1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lukranit [14]
2 years ago
15

What's good computing?

Computers and Technology
1 answer:
cestrela7 [59]2 years ago
7 0

Answer:

1.Use passwords that can't be easily guessed, and protect your passwords.

2.Minimize storage of sensitive information.

3.Beware of scams.

4.Protect information when using the Internet and email.

5.Make sure your computer is protected with anti-virus and all necessary 6.security "patches" and updates.

7.Secure laptop computers and mobile devices at all times: Lock them up or carry them with you.

8.Shut down, lock, log off, or put your computer and other devices to sleep before leaving them unattended, and make sure they require a secure password to start up or wake-up.

9.Don't install or download unknown or unsolicited programs/apps.

Secure your area before leaving it unattended.

10.Make backup copies of files or data you are not willing to lose.

Explanation:

You might be interested in
What is a data broker?
AleksAgata [21]

Answer:

The correct option is a.

A business that collects personal information about consumers and sells that information to other organizations.

Explanation:

Data brokers, also known as data suppliers, data fetchers, information brokers, or even data providers are businesses or companies (even individuals) that, on the most basic level, source and aggregate data and information (mostly information that are meant to be confidential or that are in the real sense difficult to get) and then resell them to third parties. These third parties could be other data brokers.  

They collect data and information from a wide range of resources and sources - offline and/or online e.g web access history, bank details, credit card information, official records (such as birth and marriage certificates, driver's licenses).  

Brokers can steal round about any information. Examples of information that brokers legally or illegally steal are full name, residential address, marital status, age, gender, national identification number, bank verification number. Brokers and hackers are siblings.

A couple types of data brokers are:

1. Those for fraud detection

2. Those for risk mitigation  

Hope this helps!

6 0
3 years ago
You are setting up your Windows computer to connect to the Internet and notice that when you type www.microsoft, the browser doe
Harrizon [31]

Answer:

Check your DNS settings

Explanation:

Different errors may occur when setting up your computer to connect to the internet, one of which is described in the question above.

The DNS (Domain Name System) is responsible for redirecting domain names to their physical IP address. Instead of remembering every IP address of sites you visit frequently, domain names are used for easy remembrance, the DNS makes the matching of domain names to IP addresses possible.

To change your DNS setting follow these steps:

  1. Click settings from your start menu
  2. Click on Network and Internet
  3. Look to the bottom of the main page and click on "Network and Sharing Center"
  4. On the left tab, click "Change adapter settings"
  5. Right Click on the current network you are using and select properties
  6. Left-click on the "Internet Protocol Version 4 (TCP/IPv4) and click on properties.
  7. Check to see if "Obtain DNS server address automatically" is selected, if it is selected,
  8. Click on the radio button under it "Use the following DNS server address"
  9. Enter the DNS address you want to use
  10. Click Ok and close the window.

The problem should be resolved.

4 0
3 years ago
Proponents of Internet freedom see its _____________ as providing protection for unpopular expression; proponents of greater Int
NeTakaya

Answer: The answer is anonymity

Explanation: i had the same question on my test.

8 0
3 years ago
What is the first step for creating a Pivot Table?
vlabodo [156]
To organize your data in a list of rows and coloums. (Table, Graph)
8 0
1 year ago
You defined a book data type.
tensa zangetsu [6.8K]

Answer:

myBook = book()

Explanation:

Correct answer edge 2020

4 0
3 years ago
Other questions:
  • Create a program that reads words.txt (link near top of our home page) in order to: determine the length of the longest word(s)
    14·1 answer
  • There are several vehicles in a parking lot. Some of them are motorcycles
    8·2 answers
  • While inspecting an element in the DOM on my website using the Chrome Devtools I accidentally deleted the DIV that had all my au
    8·1 answer
  • Write java code that displays all the objects in a stack in the order in which they were pushed onto it. after all the objects a
    5·1 answer
  • Each device attached to your computer comes with a special program called a(n ________ that enables the device and operating sys
    15·1 answer
  • What are the three primary separation of concerns on the client-side of a dynamic web application? (Check all that apply)
    13·1 answer
  • What is LINUX?
    6·2 answers
  • Can I get the code for the Edhesive Assignment 3 Chatbox in python? Thanks.
    15·1 answer
  • Tabs are usually set ________ to the right of the left margin.
    10·2 answers
  • True or false? To help improve SEO, your URL should match the title of your blog post, word for word.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!