1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrrafil [7]
3 years ago
5

What concerns do you need to have with individuals hacking your information, computer, personal devices, and car? How can you pr

otect these?
Computers and Technology
1 answer:
jeka57 [31]3 years ago
3 0

Explanation:

When you break into your computer, when you kept them at your home, you can use all private data and passwords. These data provide them with an opportunity to burden you with doing things you don't want to do. Within one day you can go bankrupt.

Following are the precautions to be taken:

  • Regular update of software-helps to patch the last vulnerabilities.
  • Keep the password of your computer secure and never share it with anybody who may be excluding your kids.
  • Doesn’t jail break your computer or root it. Although this can improve the device's efficiency, it is a profuse basis for hackers that do not use other built-in defenses. This is something people often do.
  • Use trusted sites to download the software.
You might be interested in
What three processor technologies are required to install windows 8?
VashaNatasha [74]
The three processor technologies that are required to be able to install windoes 8 are NX, PAE  and SSE2. PAE stands for physical address extension, NX would NoeXecute and SSE2 means Streaming SIMD Extentions 2. The PAE is the one that enables 32bit processors to be able to access 4 GB and above of memory. NX would help guard the computer from malwares. Lastly, SSE2 is a set of instructions that is used by third party drivers and apps.
5 0
4 years ago
The “logical link control” and “media access control” are sublayers of which layer?
yKpoI14uk [10]
I believe it’s C.) data link layer
8 0
3 years ago
Read 2 more answers
Full virtualization is ideal for ___________. Migration capacity Computer system sharing,isolate users Disaster recovery Data re
Usimov [2.4K]

Answer:

Computer system sharing, isolate users

Explanation:

Full virtualization is ideal for "Computer system sharing, isolate users." This is evident in the fact that Full virtualization is a technique in which data are shared between operating systems and their hosted software. This strategy is then carried out from the top of the virtual hardware.

Also, the full virtualization strategy in computer service requests is distinguished from the physical hardware that enables them.

Hence, in this case, the correct answer is "Computer system sharing, isolate users."

3 0
3 years ago
The operating system’s application programming interface (API) provides software developers with tools they use to build applica
lubasha [3.4K]

Answer:

True

Explanation:

Application Programming Interface (API) is a set of commands, functions, protocols, and objects that programmers can use to create software or interact with an external system. It provides developers with standard commands for performing common operations so they do not have to write the code from scratch.

Operating system APIs are typically integrated into the software development kit for the corresponding program. For example, Apple's Xcode IDE allows developers to drag and drop elements into an application's interface. It also provides a list of available functions and includes syntax highlighting for known elements and commands.   Operating system APIs have a robust set of features.

3 0
3 years ago
In a __________ attack, data that can modify how applications or services operate is downloaded (stored) onto the targeted serve
katovenus [111]

Answer:

The answer is "Cross-Site Coding Persistent"

Explanation:

This coding is also known as an XSS, it is a threat, that converts the files into harmless pages by injecting malware.  

  • This type of scripting is used by the hacker, that passes malware to a different final consumer with a web app, which is typically used by the client end-script.
  • It is very dangerous because the information can be transmitted to a specific repository, which may change by apps and services work.
6 0
3 years ago
Other questions:
  • Janice has a "jammed" key on her keyboard. Every time she strikes the "S" key it sticks and doesn't pop back. What should Janice
    6·2 answers
  • When an instance of a class, or object, is specified as a parameter to a method, a reference to the said object is passed to the
    15·1 answer
  • T<br> F<br> 5.<br> You can save presentations in PDF and XPS formats.
    14·1 answer
  • Although you can use a dialog box to indent paragraphs, word provides a quicker way through the ____.
    7·1 answer
  • Entering the formula =sum(c5:c18) in cell c19 will result in which of the following?
    10·1 answer
  • ‘The increased availability of mobile digital devices has had a positive impact on how young people use their free time’. Make a
    8·1 answer
  • 1. For which of the following are you not required to signal beforehand?
    10·1 answer
  • If your organization hires a new employee, what would you do to create a user account in the Linux system and add the account to
    11·1 answer
  • What is a network computer that processes requests from a client server​
    11·1 answer
  • 30 POINTS FOR THE CORRECT ANSWERS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!