1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilia_Sergeevich [38]
3 years ago
8

You live "out in the middle of nowhere" and feel there is no need to protect your internet connection because there is no one th

at lives near you. one day you are unable to connect to the internet. after calling tech support you find that someone has hacked into your router and has changed all the settings. fortunately the hacker only wanted to use your internet connection and did not view any information on your computer. your decision to leave your router unprotected risked the integrity of the information on your computer. select yes or no.
Computers and Technology
1 answer:
dlinn [17]3 years ago
4 0
Yes, it put you at risk, and could have actually gotten you killed.
You might be interested in
Yo who do u add a pic on here
Juliette [100K]
Go to the me colum when you first open the app
8 0
3 years ago
Does anyone know who this man issss?
devlian [24]

Kaeya Should be the correct answer

3 0
3 years ago
7.4.4: Length of User's Name
Natalija [7]

Answer:

user_name = input("input user name: ")
print(len(user_name))

Explanation:

input - input function in python

len - length of value

print - print data

6 0
2 years ago
Type the correct answer in the box. Spell all words correctly.
KonstantinChe [14]

Answer:

Aspiring illustrators can hone their talent and skills using Adobe Illustrator software.

Explanation:

  • By using this software we enroll graphics for out Television.Computer etc ..
5 0
3 years ago
Jameelah has files all over her computer. Thus, it is often difficult for her to find the files she is looking for.
VLD [36.1K]

Answer:

folders

Explanation:

it is a very good way to keep your desktop organized and keep tidy

3 0
3 years ago
Other questions:
  • Which is a function of network media?
    11·2 answers
  • A class defined by a user (i.e., you, the programmer programmer) ... Group of answer choices might contain no data members -- on
    13·1 answer
  • All of the following are examples of being computer literate, EXCEPT ________. knowing how to use the web efficiently knowing ho
    9·1 answer
  • The clear emergence of a leader and the development of group norms and cohesiveness are the key indicators of the ________ stage
    6·1 answer
  • Can I use some Company's name in my Research Project. For example, my research is based on E-commerce security and i wanna use A
    14·1 answer
  • A system administrator is selecting an operating system for use by the company’s research and development team. The team require
    15·1 answer
  • What is the output of the following program?
    5·1 answer
  • The National Institute of Standards and Technology (NIST) guidelines list four different states a mobile device can be in when y
    7·1 answer
  • Why is computer called information processing maching???​
    6·2 answers
  • The use of desktop computer equipment and software to create high-quality documents such as newsletters, business cards, letterh
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!