1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
konstantin123 [22]
3 years ago
5

Which of the following is good practice to ensure that you do not get malware on your computer from an online source?

Computers and Technology
1 answer:
Lina20 [59]3 years ago
5 0

Answer:

go to a authorised site which is secure

Explanation:

You might be interested in
What protocol suite below is the most commonly used protocol for local area network (lan) communication?
grandymaker [24]
Answer TCP/IP is the most common protocol in Local Area Networks.
3 0
3 years ago
Which type of firewall policy calls for a firewall to deny all traffic by default?
charle [14.2K]
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules. 
3 0
3 years ago
The code snippet below checks whether a given number is a prime number. What will be the result of executing it? public static v
Rus_ich [418]

Answer:

B)

Explanation:

The Code Snippet is correct and gives the expected result.

Prime numbers are numbers with only two divisors (1 and themselves)

Below are the list of prime numbers from 1-100

2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73, 79, 83, 89, 97

Testing each of the following numbers in the compiled code snippet gives the expected output.

7 0
2 years ago
How are authentication and authorization alike and how are they different? what is the relationship, if any, between the two\?
Helen [10]
  Both authentication and authorization are terms used in information security and <span>intelligently controlling access to </span>computer<span> resources. </span><span>Authentication is the process where by an individual’s (user's) identity is confirmed, whereas authorization is the association of that identity with rights/</span>privileges and permissions to resources related to information security.

3 0
3 years ago
Read 2 more answers
What method parses its string argument to determine whether the string can be converted to a number?
den301095 [7]
The correct answer is: Tryparse method
6 0
3 years ago
Other questions:
  • Show how to define a view tot_credits (year, num_credits), giving the total number of credits taken by students in each year
    8·1 answer
  • Which of the four basic functions of a computer refers to the collection of data by a computer?
    11·2 answers
  • Someone help ASAP! Match the type of information system with its description.
    13·2 answers
  • What is an accurate definition of a goal?
    15·2 answers
  • There is the Iphone MAX, Iphone XR and Iphone XS. which iphone is the very NEWEST and which one do you recommend? explain.
    5·2 answers
  • Lil fun question : burgers or pizza??
    6·2 answers
  • What makes software engineering an engineering discipline and what makes software engineering different from other engineering d
    15·1 answer
  • Which of the following class definition defines a legal abstract class Group of answer choices public class Rectangle abstract {
    15·1 answer
  • Two types of are desktop computers and notebook computer
    11·2 answers
  • Using range(1,101), make two list, one containing all even numbers and other containing all odd numbers. How can I do this on Py
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!