1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrrafil [7]
3 years ago
5

What concerns do you need to have with individuals hacking your information, computer, personal devices, and car? How can you pr

otect these?
Computers and Technology
1 answer:
jeka57 [31]3 years ago
3 0

Explanation:

When you break into your computer, when you kept them at your home, you can use all private data and passwords. These data provide them with an opportunity to burden you with doing things you don't want to do. Within one day you can go bankrupt.

Following are the precautions to be taken:

  • Regular update of software-helps to patch the last vulnerabilities.
  • Keep the password of your computer secure and never share it with anybody who may be excluding your kids.
  • Doesn’t jail break your computer or root it. Although this can improve the device's efficiency, it is a profuse basis for hackers that do not use other built-in defenses. This is something people often do.
  • Use trusted sites to download the software.
You might be interested in
The processing of data in a computer involves the interplay between its various hardware components.
Ronch [10]

True.

Data processing involves the conversion of raw data and the flow of data through the Central Processing Unit and Memory to output devices. Each CPU in a computer contains two primary elements: the Arithmetic Logic Unit (ALU) and the control unit. The Arithmetic Logic Unit performs complex mathematical calculations and logical comparisons. On the other hand, the control unit accesses computer instructions, decodes them, and controls the flow of data in and out of the Memory, ALU, primary and secondary storage, and various other output devices.  


8 0
3 years ago
Jasmine is a commercial artist her is is the one most often used by graphic designers publishers and others in her field the os
VikaD [51]
OS is for mac so she used the mac computer
7 0
3 years ago
4. How can a document's organization help us better understand the document's purpose?​
Ad libitum [116K]

Answer:

a document organization can help because it's organized and easy to read on a document.

6 0
2 years ago
Write structured pseudocode to show the following: when you are on time for work you have time to buy coffee
faltersainse [42]

Answer:

If( on_time == True) {

     print("Coffee")

} else {

    print("No Coffee")

}

Explanation:

Step 1 evaluate with a boolean variable if you are on time

If( on_time == True) {

Step 2 if true you have coffee

print("Coffee")

Step 3 if false you have not coffee

print("No Coffee")

3 0
3 years ago
Question 1
PolarNik [594]

Answer:

she is running a maintenance to make sure everything works

6 0
3 years ago
Other questions:
  • To create a button that will allow a user to send the form data to the server you use a type of ____
    5·1 answer
  • When planning the structure of a spreadsheet, columns are for _______ items and rows are for _______ items.
    5·2 answers
  • A _______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and proc
    10·1 answer
  • Saas provides services to an organization that requires the standard business process infrastructure such a CRM
    7·1 answer
  • Assume that there is a class called BankAccountHolder that represents an individual member of a bank. There is also a BankAccoun
    5·2 answers
  • Is there any difference beetween the old version of spyro released on the origional and the newer ones??? or is it only change i
    8·1 answer
  • Which of the following is a property of TCP?
    8·1 answer
  • Match each of the following terms to its definition: I. web-based II. open source III. project management IV. personal informati
    12·1 answer
  • How do you stop getting emails from brainly saying "sarah from brainly has answered your question"
    10·1 answer
  • I am a non-volatile type of built-in memory. I store my contents long-term. My job is to store critical programs that the comput
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!