1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrrafil [7]
3 years ago
5

What concerns do you need to have with individuals hacking your information, computer, personal devices, and car? How can you pr

otect these?
Computers and Technology
1 answer:
jeka57 [31]3 years ago
3 0

Explanation:

When you break into your computer, when you kept them at your home, you can use all private data and passwords. These data provide them with an opportunity to burden you with doing things you don't want to do. Within one day you can go bankrupt.

Following are the precautions to be taken:

  • Regular update of software-helps to patch the last vulnerabilities.
  • Keep the password of your computer secure and never share it with anybody who may be excluding your kids.
  • Doesn’t jail break your computer or root it. Although this can improve the device's efficiency, it is a profuse basis for hackers that do not use other built-in defenses. This is something people often do.
  • Use trusted sites to download the software.
You might be interested in
When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second
PIT_PIT [208]

Answer: escalated

Explanation:

7 0
3 years ago
what will be the Trade discount and Invoice Amount if the List Price is $400.00 and the Trade Discount Rate is 85%
V125BC [204]

Answer:

$340

Explanation:

you have to multiply $400 bu 85% to get $340

4 0
3 years ago
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
2 years ago
Which app or website teaches java and phyton
aev [14]

Microsoft is a website that teaches java and phyton

6 0
4 years ago
Write about storage<br>(should be in easy words)​
enyata [817]

Answer:

Answer to the following question is as follows;

Explanation:

The process of storing digital information in a data storage media using computing technology is known as storage. Storage is a technique that allows a computer to keep data indefinitely or intermittently. Computer storage capacity and electronic data management are other terms for storage.

6 0
3 years ago
Other questions:
  • ________ sets up a point-to-point connection between two computer systems over an Internet Protocol (IP) network. A. Point-to-Po
    15·1 answer
  • What is one problem you should keep in mind when researching information on the Internet?
    6·2 answers
  • Which of the following provides astronomical evidence for the age of the earth?
    11·1 answer
  • A company is utilizing servers, data storage, data backup, and software development platforms over an Internet connection.
    14·1 answer
  • Explain how software is distinct from hardware.
    8·2 answers
  • This program will output a right triangle based on user specified height triangleHeight and symbol triangleChar. (1) The given p
    14·1 answer
  • How has music changed with the use of technology?
    14·1 answer
  • Ew<br>subject: Computer<br>11101÷101<br> binary operations<br>​
    7·1 answer
  • Which feature allows you to copy attributes of
    11·1 answer
  • What is meant by the term text?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!