1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
4 years ago
11

create a 3 to 5 step plan for checking out a post on social media for the next time you encounter something questionable.

Computers and Technology
2 answers:
SashulF [63]4 years ago
6 0
1. Report post
2. Block or unfollow user
3. Tell parent
elena-s [515]4 years ago
5 0

Answer:

Report. Block. Tell mommy or dada

Explanation:

You might be interested in
Peyton is having trouble searching for information on butter lettuce. Every time he searches for it, he gets some results for bu
Svetllana [295]

Explanation:

don't search butter lettuce it's a veggie so you say butter lettuce vegetable

7 0
3 years ago
Read 2 more answers
1. What are the biggest password mistakes that people and companies make? How can you avoid those mistakes?
Ghella [55]

Answer:

1. Keeping a password with user name or password is very easy word.

2. Passwords should be kept strong so that it cannot be haccked. One should use upper case letters along with lower case letters and numeric and special characters to make the password strong.

3. The businesses usually run anti viruses in case of virus attack. In case of haccker attack businesses are temporarily shut down from their routine work and alternate business plan is activated which runs the business activities incognito version.

4. High profile passwords can be leaked as it is on the computer system which can be accessed from around the world.  

Explanation:

The businesses should use DRP system in order to avoid complete shut down of business operations in case of a cyber attack. The passwords should be kept strong enough so that no one can crack the password and all employees should not be given complete access to business operations and planning activities. Employees access should be restricted to their job role.

5 0
3 years ago
One of your primary business objectives is being able to trust the data stored in your application. You want to log all changes
lord [1]

Answer:

C

Explanation:

Based on the information provided within the question it can be said that the best way to accomplish this would be to digitally sign each timestamp and log entry and store the signature. This is because each timestamp and log entry would be ran through a verification algorithm which would then be stamped with your digital signature that requires your private keys, thus preventing forgery.

4 0
3 years ago
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
!!!!!HELP!!!!! (30PTS)
Inessa [10]

Answer:

B. KN

C. PP Online

Explanation:

KN is A's own software for creating slideshow presentations. However, since most people using KN are coming from using MS PP, there is the option to open PPs in KN (albeit with some fonts missing).

You can also view the file from PP Online. Just create a MS account (if you don't already have one), download the email attachment and upload it to your cloud, and you should be able to view it there.

5 0
3 years ago
Other questions:
  • When should students practice netiquette in an online course? Check all that apply.
    14·2 answers
  • Explain about RDBMS. Include advantages/ disadvantages. Compare DBMS vs RDBMS. Explain about Oracle as well.
    14·2 answers
  • Productivity can best be described as:
    5·2 answers
  • You are most likely to automatically encode information about
    11·1 answer
  • Rick works for the government and is investigating a small business that the government suspects has been cheating on its taxes.
    15·1 answer
  • Organizational Units are typically configured to: prevent companies from sharing resources. ensure that the system password is t
    13·1 answer
  • What would be used by a business to assess how the business is working within its organization goals? O A. Information systems B
    8·1 answer
  • Write fade in shorthand​
    11·1 answer
  • "kannst du mir bitte helfen" in German-English from Reverso Context: Hier, kannst du mir bitte helfen?
    7·1 answer
  • Please help!
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!