Kyra is protesting corruption in the mayoral office. She is afraid that the mayor has access to her emails where she discusses his wrongdoings. Which of the following laws protects her electronic communication from being accessed by the government or law enforcement agencies?

Answers

Answer 1

Answer:i don’t know sorry

Explanation:


Related Questions

Select the correct answer.
Which option would you use to insert two line breaks in your document?
A.<2br>
B.

C.


D.

Answers

Answer:

yes, I agree.

Explanation: ,

Choose the response that best completes the following statement.

"If you're not sure if you should be on a site or signing up for a profile, ________."

ask permission
consider the outcome
don't say it online
use the 5-second pause

Answers

Answer:

probably the 5 second pause

consider the outcome?

If a friend gave a used Wii disc to someone, and they put it in their Wii, could they play it? Nintendo Switch games can only be used on 1 switch, so is that the case?

Only answer if you know, please.

Answers

Any game disc or card can be used on multiple consoles

You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection to implement to address your concerns?
a. Require strong passwords in teh local security policy.b. Use cable locks to chan the laptops to the desks.c. Implement screen saver passwords.d. Encrypt all company data on the hard drives.

Answers

There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.

The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.

With this, your computer becomes theft-proof.

Thia will give you piece of mind as you will not be restless anymore.

Learn more about Laptop security from

https://brainly.com/question/24956493

Do you guys know a unblocked music player because lite tube is blocked?

Answers

A music player is a software or application which is used to playback music so that a user can play, pause, rewind, fast forward or save his favorite playlist and may even contain lyrics to the song.

With this in mind, there are different music players which are used by many users around the world which includes:

D33zerPand0raYT MusicAppl3 music, etc.

These music players contains various functionalities so each user has a unique experience and can easily make his choice on the type of music player he wants to use.

Please note that your question is considered SPAM so I gave you a general overview so that you would get a better understanding of the concept.

Read more about music players here:

https://brainly.com/question/2456743

Fill in the blank: A data analyst is creating the title slide in a presentation. The data they are sharing is likely to change over time, so they include the _____ on the title slide. This adds important context.

Answers

The title of a presentation often gives a meaning and closure to what the presentation is all about. The data they are sharing is likely to change over time, so they include the date of the presentation on the title slide.

A title slide in PowerPoint often has a lot of different meaning. The date on a title slide is usually placed in the Header and Footer box, you have to click on the Slide tab, select the Date and time check box.

The Layout option to title a slide is simply the following steps below

The first you click Home and select Layout. Select Title Slide for a standalone title page or select Title and Content for a slide that contains a title and a full slide text box. There are a lot of other layout options include titles, too. Pick the one that's best suited for your presentation.

Learn more from

https://brainly.com/question/11068366

In a computer network, a _____ server is a specialized server that manages resources for the network.

Answers

Answer:

Directory Server

Explanation:

Maps network resources, such as files and user accounts, to network addresses. This allows the resources on a network to be discoverable.

helpppppppppppppppppppppppppppppppppppppppppppppppppppp

Answers

Answer:

I would say B.

Explanation:

It seems the most logical. :)

What is the largest integer that can be represented with 4 bits?.

Answers

Answer:

15

Explanation:

You can calculate the maximum number using a simple formula:

2^N (Where N is the number of bits) - 1

So 2^4 - 1 = 16 - 1 = 15

NFPA 780, Standard for the Installation of Lightning Protection Systems provides information on the installation of _____ for lightning protec-tion systems [250.4(A)(1)].

Answers

Answer:

a and b. 250.4(A)(1) Note

Explanation:

When it is being used to make a telephone call, your smartphone is an example of which part of the communication process

Answers

In the communication process, when your smartphone is being used to make a telephone call, your smartphone is an example of a: medium.

Communication refers to a process which involves the transfer of a message (information) from an individual (sender) to another (receiver), through the use of semiotics, symbols and signs that are mutually understood by both the sender and the receiver.

The Sender Message Channel Receiver (SMCR) model of communication is composed of four (4) main components and these are;

Sender (S).Channel (C) or Medium.Message (M).Receiver (R).

In the communication process, a smartphone which is being used to make a telephone call is an example of a medium or channel because it provides the pathway for the transmission of a message (information) from an individual (sender) to another (receiver).

Read more: https://brainly.com/question/17438207

with which type of satellite is there a propagation delay?

Answers

Geostationary satellites have a high propagation delay.

A NAND gate is a type of logic gate that produces an output of false only when both of its two inputs are true. Otherwise, the gate produces an output of true. Which of the following Boolean expressions correctly models a NAND gate with inputs P and Q?
a. (NOT P) AND (NOT Q).
b. (NOT P) AND Q.c. NOT (P AND Q).d. NOT (P OR Q).

Answers

A NAND gate combines the NOT gate and the AND gate.

For inputs P and Q, the boolean expression for the NAND gate is c. NOT (P AND Q)

The NAND gate means:

NOT AND

Assume the inputs are x and y, then the formula would be:

NOT (x AND y)

In this case, the input variables are P and Q.

So, we replace x and y with P and Q, respectively.

The formula becomes NOT (P AND Q)

Hence, the correct expression is (c)

Read more about NAND gates at:

https://brainly.com/question/11178154

Power Supply

Description :

Answers

A device that supplies power to electronic equipment which; is sometimes called A, B, or C according to its purpose of heating vacuum tube cathodes, producing electron current flow in plate circuits, or applying a direct voltage in grid circuits.

Explanation:

Not exexactly sure on what your asking

When should you close the socket python tcp server client.

Answers

f socket refers to an open TCP connection, the connection is closed. If a stream socket is closed when there is input data queued, the TCP connection is reset rather than being cleanly closed. The descriptor of the socket to be closed

To close the socket you need to call shutdown() first and then close(), and shutdown takes an argument

independence day in school long passage plss​

Answers

Answer:

Independence Day Celebration in My School

Fifteen August, is a red letter day in the history of India. On this day in 1947, our country become free form the long imprisonment of the British rule. Since 1947, fifteenth August is celebrated every year with great joy and pride. It reminds us for the great struggle of our freedom from the British rule. The great sacrifice for our freedom fighters is remembered, which serves as a beacon light for the development of this great country. The main function is held at Red Fort in Delhi where the Prime Minister unfurls the National flag. It is an occasion of celebration for every Indian and the whole nation celebrate a holiday from all work and take a pledge to work whole heatedly for the development of this country and preservation of Independence. All those who have stood out exclusively in their respective field of work are honored in public meetings. The whole nation pays homage to the security forces who have laid down their lives for the honor and security of the country.

We also celebrated the Independence day in our school compound, with great pump and show. The school building and the ground were cleaned and decorated for the occasion. A flag pole was put up at the top of the school building. The seating arrangement was made on the platform. Markings were made on the ground with white lines. The flower pots were kept all along the path.

There was great enthusiasm among students. The school band of students took its position half an hour before the actual function was to began. The members of the band were wearing a beautiful uniform. They began to play sweet tunes. The students had taken their places well before the time. They were all in school uniform, the white paint and white shirt.

The function began exactly at 8 a.m. all who were present stood in attention. The principal unfurled the flag. The petals of rose fell on us. Five boys sang a song in honor of the national flag. It was “Vijayee Vishwa Trianga Payara”. Them by the school band. The principal look the salute. He made an impressive speech and invited the Education Minster to impressive speech and invited the Education Minster to address us. In his address he asked us to take pledge to safeguard the freedom of nation. He also reminded us of great sons of India, Mahatma Gandhi, Pt. Nehru, Subhash Chandra Bose, Lala Lajpat Roy and Chander Shekar Azad and their sacrifices to the nation. After that different groups of students presented a programme of mass drill and pyramid formation. Ever one liked the programme.

In the end, all stood in attention. All the students, teachers and guardians sang the National Anthem in chorus. With this the function was over. Today the memories of this function are as alive to me, as it was on that day.

The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.

Answers

Answer:

IDggK

Explanation:

A business is having trouble keeping up with the competition. They cannot
respond to their customers like the competition. Which type of system will
likely be able to help them solve this issue?
A. Transaction processing system
B. Management communication system
C. Decision support system
D. Management information system

Answers

Answer:

Decision support system is the answer

Explanation:

You need to manage a process in the foreground by pressing Ctrl+C on the keyboard. Which signal code is sent to the process?

Answers

The signal code is copy

Systems management involves allocation of computer resources to keep all processes operating smoothly and at maximum efficiency. What aspects of computing do systems management tools handle? Which ones do you think are the most important? Why?

Answers

Answer:operating system (OS), program that manages a computer's resources, especially the allocation of those resources among other programs. Typical resources include the central processing unit (CPU), computer memory, file storage, input/output (I/O) devices, and network connections.

Explanation:

The important systems management tools are:

Resource Allocation

Performance Monitoring

Software Deployment and Updates

Backup and Recovery

Remote Management

Inventory and Asset Management

Given data:

Systems management tools handle a variety of aspects in computing to ensure the smooth and efficient operation of computer systems. Some of the key aspects that systems management tools handle include:

Resource Allocation: These tools manage the allocation of hardware resources such as CPU usage, memory, and storage to different processes and applications. They prioritize resource distribution to ensure optimal performance.

Performance Monitoring: Systems management tools monitor the performance of various components and processes, tracking metrics like CPU usage, memory utilization, network traffic, and disk activity. This helps identify bottlenecks and areas for optimization.

Software Deployment and Updates: They facilitate the installation, deployment, and updating of software applications and patches across multiple devices or servers in a network.

Backup and Recovery: Systems management tools handle data backup, disaster recovery, and data restoration to prevent data loss and ensure business continuity.

Remote Management: Many tools enable administrators to manage and troubleshoot systems remotely, reducing the need for physical presence and minimizing downtime.

Inventory and Asset Management: These tools track hardware and software assets, helping organizations maintain an accurate inventory and plan for upgrades or replacements.

To learn more about system management tools, refer:

https://brainly.com/question/29713596

#SPJ3

how important are operating system in our devices?​

Answers

Answer:

An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language. An operating system has three main functions: (1) manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.

(Hope this helps, please mark as brainiest <3.)

Yahoo Messenger is an example of a/an __________ service on the Internet.

Answers

Answer:

Yahoo Messenger is an example of a service on the Internet.

INSTANT MESSAGING SERVICE, which includes text messaging, voice calling and file sharing.

Pls name me brainliest!!! ;D

Create an application that prompts the user for a number and then displays the numbers 1 through the number entered, each on a separate line. Below the numbers, the sum is displayed.

Answers

Answer:

In Python:

start = num(input("Enter a number: "))

sum = 0

for x in range(1, start+1):

sum += x

print (x)

print ("Final Sum: " + sum)

Answer:

import java.util.Scanner;

public class NumberSum {

public static void main(String[] args) {

// TODO Auto-generated method stub

int num, sum=0,num1=0;

Scanner input=new Scanner(System.in);

 

System.out.println("Enter a number");

num=input.nextInt();

input.close();

 

do{

System.out.println(num1);

num1+=1;

sum+=num1;

}while(num1<=num);

System.out.println(sum);

}

}

A web-based program that uses artificial intelligence techniques to automate tasks such as searches is called

Answers

A web-based program that uses artificial intelligence (AI) techniques to automate tasks such as web searches is called a: bot.

Artificial intelligence (AI) is also referred to as machine learning and it can be defined as a branch of computer science which involves the process of using computer algorithms to build a smart computer-controlled robot that is capable of automatically performing and handling tasks that are exclusively designed to be performed by humans or using human intelligence.

In the field of artificial intelligence (AI), a bot is an abbreviation for robot.

A bot is a web-based software program that assists an end user, or acts on his or her behalf, in the automatic performance of repetitive computer-related tasks such as web searches.

Read more: https://brainly.com/question/21656851

When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides or bottom of an image?

B will resize but not maint aspect ratio was correct

Answers

Answer:

b. It will resize the image but not maintain aspect ratio

Explanation: is correct. post protected

Answer:

b

Explanation:

a steep reduction is memory available on the heap to the poiont where it is completly exhausted is known as a

Answers

Based on the information that is given, a steep reduction in the memory that's available is known as a memory leak.

A memory leak simply means a form of resource leak which occurs when a computer program manages memory allocations incorrectly in such a way that the memory that isn't needed anymore aren't released.

It should be noted that a memory leak is also a steady reduction in memory available on the heap to the point where it's exhausted. It can also be when an object that is stored in memory can't be accessed by the running code.

Read related link on:

https://brainly.com/question/25820385

1. The NetworkManager or Systemd Networkd components must be installed on a Linux system in order to configure an IP address on a network interface. True or False

Answers

The NetworkManager or Systemd Networkd components must be installed on a Linux system in order to configure an IP address on a network interface: False.

An IP address is an abbreviation for Internet protocol address and it refers to a unique number that is assigned to a computing device or network device, so as to differentiate each computing device from one another in an active network system.

This ultimately implies that, an IP address is typically designed and developed to uniquely identify each computing device or network device that is connected to the Internet or an active network system.

Note: NetworkManager (GUI tool) are configured on desktop computers only while Systemd Networkd are typically configured on servers.

For a Linux system, you don't have to install the NetworkManager or Systemd Networkd before configuring an IP address on a network interface.

Read more: https://brainly.com/question/20629962

In high-tech fields, industry standards rarely change.
True
False

Answers

Answer: false

Explanation:

it literALLY HAS NOTHING TO DO WITH MY ASSIGNMENT

Answers

Ansgokublue

Explanation:

You receive a worksheet in which the rows are numbered 1, 2, 3, 5,6. This means that row 4 is _____.

Answers

People often hide cells of worksheet due to different reasons. This means that row 4 is hidden.

A worksheet is commonly know as a sheet of paper/computer sheet with which work is done or performed.

 

An individual can hide any worksheet so that it can be removed from their view. The data in hidden worksheets is not visible to the person, but it can still be referenced from other worksheets and workbooks. One can unhide hidden worksheets if need be.

Learn more from

https://brainly.com/question/17106092

Other Questions
Geometry- Solve the portion. Question#3 what is method 1 for proposal are in the Amendment ProcessWILL MARK BRANLIEST 4. Complete the sentence by choosing the verb that agrees with the subject.Many a chick and a gosling_____on this farm.A. are raisedB. have been raisedC. has been raisedD. No change needs to be made to this sentence 5. ________are those who do not have a home and really need help. instructions:wikarambulan is a sound like game. by saying\pronouncing and connecting the word, reveal the elements and factors of principles, tools and techniques in creating a business. write your answer on the blank space provided in the side of the paper. 1. IS TRE ENGCKS2. OP FORTUNE NI TEAS 3. WEEK NEST CES 4.THREE EATS 5. IN DUST TREE 6. END BY RON MEANT ALL 7. PIE HAVE FOUR ZEST 8. ENCHO NO MEEK 9. SOAP FLYER 10. COST TOO MHER Note: Your teacher will grade your response to this question to ensure you receive proper credit for your answer. 16. A triangle has side lengths of 6, 8, and 10. Is it a right triangle? Explain. Plain Folks is an example of?A: Rhetorical AppealB: Rhetorical DeviceC: Logical FallacyD: Propaganda What type of loop allows you to indicate the starting value for the loop control variable, the test condition that controls loop entry, and the expression that alters the loop control variable, all in one convenient place Cases in both federal and state courts catch up quickly thereby fulfilling the "the right to a speedy public trial" as is prescribed in which of the following Constitutional Amendments? Select one:a.10th Amendmentb.6th Amendmentc.1st Amendment Of the sheep discussed in the presentation, which of the following has the heaviest and largest horns?O Desert BighornsO AoudadO Rocky Mountain BighornO Pronghorn Mary signed up and paid $1,320 for a 6 month ceramics course on June 1st with Choplet Ceramics. As of August 1st, Choplets accounting records would indicate: 12. How many years did Ibn Battuta work directly for the King of India bearing courtcases? what is atomic mass in Chemistry pls help me with this question ... if a sprinkler waters 1/14 of a lawn in 1/2 an hour, how much time it will take to water the entire lawn 100 IF U GET THIS RIGHT! What is the value of 3x + 4y when x = 5 and y = 3? if r*s= sr then 3*2= anthropologists are suspicious of naturalizing discourses because What is a rhetorical analysis?a)A summary of an argument provided in a textb)An explanation of whether you agree or disagree with an argumentc)A creative writing essay or poemd)A detailed evaluation of an argument provided in a text