1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrrafil [7]
3 years ago
5

What concerns do you need to have with individuals hacking your information, computer, personal devices, and car? How can you pr

otect these?
Computers and Technology
1 answer:
jeka57 [31]3 years ago
3 0

Explanation:

When you break into your computer, when you kept them at your home, you can use all private data and passwords. These data provide them with an opportunity to burden you with doing things you don't want to do. Within one day you can go bankrupt.

Following are the precautions to be taken:

  • Regular update of software-helps to patch the last vulnerabilities.
  • Keep the password of your computer secure and never share it with anybody who may be excluding your kids.
  • Doesn’t jail break your computer or root it. Although this can improve the device's efficiency, it is a profuse basis for hackers that do not use other built-in defenses. This is something people often do.
  • Use trusted sites to download the software.
You might be interested in
A python keyword______.
Cerrena [4.2K]

Answer:

cannot be used outside of its intented purpose

Explanation: python keywords are special reserved words that have specific meanings and purposes and can't be used for anything but those specific purposes

8 0
3 years ago
Henry has to create software that manages a database of all his clients of his firm. He wishes to run software on another comput
soldi70 [24.7K]

Answer:

The answer is B.

Explanation:

8 0
3 years ago
Read 2 more answers
Mary needs to choose the menu in order to place the text in a desired fashion around the image.
n200080 [17]
Can you be more specific?

7 0
4 years ago
Read 2 more answers
Which of these is an example of an input?
boyakko [2]

Answer:

typing on a key board

this is the best Ans.

8 0
3 years ago
What are two distinctive types of unmanned aircraft systems
chubhunter [2.5K]
Probes and Drones
Hope this helps and please give brainliest!
8 0
3 years ago
Other questions:
  • A ___ block unauthorized access to a network or an individual computer
    8·1 answer
  • Periodically adding, changing and deleting file records is called file. A) Updating B) Upgrading C) Restructuring D) Renewing E)
    10·2 answers
  • A network monitor records the following information while recording a network connection.
    9·1 answer
  • Which online resource is usually not free?
    10·2 answers
  • When using correct ergonomic technique be sure to
    6·2 answers
  • If you are a member of a security penetration testing team, and you identify vulnerabilities and exploits, what should you obtai
    11·1 answer
  • To connect a peripheral device to a computer to exchange data, find the appropriate ________ for the device.
    7·1 answer
  • Several NEC® sections contain the requirement to size conductors and overcurrent devices at 100 percent of the noncontinuous loa
    15·1 answer
  • Im boing exam help please In a category-based course grading system, teachers weigh a student's performance in all courses. all
    7·2 answers
  • Example of language processor software
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!