1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
2 years ago
7

Which type of data is most sensitive and should be protected from malware?

Computers and Technology
1 answer:
Dennis_Churaev [7]2 years ago
5 0
The correct answer is “C. The credit card number that you use to make an online purchase”
You might be interested in
I WILL GIVE THE CROWN IF CORRECT
alisha [4.7K]

Answer:

foundations

Explanation:

7 0
3 years ago
Read 2 more answers
Joe, a user, reports to the help desk that he can no longer access any documents on his PC. He states that he saw a window appea
posledela

Answer:

The answer is most likely B) Trojan.

Explanation:

8 0
3 years ago
Where do you place the title tag in HTML​
makkiz [27]

Answer:

The title tag is basically your saved document

Save as and poof

High Hopes^^

Barry-

5 0
3 years ago
The function below tries to create a list of integers by reading them from a file. The file is expected to have a single integer
Setler [38]

Answer:

Check the explanation

Explanation:

def get_list_of_integers_from_file(filename):

int_list=[]

for line in open(filename).readlines():

try:

int_list.append(int(line))

except:

continue

return int_list

print(get_list_of_integers_from_file('file.txt'))

 

File.txt:

Kindly check the output below.

4 0
3 years ago
Which number is the smallest? 4.4 ⋅ 10^-5, 3.99 ⋅ 10^-6, 2.6 ⋅ 10^3
tiny-mole [99]
3.99 • 10^3 is the smallest
8 0
3 years ago
Other questions:
  • The contents of an array of type ______ can be displayed with the cout operator (without specifying an element). - 1 point(s)
    14·1 answer
  • Which of these is one of the primary concerns for protecting your family when online?
    5·2 answers
  • A(n) __________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within anothe
    8·1 answer
  • Compare and contrast CD and DVD?
    10·2 answers
  • Ineeedd help please 35 points question
    5·1 answer
  • Cuántos tipos de grua existen en el mundo​
    7·1 answer
  • What happens in Word 2016 when the Home ribbon tab is clicked on?
    9·1 answer
  • Leroy wants to keep the bride and groom in a picture, but remove the rest of the family. Which photo-editing tool should Leroy u
    14·1 answer
  • Which is a connectionless protocol in the transport layer? What are the small chunks of data called?
    12·2 answers
  • Write an alogrithm to display the first ten even numbers​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!