Research This: Which apps are available for your smartphone to erase data remotely? Which location-
tracking apps allow you to take a photo of the thief and then send an email message that contains the image
to you automatically? If your device is lost and you file a police report, you will need the device's serial
number. Locate that number now and write it on a piece of paper. Also, locate the phone's 15-digit
International Mobile Equipment Identity (IMEI) number and record that number. Store the document with
these two numbers in a secure location. In addition, research the efforts by the U.S. Federal
Communications Commission (FCC) and the Cellular Telecommunications Industry Association (CTIA) to
create a centralized database of lost and stolen mobile phones. What is the status of this database? What
legislation has been proposed or passed that requires wireless carriers and phone manufacturers to develop
technological solutions that can curb the growing problem of violent smartphone theft?

Answers

Answer 1

Answer:

OOP TY!

Explanation:

TY


Related Questions

Help Digital photo class

Answers

Answer: i think the answer is c

Explanation:

Answer:

Here’s your answer!

Explanation:

I believe the answer to be D however if the camera still doesn’t work visit a camera shop for help.

Hope this helped

Brainliest please?

Dont forget to smash that heart at the bottom <3

Have a great day,you’re amazing!

1 of 10
The biggest difference between scholarships and loans is that
scholarships are considered _____ but loans must be paid back.
easy money
liquid assets
free money
sound investments

Answers

Answer:

free money

Explanation:

scholarship money you can keep and do what you please with it. its not really easy money since its actually difficult to get scholarships, and the other ones dont make sense because how do you invest in a scholarship? theyre not liquid assets either

Describe the type of gameplay seen during early video games

Answers

Answer:

2d?

Explanation:

It could be 2D because most games such as early Mario and Donkey Kong games were 2D games.

Answer: Arcade Machines

The earliest gameplay video games were arcade machines such as Mario, Donkey Kong, and PacMan. Most early video games being produced by Nintendo.

2
2. When designing a kitchen to be handicapped acces-
sible, toe space of deep and 8" to 11" high is
needed under the cabinets for wheelchair footrests.

Answers

Answer:

ok.... ..............

the most important keyboard instrument of the romantic period was the

Answers

Answer:

piano

Explanation:

HELP HELP HELP HELP HELP HELP PLEASE GUYS​

Answers

Answer:

word

Explanation:

Easy Question I will make you brainless Just answer this 10 question!!​

Answers

Answer:

B

Sc

B

Sc

B

B

Sc

B

Sc

Sc

Explanation:

Not positive sorry if its not 100% correct

which type of broadband internet offers connections nearing the speed of light?

Answers

Answer:

FiberOptic connections

Explanation

One of the fastest data transfer methods for computers.

The type of broadband internet that offers connections near the speed of light is fiber-optic. The correct option is c.

What is fiber-optic?

Information can be sent from one location to another via optical fiber. Communications over the internet, cable television broadcasts, and telephone calls all use it.

Data transmission through the internet is one typical application. Most likely, a fiber optic cable connecting my computer and Brainly's servers to your browser allowed it to obtain this webpage.

Fiber optics is used in communications, medicine, optical inspection, lighting, and in the making of sensors. The Internet is a connection of computers from different places without wires. It is transferring information.

Therefore, the correct option is c. fiber-optic.

To learn more about fiber-optic, refer to the link:

https://brainly.com/question/10062531

#SPJ2

The question is incomplete. Your most probably complete question is given below:

Cable.

DSL.

fiber-optic.

satellite.

aaron has started a food blog on which he wants to post his recipes. he wants to place a high-quality image next to each cooking step. which file format should he use so that users do not experience a lag when loading the high-quality images on the website?

Answers

The picture format which should be embraced on Aaron's blog in other to ensure that customers have smooth viewing experience while also preserving the quality of uploaded images is the JPEG format.

File format refers to the manner in which files are encoded. Picture files have several encoding types such as JPEG, JPG, GIF, PNG and so on.

Since, Aaron is considering images which loads quickly without lagging, then he'll need to compress the size of the uploaded images so that they have smaller file sizes.

In other to preserve image quality while working down the size of the image, the JPEG image format, produced good quality images with smaller file sizes compared to other file formats.

Therefore, the file format which should be adopted by Aaron ls the JPEG picture format.

Learn more :https://brainly.com/question/24941137

did someone hang themself on the set of wizard of oz

Answers

No - it was a rumour that started when the film was having its 50th anniversary in 1989

Two structural members that cross each other when strengthening structures A. Triangulation B.cross bracing C.Lintel D.cantilever​

Answers

Cross bracing I think

most file managers include a way to create a folder through the save dialog box. true or false?

Answers

Answer:

false because most of the file managers just keep Everything organized by dates, years, and everything like that

Explanation:

what are the parts of a file?​

Answers

Answer:

A computer file is made up of three elements: characters, fields and records.

Explanation:

Hope this helps! :D

2) State True or False. 1. Abacus is an electronic device. 2. ROM is read and writes memory of computer. 3. Header and footer appear at the top and bottom of 4. The first microprocessor is INTEL 4004. 5. CTRL + A is used to print data in M.S. word. Answer the following questions:​

Answers

Answer:

1 false

2 false

3 false

4  true

5 false

Explanation:

Answer:

False, True, True, True, False

Explanation:

1. False, it is a calculation device not electronic device.

2. True

3. True, Header appear at the top and Footer appear at the bottom.

4. True

5. False, Ctrl + A in MS Word or other text platforms is used to select all the text, not to print data in MS Word. To print data in MS Word or other text platforms we use Ctrl + P.

Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times the character appears in the phrase. Ex: If the input is: n Monday the output is: 1 Ex: If the input is: z Today is Monday the output is: 0 Ex: If the input is: n It's a sunny day the output is: 2

Answers

Answer:

import java.io.*;  

public class Main {

   public static void main(String[] args) throws IOException {

       BufferedReader in = new BufferedReader(new InputStreamReader(System.in));

       String s;

       while ((s = in.readLine()) != null) {

           int total = 0;

           for (char character : s.toCharArray()) {

               if (s.charAt(0) == character) {

                   total++;

               }

           }

           System.out.println(total - 1);

       }

   }

}

Explanation:

We start the program by using the BufferedReader which will allow input from the user.

Then, we create a variable String that will take the input from the user.

Since the problem is asking us for the total number of times that the specified character appeared in the String, we will have to iterate over that String and count every time the character is found.

For this, I initialized an integer variable total, that takes count every time the character is found.

Using a for each loop, I converted the string to a character array (e.g. instead of a String "Monday", it will now look like {"M", "o", "n", "d", "a", "y"). It will iterate for each character it finds and checks if the character at position 0 is the same as the character at position i.

If the condition is true, then the total will increment by one.

But the problem is, since we converted the string into a character array to validate each character, the initial character will also add to the sum. So for "n Monday", it will take the first n, and add the total + 1.

Without specifying total - 1, "n Monday" will output 2 since there are two total "n".

There is a limitation, which wasn't specified in the problem statement anyway, but it's good to be aware of in case you need to solve it. If you want to check all of the characters that must equal the character you want to validate, irrespective of upper or lowercase, you will have to convert the string to lowercase first, so that the program will take the uppercase letters into account as well.

For that, before the for each statement, simply add s = s.toLowerCase();

the fast speed of _______ available today enable computers to work very fast​

Answers

Answer:

main hardware components such as:

1. CPU

2. RAM

3. Motherboard (bus speed)

4. Hard drive

5. Video Card

6. Cache

7. Latest operating system (Windows XP, Windows 10, etc.)

The light in a room must be turned on when there is one or more person in the room and turned off the rest of the time. A sensor is used to detect if there is someone in the room. Describe the use of a microprocessor to control the light in the room.

Answers

Answer:

ZOO WEE MAMA

Explanation:

ZOO WEE MAMA 23

explain on what you did and give on how problems as such can be avoid inthe future

Answers

More info please, it is very invalid

what is the answer ?????​

Answers

Answer:

1) Driver or option D

2) Kindle or option C

why do cyber attackers commonly use social engineering attacks?

Answers

Answer:

Sometimes the computer's brain is too secure, so of that's the case you should just try to hack the human brain by tricking it to give you the password to an account, or whatever you are using it for.

Hope this help please give the brainliest award.

Answer:

Attackers can gain what they want while bypassing most technical security controls

Explanation:

.

did someone hang themselves on set of wizard of oz

Answers

No - its a rumour that has been going around since the films 50th anniversary in 1989.

!!HELP!!
I need to know what the code is!!

Answers

What is the webpage link then click ctrl i that will show source code I am not for shure if this helps if not let me know

________ is the use of information technology to support the sharing of content among networks of users.

Answers

Answer:

The social media is the use of IT to support the sharing of content among network of users.

how to generate random numbers in excel without duplicates

Answers

Answer:

Generate Random Number List With No Duplicates in Excel:

1. Select cell B3 and click on it.

2. Insert the formula: =RANDBETWEEN(10,30)

3. Press enter.

4. Drag the formula down to the other cells in the column by clicking and dragging the little “+” icon at the bottom-right of the cell.

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

3.5.7: Rectangle, Part 2 its python coding

Answers

The program which calculates the area of a rectangle written in python 3 is given thus :

def calc_area_rectangle(length, width):

#initialize a function named calc_area_rectangle which takes in two arguments

area= length * width

#the products of the arguments which are the length and width of value of the rectangle is assigned to the variable named area

return round(area, 2)

#the function returns the value of area rounded to 2 decimal places.

print(calc_area_rectangle(10, 20))

#sample run of the program

Learn more :https://brainly.com/question/25162828

lauren wants to write short articles and post them online. if she has an internet connection, what software can help her do her work?

Answers

Lauren could accomplish her aim if she has an internet connection by making use of Zoho writer.

Zoho writer provides Lauren with a platform to write and post her documents as long as she has internet connection because zoho writer is cloud based.

The fact that Zoho writer ls cloud based, it means that only internet connection is required as the platform is equipped with a word processing tools and a clean user interface, which provides all the tools required to write a good document.

Therefore, zoho writer software could be adopted by Lauren once she has internet connection.

Learn more :https://brainly.com/question/24978746

A color image is made up of red green and blue color combinations 8 bits are used to represent each of the color components how many possible variations of red are there?

Answers

Answer: The three RGB colors are each 8-bits (possible values [0..255], 2 8 = 256) of each of Red, Green, and Blue. The three 8-bit RGB components can create up to 256×256×256 = 16.7 million possible RGB color combinations, called 24-bit "color". Of course, any one real photo image will not use most of these possible colors.

There is possible is the variation of the red color. The RGB is a combination of color. The 8 bit are the division of the 256 are equal to the 16 million.  

What is color?

The term “color” refers to the element of light. Color is part of communication. There are different colors that have different meanings, such as red, which represents love and danger. Colors are divided into different categories such as primary, secondary, and tertiary.

The color is the combination of the RGB colors. The letters R, G, and B stand for Red, Green, and Blue, respectively. The 8 bits for 256 shades of the RGB This means R = 256, G = 256, and B = 256 (256 × 256 × 256) are producing the 16 million colors. The variation of the red is possible to achieve an equal color.

As a result, the variation of the red color are possible are 256.

Learn more about on color, here:

https://brainly.com/question/19580247

#SPJ2

ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!


1. A means of giving credit to a source when their information is used.

A) Citation
B) Wi-Fi
C) Asynchronous Communication
D) Malware

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
A) Spyware
B) Phishing
C) Malware
D) Wi-Fi

3. A device that translates analog carrier signals to encode and decode digital information.

A) USB
B) Computer Virus
C) Intranet
D) Modem

4. A virus or Trojan horse designed to cause harm to computer or device.

A) Hardware
B) Malware
C) Modem
D) Antivirus Application

5. Software that is used to detect and eliminate computer viruses.

A) Wi-Fi
B) Cable Internet
C) Antivirus Application
D) Browser

6. Transmits data through a cable television network as a means to connect a computer to the internet.

A) Desktop Interface
B) Cable Internet
C) Operating System
D) USB

7. An application used to access websites on the internet.

A) Malware
B) Internet
C) Proprietary
D) Browser

8. Communication that does not happen in real time.

A) Asynchronous Communication
B) Wi-Fi
C) Ethernet Cable
D) Malware

9. A network of computers that provides access to information on the web.

A) Phishing
B) Internet
C) Antivirus Application
D) Modem

10. The cable used to connect computers in a network.

A) Computer Virus
B) Ethernet Cable
C) Intranet
D) Hardware

Answers

Easy Peasy Lemon Squeezy

1. A means of giving credit to a source when their information is used.

A.) Citation

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.

B.) Phishing

3. A device that translates analog carrier signals to encode and decode digital information.

D.) Modem

4. A virus or Trojan horse designed to cause harm to computer or device

B.) Malware

5. Software that is used to detect and eliminate computer viruses.

C.) Antivirus Application

6. Transmits data through a cable television network as a means to connect a computer to the internet.

B.) Cable Internet

7. An application used to access websites on the internet.

D.) Browser

8. Communication that does not happen in real time.

A.) Asynchronous Communication

9. A network of computers that provides access to information on the web.

B.) Internet

10. The cable used to connect computers in a network.

B) Ethernet Cable

Answer:

your mom

Explanation:

a falsh movies consist of how many frame? ​

Answers

TV displays at almost 30 frames per second (fps), while motion pictures display at 24fps (the default frame rate in Flash is 24fps). Animation is controlled with the Timeline, which appears above the stage (WINDOW > Timeline): Flash movies begin as a single frame. To add movement, you must create additional frames.
TV displays at almost 30 frames per second (fps), while motion pictures display at 24fps (the default frame rate in Flash is 24fps). Animation is controlled with the Timeline, which appears above the stage (WINDOW > Timeline): Flash movies begin as a single frame. To add movement, you must create additional frames.

Why do we collect feedback on the code we write?

Answers

Answer:

to improve our code

Explanation:

"To improve our code" we collect feedback on the code we write.

Collecting feedback helps the users to learn whatever your consumers think approximately company reputation, performance, as well as merchandise or their items.Going beneath their basic likes as well as their dislikes and assisting you in understanding and evaluating wherever you may grow and where the business position in comparison to your competition.

Thus the above answer i.e., "option a" is correct.

Learn more about feedback here:

https://brainly.com/question/1603365

Other Questions
Simplify (23)-2- -132O 64DONE if f(x)=3x-1 and g(x)=x+2,find (f+g)(x) Which physical feature labeled in the East is more than 250 million years old? Great Plains Rocky Mountains Appalachian Mountains Mojave Desert Neon consists of three isotopes: Neon-20 with a mass of 19.992 amu and an abundance of 90.48%, Neon-21with a mass of 20.994 amu and an abundance of 0.27%, and Neon-22 with a mass of 21.991 amu and an abundance of 9.25%. Determine the average atomic mass of Neon: What charge would an ion have if it had more electrons than protons?A. It would have a net positive charge.OB. It would have no charge.C. It would have a net negative charge. D. It would be neutral, since electrons would be outside the nucleus. You drive for 8 hours at an average speed of 26 miles per hour. What isthe distance you travelled? Each unit in the graph above is one block. How far would you have to walk from the harbor to the magic shop and then return to the harbor?Question 3 options:A) 5 blocksB) 9 blocksC) 3 blocksD) 6 blocks : Cho t din ABCD c AB, AC, AD i mt vung gc v AB = 6; AC = 7; AD = 4. Gi M, N, P ln lt l trung im BC, CD, DB. Khi th tch ca t din AMNP l: A. 28;3B. 14; C. 7; D. 72; True or false: Electronic machines with no moving experience friction and get hot because electricity is moving through wires In which sentence are the commasplaced correctly?A. The clearest fact, was that the older, wiser, andbetter people had been proven, in error.B: He hid amid the masking growth of artichokes,raspberry bushes, canes, and fruit trees.C. To Nicholas, it was, a living moving breathing story, What were the negative and positive consequences of assimilating Native Americans? 7 = -10s -3 is equal to " S =1" ???what is the correct answer i am correct or not?? help pls do this whole thing ill give brainliest to whoever does It first. PLS GIVE BACK BEFORE 11:59 or it DOESENT count A large koi pond is filled from a garden hose at the rate of 12 gal/min. Initially, the pond contains 200 gal of water.(a) Find a linear function V that models the volume of water in the pond at any time t.(b) If the pond has a capacity of 1304 gal, how long does it take to completely fill the pond? What is a main idea of Go, John Glenn!?Space exploration has become unpopular in the United States since the flight of Friendship 7.Glenn understands that part of the job of being an astronaut is being patient while waiting for the okay for take off.Glenn is unaware of how much danger he is in as his capsule returns to the earth.The goal for U.S. space missions to take the lead over other countries in space exploration was dangerous at times. 7) Using a fictional product or service, create a simple business plan byanswering the three questions business owners must consider.The three questions a business owners must consider are; 1 What good will be produced?2 How should it be produced?3 For whom should it be produced?What good will you produce, or what service will you provide? HELP!!!how does earths axis affect our seasons 5. Gardener Gary planted 21 rows of tomatoesand squash. He planted twice as many rows oftomatoes as rows of squash. How many tomatoplants were planted if there are 12 plants perrow? Describe how to round set to the best HELP PLEASE QUICKLY Help asap person to Anwser correct in 5 mins Ill give brainliest Anwser to