1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
2 years ago
6

What information most likely presents a security risk on your personal

Computers and Technology
1 answer:
11111nata11111 [884]2 years ago
6 0

An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.

A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.

Some of the social characteristics and details of an individual that are shared on social media websites include the following:

  • Date of birth.
  • Occupation.
  • Religion.
  • Gender (sex).
  • Location.
  • Friends.

However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.

In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.

Read more: brainly.com/question/21765376

You might be interested in
What is the characteristics of a spear phishing message
Cerrena [4.2K]
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
7 0
3 years ago
Read 2 more answers
Create an algorithm and flowchart that will accept name of user and display it.
vivado [14]

Answer:

Algorithm

1.Start.

2.Using an input function, ask the user to input the name and store the Entered Value in string    variable.

3.Print value stored in String Variable.

4.End.

Flow chart:

5 0
4 years ago
Given the following classes and their objects:
Andrej [43]

Answer:

The answer is "Option b"

Explanation:

In the given code three-class C1, C2, and C3 are declared, in which C2  and C3 extend the class C1. In the next line, C2 and C3 object are created, that is c2 and c3. and in the last line c2 class object holds two-class C2, C1, and one object c3 value, this code will give runtime error because it can't cast object from sibling class, and wrong choices can be defined as follows:

  • In option a, It is not correct because it can't cast c3 object into c2 object.
  • In option c, It is not correct because it performs multiple casting in nested forms.
  • In option d, It is wrong because the statement is not correct.
3 0
4 years ago
Henry uses a laptop and has noticed that sometimes when he is typing, the cursor will move, causing him to mistype words or even
Nikolay [14]

Answer:

C. He can turn off the touchpad in Windows.

Explanation:

Option A is not correct. Connecting a touch screen monitor is not a solution as Henry has no problem with his monitor.

Option B is not correct. Attaching a USB mouse is not a solution as the mouse can also be moved mistakenly thereby causing probability for mistake.

Option C is correct. Turning off the touchpad from the windows will make Henry to avoid making such mistakes.

Option D is not correct. Putting a sheet of paper over the touchpad is not a solution as the paper can be easily moved and the paper contact with the mouse can cause mistake.

4 0
4 years ago
The grade of a metric bolt is designated by
Andre45 [30]
The answer to your question is The grade of a metric bolt is designated by the number stamped on the head of the bolt.
5 0
3 years ago
Other questions:
  • What's the difference in unicode value between 'e' and 'a'? (consult a table of unicode values):?
    7·1 answer
  • _____is empty space between the margin and text.
    8·1 answer
  • Which of these should most likely be included in a wire frame ?
    12·1 answer
  • A device has an IP address of 10.1.10.186 and a subnet mask of 255.255.255.0. What is true about the network on which this devic
    9·1 answer
  • Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz
    12·1 answer
  • When the amount of storage data is big, and we need the searching and insertion must be very fast, which kind of data structure
    9·1 answer
  • _____ involves storing data and running applications outside the company’s firewall. answer grid computing parallel computing cl
    11·1 answer
  • Does the following code return a string or a number def of() return 3
    12·1 answer
  • . In the select algorithm that finds the median we divide the input elements into groups of 5. Will the algorithm work in linear
    6·1 answer
  • What construction work is the tender for​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!