1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenKa [72]
3 years ago
13

Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase on an online store that u

ses public key encryption to transmit information B. Paying a bill using a secure online electronic payment system C. Purchasing a couch by emailing a credit card number to the couch owner D.Checking a bank account on a bank’s website that uses HTTPS for secure communication
Computers and Technology
1 answer:
Lorico [155]3 years ago
7 0

Answer:

C

Explanation:

por

You might be interested in
Challenge activity 1.11.1: using constant in expression is not working for me. Can any one help me find the right code?
cestrela7 [59]

Answer:

could you please tell me which grde are you in?

8 0
3 years ago
Helping people keep track on things is the purpose of_____ A database B table C query D form​
Kitty [74]

Answer:

A) database

Explanation:

A database is used by people to help keep track on things

8 0
4 years ago
What is the term used to describe the basic unit of data passed from one computer to another
irinina [24]

Answer:

The term used to passed one computer to another is called a packet

8 0
3 years ago
Data owners ensure that only the access that is needed to perform day-to-day operations is granted and that duties are separated
Akimi4 [234]

Answer:

True

Explanation:

As employees might be accessing business/client data, security of data access is a topmost priority.

8 0
3 years ago
HELPPPP!!!!! WILL MARK AS BRAINLIEST
jeka94

Answer: check the internet connection

Explanation:

4 0
3 years ago
Other questions:
  • What Event is called when an Object collides with an non-trigger collider?
    13·1 answer
  • A _____________ is a method of controlled entry into a facility and provides access to secure areas such as a research lab or da
    10·1 answer
  • Which is most harmful computer virus define​
    15·1 answer
  • What is the relationship between a method and a function
    11·2 answers
  • Which online resource is usually not free?
    10·2 answers
  • Assume that passwords are selected from four-character combinations of 26 alphabeticcharacters. Assume that an adversary is able
    11·1 answer
  • The Self-Quiz gives you an opportunity to self-assess your knowledge of what you have learned so far.
    13·1 answer
  • What is the main function of the output on a computer or what is it use for? ​
    15·2 answers
  • Dynamics
    11·1 answer
  • Write l for law of enrtia,ll for law of Acceleration and lll for law of enteraction.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!