1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
14

How can you best protect yourself when using social media?

Computers and Technology
2 answers:
Artemon [7]3 years ago
6 0

Answer:

d. review the privacy settings for any site you use.

Explanation:

Blababa [14]3 years ago
3 0
D. Because reviewing the privacy settings can help you set who can see what you post or say on the social media
You might be interested in
How to divert all calls & sms from other phone to my phone? is it possible?
gayaneshka [121]
<h2>Answer:</h2>

It is possible in case of calls. SMS cannot be diverted to other numbers.

<h2>Explanation:</h2>

Every mobile manufacturing company has its own settings features and every cellular network has its own codes yet the facility of call forwarding which is a phone feature that enables users to forward or redirect incoming calls to any alternate number, which may be either a land line or cellular number. This facility can be availed by going to the Setting menu, then call setting and looking for call forwarding option. Once you get to the call forwarding option, select the destination number where you can divert the calls received on your number. Unfortunately sms cannot be diverted.

4 0
4 years ago
Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast
qwelly [4]

Answer: Option (A) is correct

Explanation:

Evil twin is known as a fraudulent point of access in a Wi-Fi which tends to  appear to be honest and legitimate but is known as a set up to oversee on the wireless communications. Evil twin is referred to as the WLAN equal of a phishing scam.  This kind of attack is mostly used in order to steal passwords of an unsuspecting users, that is done either by by phishing or by monitoring the connection, this mostly involves developing a fake web site and thus luring people.

8 0
3 years ago
Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust serve
klio [65]

Answer:

The answer is "Option A and Option B"

Explanation:

This is a type of attack, which is mainly used to bring down a network or service by flooding large amounts of traffic. It is a high-rate server from legitimate sources, where an attacker or group of zombies is attempting to drain server resources by creating and disconnecting the TCP link, and wrong choices can be described as follows:

In option C, It can't initiate a single request because when the servers were overloaded with legitimate source links, the hacker may then set up and uninstall TCP links.

7 0
3 years ago
Why would a brokered CD pay more than a regular CD?
Lana71 [14]

Brokered CDs may have higher or lower rates than those purchased directly from bans and credit unions. The general consensus here is that higher rates are usually available for direct purchases.

3 0
3 years ago
If you want to have certain icons available regardless of what tab you're using, you should add them to the
anzhelika [568]
If you want to have certain icons available regardless of what tab your using, you should add them to the [Quick Access Toolbar].
Quick access toolbar is a way in which you can easily access the tool you want to use often.
3 0
3 years ago
Other questions:
  • When you close a file, what happens to the undo history list for that file?
    5·1 answer
  • Which of the following is an example of a wanted versus I need
    5·1 answer
  • Which game console was the first to use the blue ray side as a distribution medium ???
    15·2 answers
  • allows Internet telephony service providers to deliver telephony services and unified communications applications offering voice
    14·1 answer
  • What is the last usable host IP address on the 192.168.32.9/30 network?
    15·1 answer
  • 1.
    15·1 answer
  • To cope with the uncertainty about how their pages will be viewed, many web page designers opt to use _________ units, which are
    13·1 answer
  • If you want the input gear to spin in the same direction as the output gear you must use a _______ gear.
    13·1 answer
  • Write the pseudocode for this flowchart
    6·1 answer
  • While operating a vehicle on any highway of this state, it it illegal to physically hold or support a wireless device with any p
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!