1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
konstantin123 [22]
3 years ago
5

Which of the following is good practice to ensure that you do not get malware on your computer from an online source?

Computers and Technology
1 answer:
Lina20 [59]3 years ago
5 0

Answer:

go to a authorised site which is secure

Explanation:

You might be interested in
When you are given a set of tables and asked to create a database to store their data, the first step is to ________?
Vlad1618 [11]
Scan   the tables  to make a digital copy of them
6 0
3 years ago
Which option correctly identifies if the researcher’s approach was the best start in the following scenario and explains why?
dem82 [27]

Answer:

The first one

Explanation:

The other ones don’t make sense

4 0
3 years ago
Read 2 more answers
Your ___________ is what you can see without the presence of an obstruction.
SCORPION-xisa [38]

Answer:

Line of sight

Explanation:

Your line of sight is the noticeable path of travel from your vehicle to your destination area. This line can be obstructed by a curve, a hill, high-forest wooded zones, large trucks, or other obstruction that prevents drivers from seeing the vehicle ahead. Therefore, if you cannot see around an obstruction, you should slow down and be willing to adjust your position until you can reestablish a clear line of sight to your path of travel and targeting area.

8 0
3 years ago
When purchasing a security program, you must make sure that _____. Select 2 options.
Oliga [24]

Answer:

1 ans 3

Explanation:

3 0
2 years ago
Which of the following is considered the necessary research done before launching a scan?
wolverine [178]

Answer:

A. Network Reconnaissance.

Explanation:

Network Reconnaissance is a process of testing for vulnerability in a network. It could be a legitimate testing by a network operator to protect the network, setting acceptable user policies or a attacker finding a way to the network. In this process, intrusion detection mostly gives alarm on every reconnaissance activities.

To launch a scan in a network, an operator must have in mind to either carry out a reconnaissance activity or scan for network Reconnaissance attacks.

6 0
3 years ago
Other questions:
  • What runs a network, steering information between computers and managing security and users?
    11·1 answer
  • A public Wi-Fi risk that can be minimized by only visiting
    5·1 answer
  • PLEASE PLEASE PLEASE HELP!! WILL GIVE A BRAINLIEST IF UR RIGHT!!
    14·1 answer
  • 5. Pins on Pinterest can be linked to
    8·1 answer
  • When someone refers to "space" on a computer or device, they are usually referring to _____, which allows the user to save a fil
    10·1 answer
  • What is an audit trail?
    7·2 answers
  • Write a program that will print out statistics for eight coin tosses. The user will input either an "h" for heads or a "t" for t
    14·1 answer
  • Which of the following would an interactive media professional most likely need? A.a high school diploma
    15·1 answer
  • Which of the following tasks can you perform using a word processor?
    8·1 answer
  • Pls awnser if awnser is wrong I will unmark brainliest
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!