1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
3 years ago
14

Ronald attended a seminar about the best practices to use when browsing the Internet. The presenter used the following statement

in his discussion. However, Ronald missed a couple of words. Help him find them.
“When using a public computer for browsing the Internet, try to use [one-time password, single sign on, multiple accounts, different computers, or repeated sign-ins] for transactions. Also, use [public, open, secure, restricted, or shared] browsing whenever you can.”
Computers and Technology
2 answers:
Salsk061 [2.6K]3 years ago
8 0

Answer:

Ronald missed the words: One-time password, Secure  

Explanation:

Whenever we use public computer, there are possibilities to steal the user data by hackers. It might not be safe to use as like we have protection in personal or Office computers. But when a situation arises to use a public system, it is always recommended to use one-time password so that the logins are not misused thereafter.

Even if the hackers try to misuse, the user will get a message / authentication reply to use the login and thus we are safe. Also, always browse only secured website ie. “https”.

Leona [35]3 years ago
7 0

Answer:

When using a public computer for browsing the Internet, try to use ONE-TIME PASSWORD for transactions. Also, use SECURE browsing whenever you can.

Explanation:

You might be interested in
window operating system popularly known as. 1) character user interface. 2) computer user interface. 3) graphic user interface.
fredd [130]

Answer:

The window operating system is popularly known as a graphical user interface(GUI)

Explanation:

older operating systems were command line based but window uses a gui

5 0
3 years ago
8. What is the order of growth execution time of the push operation when using the LinkedStack class, assuming a stack size of N
velikii [3]

The order of growth execution time of the push operation when using the LinkedStack class, assuming a stack size of N is; O(1)

<h3>Understanding Computer Programming Language</h3>

Let Top be the position of last element inserted in Array.

For Push operation, the process is as follows;

if(Top == last index of Array) {

Printf(“Stack Overflow”)

} else {

Top = Top + 1

a[Top] = element you want to insert

}

Read more about Computer Programming at; brainly.com/question/22654163

8 0
2 years ago
Determine which careers you can enter after completing a training program and which careers require a college degree.
KonstantinChe [14]

Answer: statistician automotive engineer customer service specialist data modeler broadcast technician video systems technician

Explanation:

8 0
2 years ago
When you tell an acquaintance your telephone number, you do not recite the digits one by one at a constant rate, as in "3, 3, 7,
yKpoI14uk [10]

Answer:

chunking and short-term is the correct answer of this question.

Explanation:

chunking is a strategy to enhance a short-term memory.

Chunking is an method used to separate larger numbers that can not be psychologically separated.Chunking is the grouping of words in one sentence into short, important phrases. A chunk is the material segment that is used in many graphical formats, such as PNG etc.

Short-term memory is the knowledge a person is considering or is conscious of. This is also called healthy or main memory.

3 0
3 years ago
How are special characters added to a Word document? Check all that apply.
MrRissso [65]

It kinda depends on what you mean by special characters

7 0
3 years ago
Read 2 more answers
Other questions:
  • A musical compact disc is an example of
    13·1 answer
  • What is the best way to protect computer equipment from damage caused by electrical spikes
    15·1 answer
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • 1. A database table can hold ??
    9·1 answer
  • The market is in <br> until the price of goods reflects equal supply and demand.
    10·1 answer
  • Can you please help me with the AP Computer Science Fill in the blank. What goes on number 5 8 and 18. I don’t understand this I
    8·1 answer
  • Which of the following describes the line spacing feature? Select all that apply. adds space between words adds space between li
    8·1 answer
  • Is anyone else having issues with brainly not working? Everytime I click on a answer it only comes up with the 7 month trail thi
    12·1 answer
  • What is the vibrating or buzzing of a hand controller known as?.
    7·1 answer
  • What is a simple definition for electricity?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!