1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
3 years ago
14

Ronald attended a seminar about the best practices to use when browsing the Internet. The presenter used the following statement

in his discussion. However, Ronald missed a couple of words. Help him find them.
“When using a public computer for browsing the Internet, try to use [one-time password, single sign on, multiple accounts, different computers, or repeated sign-ins] for transactions. Also, use [public, open, secure, restricted, or shared] browsing whenever you can.”
Computers and Technology
2 answers:
Salsk061 [2.6K]3 years ago
8 0

Answer:

Ronald missed the words: One-time password, Secure  

Explanation:

Whenever we use public computer, there are possibilities to steal the user data by hackers. It might not be safe to use as like we have protection in personal or Office computers. But when a situation arises to use a public system, it is always recommended to use one-time password so that the logins are not misused thereafter.

Even if the hackers try to misuse, the user will get a message / authentication reply to use the login and thus we are safe. Also, always browse only secured website ie. “https”.

Leona [35]3 years ago
7 0

Answer:

When using a public computer for browsing the Internet, try to use ONE-TIME PASSWORD for transactions. Also, use SECURE browsing whenever you can.

Explanation:

You might be interested in
What should you do when an error message pops up on the screen?
Shtirlitz [24]
The best thing to do when an error message appears when it is not supposed to, as in if you are blocked by an administrator and it appears then its supposed to, it is best to contact someone who can investigate whether or not something is happening to your computer. That could be a parent, if they are good with computers, or just tech support at a store, provided they also know computers. Most of the time your computer just makes a mistake so nothing to worry about, but make sure to have it checked just to be sure. 
7 0
3 years ago
InJava garbage collection is done by_______________JVM (Java VirtualMachine)ProgrammerBoth JVM (Java Virtual Machine)and Program
lozanna [386]

Answer: Java Virtual Machine(JVM)

Explanation: In java,there is the process of the management of the memory by own self or automation , this is known as the garbage collection .The program in it compile to be executed by the java virtual machine(JVM).During this process , object get together in a sort of heap and then unnecessary object are detected which are of no use and delete them to make space for the memory  . Therefore, garbage collection is carried out by java virtual machine(JVM).

7 0
3 years ago
A line of text that has an equal number of characters on either side of the horizontal center of the page is called____. Questio
natta225 [31]
I thank it's a but I'm not sure
7 0
3 years ago
The trendline does not extend to cover all data points ranges in excel
melisa1 [442]

Answer:

ok cool

Explanation:

4 0
2 years ago
How does 802.11g differ from 802.11b and 802.11a?
Marina CMI [18]

Try this explanation:

802.11a - the 1st generation, frequency - 5 GHz, max. data speed is 54 Mbits/sec.

802.11b - the 2d generation, frequency - 2.4 GHz, max. data speed is 11 MBits/sec.

802.11n - the last generation, frequency are - 2.4 & 5 GHz, max. data speed is 150 MBits/sec. and 600 MBits/sec. Supports 802.11a and 802.11b standarts.

8 0
3 years ago
Other questions:
  • All of the following are parts of the word processing window except _____. \
    9·1 answer
  • Your assignment is to write an assembly language program which read a string and print it in uppercase. This program asks the us
    15·1 answer
  • What is data. Explain it in brief
    11·2 answers
  • Many companies use software to scan resumes and search for _____________.
    10·1 answer
  • We are continuously sending and receiving messages that may change midstream. This illustrates that____________.
    15·1 answer
  • What conversion factor should be used to convert from meters to Gigameters?
    7·1 answer
  • If you copy a drawing from the Internet and use it in a report, you might be violating the artist's
    8·1 answer
  • The words that follow a code number in the cpt manual are called the
    12·1 answer
  • Match the definition
    14·1 answer
  • Given the following class, Book, Write code for the following:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!