1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
2 years ago
7

One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs

create a disaster recovery plan open online pop-up notifications post personal information online
Computers and Technology
1 answer:
Makovka662 [10]2 years ago
7 0

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs.

<h3>What is malware?</h3>

Malware is any programme that is purposely designed to disrupt a computer, server, client, or computer network, leak private information, obtain unauthorised access to information or systems, deny users access to information, or otherwise interfere with the user's computer security and privacy.

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs. The reason for this is that such links may contain malware or spyware.

Learn more about Malware:

brainly.com/question/14276107

#SPJ1

You might be interested in
When building systems, the only two entities that constitute software engineering are people and process.
VLD [36.1K]

Answer: False

Explanation: Software engineering is the designing, analyzing, creating the software application as per the requirement of the user. The programming languages is the base for the designing of the application the software engineering field.

At the time of building system ,there is the requirement of many resources for the development.There is the requirement of the software skills, programming knowledge, resources and tools for the working and designing.Thus, there are different resources, people,skills processes, problem solving skill etc required for the building of the system.

7 0
3 years ago
What are web services?
nekit [7.7K]

So far the most general and convincing definition is to say that Web Services are the set of applications or technologies with the ability to interoperate on the Web. These technologies exchange data between them in order to offer services.


7 0
3 years ago
The part of the eye thats similar to the film of a camera is the
Lapatulllka [165]
The retina is the part pf the eye that is similar to the film of a camera. It is a thin layer of cells that is located at the back of the eyeball. This part contains photoreceptor cells which respond to light where the neural signals received undergoes complex processing by other neurons in the retina.
3 0
3 years ago
If you define a function name, and it turns purple instead of blue, what should you do?
xenn [34]
You should change the name of the function
3 0
3 years ago
A voltage measurement error is caused by the integration time window of a digital volt-meter. This is a _____________error.
gladu [14]

Answer: Systematic error

Explanation:

  The systematic error is the type of error which is basically caused due to the integration time of the digital volt meter in the voltage error measurement.

It is one of the type of error that occur during the measurement of the voltage due to mismatch start channel. It basically result into the difference between the fall and rise in channel and the difference in the propagation delay.

The systematic error is basically introduce by interconnect different types of cable and setting the triggering level in the system. This type of error are constant in the given measurement configuration process.

4 0
3 years ago
Other questions:
  • 16.50. Suppose we have a sequential (ordered) file of 100,000 records where each record is 240 bytes. Assume that B = 2,400 byte
    11·1 answer
  • A student is reading a book for language arts. She has to finish three chapters by class tomorrow, because there will be a quiz.
    6·2 answers
  • What is the use of html in websites
    15·2 answers
  • A technician wants to consolidate and log specific alerts from network devices into a database so maintenance tasks and potentia
    11·1 answer
  • Design a circuit that has a 3-bit binary input B2, B1, B0 (where B2 is most significant bit and B0 is least significant bit) and
    14·1 answer
  • Some architectures support the ‘memory indirect’ addressing mode. Below is an example. In this case, the register R2contains a p
    8·1 answer
  • What is data analysing data and give three examples ?​
    9·1 answer
  • I know that this will be taken down for not being a real question but is anyone else not able to search for anything? I can type
    13·1 answer
  • Types in java are divided into two categories. the primitive types are boolean, byte, char, short, int, long, float and double.
    5·1 answer
  • Which data type is the correct choice to store the names of all the hockey players who have scored 3 or more goals in a single g
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!