1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
3 years ago
13

What are the problems with security when working on a Web Page?

Computers and Technology
2 answers:
arlik [135]3 years ago
8 0

Answer:

Hackers are sometimes able to exploit vulnerabilities in applications to insert malicious code.

Explanation:

vesna_86 [32]3 years ago
5 0

Answer:

Depending if you have a virus already on your computer then your security risk on opening a new web page may be high

If not the security risk would be low

but to sum it up It really depends what your default search engine is

rn i use DuckDuckGo and i posted a Screen shot (if ur using chrome this extension can be added) and google (not saying its bad) but it has a risk for you security.

I really hope this helps

High Hopes^^

Barry-

You might be interested in
Join my discord server! CODE IS (CebjBXN)​
11Alexandr11 [23.1K]

Answer:

sure

Explanation:

7 0
3 years ago
Read 2 more answers
HOW TO FREE UP RAM/MEMORY ON YOUR DEVICE?
Butoxors [25]

Well you can start by getting a app called CM Security Master....it frees junk files and stops viruses, etc.. If you want execive space get a SanDisk (SD) card with how ever much space you want.

7 0
3 years ago
Read 2 more answers
What kind of physical device is an evil twin access point? What does the evil twin do after initial association when the victim
Rufina [12.5K]

Answer:

A PC such as a notebook computer.The evil twin gets the encrypted frame from the affected host,A VPN  encrypts a  frame with its own VPN key.

Explanation:

The evil twin after initial association when the victim client will establish a secure wireless connection with the victim client. The connection uses a key client-EF for encryption such that when the host transmits an encrypted frame it is transmitted to the evil twin. A VPN is an encrypted virtual private network used to access networks that are not trusted. The client encrypts a frame with a VPN key (Key Client-Server) which it shares with the server. The frame is further encrypted by the key it shares with the evil twin (Victim Client-ET) The evil twin will then receive a double encrypted frame. However, it will only be able to decrypt the Victim Client-ET key but not the VPN key hence it will not be able to read the message sent through the frame.

7 0
3 years ago
Based on current and upcoming gaming technologies, what changes do you expect to see in the next generation of gaming consoles?
damaskus [11]
Better graphics getting 1080 p easily running on 240 frames and a higher storage so then you could have more games on the console
4 0
3 years ago
Do the police check your mobile device during police checks?
Marat540 [252]
it depends............

4 0
2 years ago
Read 2 more answers
Other questions:
  • What are some options available when using the Replace feature?
    13·1 answer
  • This stores a piece of data and gives it a specific name
    7·1 answer
  • The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?
    6·1 answer
  • All linear programming problems have all of the following properties EXCEPT
    9·2 answers
  • Cassie is worried about credential management on a network where users often have over six passwords to remember. She’s curren
    13·1 answer
  • Write a c++ program to calculate the approximate value of pi using this series. The program takes an input n that determines the
    13·1 answer
  • E-mail messages, instant messages (IMs), or text messages sent and/or received within an organization a. are not included on a r
    9·1 answer
  • This isn't really a question ,but a random fact about Fnaf William Aton
    7·2 answers
  • If a machine cycle is 2 nanoseconds , how many machine cycles occur each second?
    7·1 answer
  • How to use emojis on chromebook without on-screen keyboard
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!