1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
2 years ago
7

One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs

create a disaster recovery plan open online pop-up notifications post personal information online
Computers and Technology
1 answer:
Makovka662 [10]2 years ago
7 0

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs.

<h3>What is malware?</h3>

Malware is any programme that is purposely designed to disrupt a computer, server, client, or computer network, leak private information, obtain unauthorised access to information or systems, deny users access to information, or otherwise interfere with the user's computer security and privacy.

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs. The reason for this is that such links may contain malware or spyware.

Learn more about Malware:

brainly.com/question/14276107

#SPJ1

You might be interested in
What is a characteristic of a wan hub-and-spoke topology?
olga nikolaevna [1]

The characteristic of the WAN hub and spoke topology is that it is considered to be a branch site or composed of the branch site in which they are likely to be connected to a site that is central and that is through the point to point links.

8 0
3 years ago
At the time of signing, what was the title of the man who is the first of the two names in the name of the 1901 treaty that null
pshichka [43]
The answer is the US Secretary of State.  <span>At the time of signing,Secretary of State was the title of the man (John Hay) who is the first of the two names in the name of the 1901 treaty that nullified the Clayton-Bulwer Treaty. </span>It was signed by US Secretary of State John Hay and British Ambassador to the United States Lord Pauncefote on the 18th of November 1901. 
3 0
3 years ago
Read 2 more answers
A spreadsheet has some values entered: Cell A1 contains 10, cell A2 contains 14, cell A3 contains 7. You enter in cell A4 the fo
Alinara [238K]
A1 is 10, so your answer is 10+2=12
B. 12
6 0
3 years ago
Read 2 more answers
Vocational schools are also called all of the following except:
Salsk061 [2.6K]
A vocational school can also be called all of the following except a certification school.
7 0
3 years ago
Read 2 more answers
Which of these statements are true of verifying that a program’s code is fixed? Check all of the boxes that apply.
aksik [14]

Answer:

Its C.

Explanation:

hope it helps !

mark me brainliest :))

7 0
3 years ago
Read 2 more answers
Other questions:
  • To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia
    7·1 answer
  • What is a multipurpose network device?
    12·1 answer
  • 5. The stage of engine operation when both the intake and exhaust valves are closed is the _______ stage.
    5·1 answer
  • In 1-2 pages, identify a social networking technology and identify at least 10 security and/or privacy risks the technology has
    8·1 answer
  • WHY DO YOU DElete EVERY QUESTIONS THAT IS ASKED! Im a freaking guy, yes and i wont followers for my channel so leave me alone!
    7·2 answers
  • Write down eight points on how modern technology have effected our life ?
    12·1 answer
  • Provide the user with a menu for the following 10 algorithms. Then ask which algorithm the user decides she/he wants to use. Fin
    9·1 answer
  • Help please match them if you just put a link or say “I don’t know but thanks for the points” I’ll report your answer and you wo
    10·1 answer
  • Why are salaried employees often excluded from overtime pay
    5·1 answer
  • What are the advantage of an e-library​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!