology in classrooms?

Answers

Answer:

Technology is becoming more expensive and more unhealthy over time, so adding taxes is adding extra funds that don't need to be added. Studies also show that technology in classrooms can cause students' social skills to deficit.

What are the possible values you can store in the C# "bool" data type?
a
A or B
b
true or false
c
more or less
d
1 or 2

Answers

Answer:

d are the values that can be stored in the c#"bool"data type

in china speaking your mind on the internet can cause what problems

Answers

It is found that in china speaking your mind on the internet might get you arrested.

How does internet affect China?

In China, mobile internet access is one that restrict the freedom of speech.

Note that one cannot speak freely or post things on the internet there and as such, It is found that in china speaking your mind on the internet might get you arrested.

See options below

 A. is allowed by the government.   B. might get you arrested.   C. is protected as free speech.   D. is difficult to do in Chinese script.

Learn more about china from

https://brainly.com/question/24717901

#SPJ1

Answer:

it can get you arrested

Explanation:

got it correct for pennfoster! God bless! Hope this helps!

What's the best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians

Answers

The best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians is; As detailed below.

What is a machine algorithm?

Machine learning algorithms are mathematical model mapping methods used to learn or uncover underlying patterns embedded in the data.

Now, Machine learning comprises a group of computational algorithms that can carry out pattern recognition, classification, and prediction on data by learning from existing data set.

In this question, the best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians is She can add videos of people using wheelchairs and strollers into the training data set (perhaps crowd-sourcing them if there are none already available).

Read more about Machine Learning Algorithm at; https://brainly.com/question/21928505

________ generally processes the largest quantities of data. Group of answer choices Operational databases Transaction processing Big data Data marts

Answers

transaction processing

generally processes the largest quantities of data. Big data Data marts Operational databases Transaction processing QUESTION 2 According to your text, NoSQL stands for: Numeric Only SQL Not Only SQL Numbered SQL No SQL QUESTION 3 Big data includes: Targe volumes of entity relationship diagrams (ERD) with many different data types that are processed at very high speeds. large volumes of data with many different data types that are processed at very high speeds.

A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue

Answers

An increase in the ping response periods (host to host time) might be depicting a possible latency issue.

What is a latency issue?

In computers, a latency issue is a problem capable of delaying digital communications in the network.

Latency issues are a subject of concern and there are several alternatives to improve this aspect of digital networks.

Latency issues are associated with the time in which data can be captured and processed in the network.

Learn more about latency issues here:

https://brainly.com/question/27013190

Michael is doing research to find information about a pet fish. He finds a website that says fish do not make good pets. Michael should not use this information because it is

a belief
a fact
an opinion
informative

Answers

Answer:

It is a opinion not a fact so it should not be used

Explanation:

_____ means collecting vast amounts of data from a host of websites.
A. Relating
B. Visualizing
C. Querying
D. Web scraping

Answers

Answer:

D

Explanation:

D. Web Scraping is the answer

D. Web scraping
Explanation: definition “a term for various methods used to collect information from across the internet”

List a future Internet and a future network technology that interests you. Explain what it is and how it works. Comment on another's post. You must post before you can see other's posts. Internet tech

Answers

LiFi
Data is transmitted via light
You could have streetlights transmit data to cars.
Since you just need the light to be on or off, you can transmit binary bits.
The rate at which lights can flicker is so fast, that the human eye can’t perceive it!
However LiFi technology is an idea that gained popularity I think about four or five years ago. It might be a bit before it becomes a new breakthrough technology!

Assume that the Vehicle class contains a virtual method named CalculateMaxSpeed(). Assume that both the MotorVehicle and Automobile classes override this method. Which class defines the method that is called when the second statement in the code that follows is executed

Answers

The class that defines the method that is called when the second statement in the code that follows is executed is: Automobile.

Automobile class

In a situation where the statement " Automobile car = new Automobile ( )" is executed. The process called instantiation has taken place.

When instantiation occur this indicate or means that object of the automobile class has been created.

An object can tend to be created based on the definition of the class  and the created object can be used to perform or carryout tasks.

Therefore the class that defines the method is: Automobile.

Learn more about automobile class here:https://brainly.com/question/15697747

#SPJ1

whats happens when you add the numbers 1 and 1 together (1+1)
11
32
2
9

Answers

Answer:

2

Explanation:

The mathematical answer would be 2. To get 11, one would simply put the 1's next to each other but there is an addition symbol. 32 is an irrational number to think of for an answer because there are no other numbers to add or multiply with the 1's to achieve 32. 9 is also irrational for the same reason.

Which type of cell references are automatically updated when copied?.

Answers

Answer:

By default, all cells are Relative Cell References within a formula and will update when copied or use of Autofill.

Explanation:

By default, all cells are Relative Cell References within a formula and will update when copied or use of Autofill.

Think about the activities that you do online. What are three ways you can use a web browser to make your experience easier and more enjoyable?

Answers

Answer:

Copy and paste

Keywords

Bookmark tabs

Letters, memos, and computer printouts of numerical information are examples of formal reports.Group startsTrue or False

Answers

Letters, memos, and computer printouts of numerical information are examples of formal reports is a  false statement.

What are  formal reports?

Formal reports are known to be a type of report that has elements such as a title page, a transmittal, a table of contents, etc. An example are:

Inspection Report.Safety and Health Report.

Conclusively, Letters, memos, and computer printouts of numerical information are examples of formal reports is a  false statement because  they are all examples of informal reports.

Learn more about formal reports from

https://brainly.com/question/11599232

What is RAM?

Contained on a chip on the motherboard that does the computing to execute commands

Circuit boards that attach to the motherboard so you can connect components outside the case, such as a mouse, keyboard, speakers, or microphone

Random access memory, which are chips where information is stored temporarily while processing is taking place

Answers

Answer:

Random-access memory.

Explanation:

Random-access memory is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code.

GlobalMan Tech purchased raw material from NewBizTr Co. When the sales team at NewBizTr Co checked the system, there was no payment
detall in the system, though the order-delivery details were present. Also, it seemed that someone had tampered with the details of the previous
order. Which Important data-management features were compromised?

Answers

The Important data-management features were compromised is maintaining Data Security.

What does data management made up of?

Data management is known to be a kind of administrative method that is often used in acquiring, validating, storing, etc., of data for system users.

Note that Maintaining Data Security is one key feature of data-management  and it is the one that has been tempered with.

Learn more about data-management features  from

https://brainly.com/question/24027204

#SPJ1

Answer:

1 security 2 accuracy

Explanation:

14 AP Computer Science Principles


3. Consider the following code segment.

first 100

second 200

temp first

second + temp

first second

What are the values of first and second as a result of executing the code segment?

(A) first = 100, second

= 100

(B) first = 100, second = 200

(C) first = 200, second

=

100

(D) first = 200, second =

200

Answers

The values of first and second as a result of executing the code segment are (c) first = 200 and second = 100

How to determine the value of the variables?

From the code segments, we have the following assignment operations

first = 100 and second = 200

The variable first is assigned to variable temp.

So, we have:

temp = first = 100

The variable temp is assigned to variable second

So, we have:

second = temp =  100

Lastly, the variable second is assigned to variable first

first = 200

Hence, the values of first and second as a result of executing the code segment are (c) first = 200 and second = 100

Read more about code segments at:

https://brainly.com/question/14284157

#SPJ1

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. Data acquisition Data entry Data mining Data encryption

Answers

Answer:

_______ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A Data acquisition B Data mining C Data encryption D Data scrubbing E Data entry

✓ A Data Acquisition

Explanation:

Select the correct answer.

Identify the correct CSS syntax to link an external style sheet.







B.






C.






D.


newstyle.css

Answers

Answer:

D

Explanation:

It is D

Select the correct answer.

Identify the correct CSS syntax to link an external style sheet.

If the value of score1 is 350 and the value of score2 is 210, what will be the value of result after the code segment is executed

Answers

  The value of result of the  code segment is executed is known to be 4.

Why is the value of the code segment so?

  When the result of  is not  executed because the condition is said to be false and also when there is a false condition is, the else statement will be said to be true

  Therefore,   result = result + 2; -> result is brought up by 2 to bring about 4 and as such, the value of result of the  code segment is executed is known to be 4.

Learn more about scores from

https://brainly.com/question/19492935

#SJ1

Answer:

its 5

Explanation:

I put 4 and got it wrong and checked the test

Size of a request header field exceeds server limit.

Answers

Try to Increase the value for the directive LimitRequestFieldSize in the httpd.conf:


Reason: This is normally caused by having a very large Cookie, so a request header field exceeded the limit set for Web Server.
For IBM® HTTP Server, this limit is set by LimitRequestFieldSize directive (default 8K). The LimitRequestFieldSize directive allows the Web server administrator to reduce or increase the limit on the allowed size of an HTTP request header field.
SPNEGO authentication headers can be up to 12392 bytes. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks.

What is the difference between basic auth and oauth.

Answers

Answer:

Basic auth is an authentication where username and password are sent with an HTTP request unencrypted (just base64 encoded).

OAuth is a scheme whereby you perform a login at an IAM server, which gets you a token, and then you provide the token with requests to another server.

What are three ways to protect yourself from identity theft when using your smartphone or computer?.

Answers

Answer:

1. Always download the latest updates .

2. Don’t click on rogue links .

3.Secure your devices (long, complex password on your computer and phone, using Anti-virus/Anti-Malware program) .

The Android operating system (OS) is targeted by attackers much more often than Apple iOS and Windows Phone. What reason does NOT contribute to this situation

Answers

The week security system is the reason which makes Android operating system (OS) is targeted by attackers much more often than Apple iOS and Windows Phone.

Why Android operating system targeted more by attackers?

Android is the mobile operating system and mostly targeted by the hackers and attackers. The reasons by which it is often targeted by attackers are listed below.

Android is most famous operating system and most of the people has mobile phone bases on this system.The security level of android is week compare to Apple iOS and Windows Phone makes is easy to crack.The risk of malware and virus is more in android.

The week security system is the reason which makes Android operating system (OS) is targeted by attackers much more often than Apple iOS and Windows Phone.

Learn more about the Android OS here;

https://brainly.com/question/4121093

#SPJ1

A technician is installing RG6 cable and asks you to retrieve a connector from the parts drawer. What type of connector do you need

Answers

The type of connector, which is needed when a technician is installing RG6 cable and asks to retrieve a connector from the parts drawer, is F-connector.

What is F-connector?

The F-connector is a type of RF connector which is used to connect the Video equipments to the antennas and setup box.

A technician is installing RG6 cable.

The RG6 cable is a coax cable.This cable is used in satellite signal transmission, generally for TV and setup box.

Now the technician is ask to retrieve a connector from the parts drawer. Here, we use F type connector for this RG6 cable.

Thus, the type of connector, which is needed when a technician is installing RG6 cable and asks to retrieve a connector from the parts drawer, is F-connector.

Learn more about the connector cable here

https://brainly.com/question/9082842

#SPJ1

Other Questions
Without telescopes or other aid, we can look up and see the moon in the night sky because it. Which choice has the least thermal energy Find the geometric mean between 20 and 30. If necessary, round to the nearest tenthA) 17.3B) 7.1C) 24.5D) 25 ax2 + bx + cUse the X method to find the solutions of6x2 + 2x - 20 = 0.X=acX= Based on a survey of U.S. residents completed in 2014, ___________ percent of respondents agreed that global warming is occurring How much will stretch a spring that has spring constant of 735 N/m, if you vertically hung a 2. 30 kg object from it. How much work must an external agent do to stretch the same spring 6. 50 cm from its unstretched position? what method of keeping blacks from voting was outlawed by the 24th amendment by the voting acts right of 1965 How do people in rural areas of East Africa make a living?Choose ALL answers that are correct.as tour guidesas subsistence farmersby herding cattleby growing cash crops HELP PLEASE : )Simplify the expression: 6/3(1318)+2^46 help meee Is really important range paramters - for loopquestion in picture Jasmine has a 2-gallon bucket. Howmany 1-quart containers will it taketo fill Jasmine's bucket? What is Buddhism and what does it do 23456the step function f(x) is graphed.54+3+2+1+-5-4-3-2-1#-2+-3+1922 3894 5 X10What is the value of f(1)?0124 A normal polypeptide includes the following sequence of amino acids. (Note: Eachamino acid is named by a three letter abbreviation.)Iso-Leu-Pro-Val-His-Ser-Thr-MetAfter a mutation, the amino acid sequence becomes the following:Iso-Leu-Pro-Val-Tyr-Arg-Iso-GlyWhich of the following changes to a nitrogenous base in mRNA is most likely tohave occurred? my mind suddenly went blank There is a clear boundary where Earth's atmosphere ends and space begins.TrueOr False Amendment 11 is a part of the Bill of Rights.a) Falseb) True Megan randomly throws a dart at the square. Assuming the dart lands within the square, what is the probability that the dart lands within the dartboard? round your answer to the nearest tenth of a percent. % When a juvenile is found guilty of having a history of not attending school, he or she is committing which of the following? A unruly acts B delinquent behaviors C juvenile rules D local school board policy