1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
3 years ago
6

What is the best method to avoid getting spyware on a machine

Computers and Technology
1 answer:
monitta3 years ago
3 0

Answer: The best method to avoid getting spyware on a user machine is to download software only from trusted websites. And depending on the machine it might say that "This download you are about to install might have spyware or malware and it might infect your laptop" "Do you wish to continue?"

You might be interested in
What is an input periphal
Lorico [155]
Anything that you can you to input actions or data into a computer. For example mice and keyboards are input peripherals because you use them to give the computer input of actions you want it to perform. This includes actions like opening a web browser with a mouse click or typing characters to the screen with a keyboard.

The opposite would be an output peripheral which would be something like the computer screen itself.
4 0
3 years ago
Read 2 more answers
Dynamic addressing: __________.
Anarel [89]

Explanation:

jwjajahabauiqjqjwjajjwwjnwaj

6 0
3 years ago
Read 2 more answers
Pressing the Ctrl+Home keys moves the insertion point to the
rewona [7]
I'm going to go with A
5 0
3 years ago
Information about www
iragen [17]

Answer:

Here is your ans

Thanku you

4 0
3 years ago
"Which of the following will help protect against a brute force attack?
Effectus [21]

Answer:

B

Explanation:

A complex and unpredictable password would prove very hard to guess or deduce for any attacker.

3 0
4 years ago
Other questions:
  • Which of the following steps in enumeration penetration testing extracts information about encryption and hashing algorithms, au
    13·1 answer
  • Write a program that reads from user (i) an hour between 1 to 12 and (ii) number of hours ahead. The program should print the ti
    15·1 answer
  • Write a SELECT statement that returns these column names and data from the Order_Items table:
    14·1 answer
  • Which of the following statements is used to terminate the program when closing the frame?
    5·1 answer
  • To delete a record, tap or click the record selector for the record, and then press the ____ key(s).
    12·1 answer
  • What is an overview of your opinion of Digital Etiquette? Do not look it up bc I will know!
    7·1 answer
  • Consider a computer that uses 5 bits to represent positive integers and uses all 5 bits to represent the value.
    9·1 answer
  • In the software development process, which review studies the software design before it is released for coding?
    7·1 answer
  • While working on a Windows workstation, you've enabled Remote Desktop.
    14·1 answer
  • Q.3.1 Explain why devices on a network need addresses. (5)​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!