1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
2 years ago
15

What are 3 of the most important things about internet safety that you would recommend and why

Computers and Technology
1 answer:
jeyben [28]2 years ago
4 0

Answer:

1. Protect Your Personal Information With Strong Passwords

2. Pay Attention to Software Updates

3. Make Sure Your Devices Are Secure

Explanation:

Protect Your Personal Information With Strong Passwords because you don't want anyone getting a hold of your personal information.

Pay Attention to Software Updates because you want to make sure that they aren't fake and what is being updated. So that you don't get a virus and your information is stolen.

Make Sure Your Devices Are Secure because you don't want anyone tricking you into getting your information.

You might be interested in
Which data validation alert style should you use to prevent the user from entering invalid data?
mario62 [17]

Answer:

stop

Explanation:

If you set the error alert style to Stop, then you are asking Excel to prevent the user from typing in an invalid value.

5 0
2 years ago
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
By the mid-1990s, how did revenue generated from video games compare to revenue generated from movies?
Vlad [161]

By the mid-1990s, the revenue generated from video games was two and a half times the revenue generated from movies.

Research shows that in 1994, the revenue generated from arcades in the United States was about $7 billion quarterly while the revenue generated from home console sales was about $6 billion dollars.

When combined, this revenue from games was two and a half times the amount generated from movies.

Learn more about video games here:

brainly.com/question/8870121

4 0
2 years ago
Once you have saved a block of text for easy insertion in other documents, it will show up where?
kherson [118]
Click file and look up the name
7 0
3 years ago
This is the question
nikdorinn [45]

Answer:

I dont know it sorry

Explanation:

i would help u

4 0
3 years ago
Other questions:
  • Identify the computer cycle in each of the descriptions below by choosing the answer from the
    12·1 answer
  • Explain briefly the purpose of the Computer Management Console in Microsoft Windows.
    12·1 answer
  • Oxnard Casualty wants to ensure that their e-mail server has 99.98 percent reliability. They will use several independent server
    14·1 answer
  • What is the term for the instructions that tell a computer what to do
    7·1 answer
  • As an experienced networking professional, you are asked to conduct a posture assessment on a local credit union’s network. The
    12·1 answer
  • Photography is harder with digital cameras than with film cameras.<br>true<br>false
    6·2 answers
  • How can a student manage time and stress for better results in school? Check all that apply. by taking breaks while studying by
    8·2 answers
  • Complete the body of the decrement static method using only the NaturalNumberKernel methods (multiplyBy10, divideBy10, and isZer
    10·1 answer
  • At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this
    10·1 answer
  • What is a layer, in the context of this lesson?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!