1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
3 years ago
15

What are three ways to protect yourself from identity theft when using your smartphone or computer?.

Computers and Technology
1 answer:
raketka [301]3 years ago
5 0

Answer:

1. Always download the latest updates .

2. Don’t click on rogue links .

3.Secure your devices (long, complex password on your computer and phone, using Anti-virus/Anti-Malware program) .

You might be interested in
If you Owned a business, what part of Microsoft Office would you use the most and why, which would you use the least and why, an
snow_lady [41]
<h2>Answer 1 with Explanation </h2>

Microsoft Word would be the most used part of the Microsoft office because you can type letters and draft documents easily including company reports, budgets, presentations, proposals and plans. It can also assist you with essential forms by building a library such as invoices, statements, receipts, agendas and memos and apart from this, you can create a mailshot where you can send a letter to some or all of your customers.

<h2>Answer 2 with Explanation </h2>

Microsoft presentation is the least used part of the Microsoft Office because it can only be used to make any presentation which may not be in need most of the time as the business is to be productive and communicate effectively. It involves emailing, letter writing, create documents, and more. Therefore, that it is easier for you to manage or organize all the details or important statements in one way and save it to be used at a later time and it does not get misplaced.

<h2>Answer 3 with Explanation </h2>

Microsoft Excel can be utilized to create notes, record sales trends and other business data. It provides business with tools that they need to make the most out of the data and excel spreadsheets are commonly used in every business to display financial information. To create grids of text, numbers, and a formula involving calculations, Microsoft Excel can be used conveniently as it is used to record expenditures, income and plan budgets.

4 0
3 years ago
Smart art is considered a​
mina [271]

Explanation:

visual representation of information and ideas, and a chart is a visual illustration of numeric values or data. Basically, SmartArt graphics are designed for text and charts are designed for numbers. Use the information below to decide when to use a SmartArt graphic and when to use a chart.

4 0
3 years ago
The given SQL creates a Movie table with an auto-incrementing ID column. Write a single INSERT statement immediately after the C
Snowcat [4.5K]

Answer:

INSERT INTO Movie(Title,Rating,ReleaseDate)

VALUES("Raiders of the Lost ArkPG",'PG',DATE '1981-06-15'),

("The Godfaher",'R',DATE '1972-03-24'),

("The Pursuit of Happyness",'PG-13',DATE '2006-12-15');

Explanation:

The SQL statement uses the "INSERT" clause to added data to the movie table. It uses the single insert statement to add multiple movies by separating the movies in a comma and their details in parenthesis.

3 0
3 years ago
The process of sound _____________________ is accomplished by combining two or more sound tracks by recording them onto a single
Lubov Fominskaja [6]
It's the process of sound layering. Audacity is a simple program in which you can do this!
7 0
3 years ago
What is meant by close to 75% of all viruses is contracted through friendly means?
snow_lady [41]

Answer: This means that even though we believe the information is coming from a trusted source, it could still contract a virus due to someone else hacking it or the original sending not being aware of the virus.

Explanation: Just because information comes from a trusted/friendly source does not mean the information is clear of potential threats. Viruses are able to hide in information and the sending may not be aware that the virus is hiding in the information.

4 0
4 years ago
Other questions:
  • Question: when using a line graph, why is it important to only graph 1-3 series of data?
    8·1 answer
  • Group technology identifies components by a coding scheme that specifies the
    13·1 answer
  • A qué escala está dibujado el plano del Instituto si sabemos que la puerta principal de entrada tiene un ancho 3,40 metros y en
    14·1 answer
  • Write a function called random_marks. random_marks should #take three parameters, all integers. It should return a #string. # #T
    13·1 answer
  • Complete the function to return the factorial of the parameter using recursion,
    10·2 answers
  • Who invented pascaline and when?​
    11·2 answers
  • What is the definition of trouble shooting.
    12·1 answer
  • What are some other ways to program a robot to navigate a complicated environment other than straight paths and right angle (90
    8·2 answers
  • _____ is confirming the significance of what another person is feeling.
    9·2 answers
  • Who doesn't like reeses
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!