1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenKa [72]
3 years ago
13

Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase on an online store that u

ses public key encryption to transmit information B. Paying a bill using a secure online electronic payment system C. Purchasing a couch by emailing a credit card number to the couch owner D.Checking a bank account on a bank’s website that uses HTTPS for secure communication
Computers and Technology
1 answer:
Lorico [155]3 years ago
7 0

Answer:

C

Explanation:

por

You might be interested in
a certain kind of fish in the ocean eats only algae. a seal eats this fish a bear eats the seal .when the bear dies,it’s recycle
STatiana [176]

Answer:seal

Explanation:

4 0
3 years ago
How to make classs constructer java.
ladessa [460]

Answer:

A constructor doesn't have a return type.

The name of the constructor must be the same as the name of the class.

Unlike methods, constructors are not considered to be members of a class.  

A constructor is called when a new instance of an object is created.

Explanation:

4 0
3 years ago
Comments should
suter [353]

Answer:

Correct answer is:

communicate the purpose of the code that follows it.

Explanation:

Let have a look at each option

comment should give the reader the background of the programmer.

Comments are unable to do so.

Be written on every line

No, it is not need as comment are useful only to explain difficult or complex part of code.

communicate the purpose of the code that follows it.

yes, this option is true, as comments will give hints to programmer about the piece of code.

give information about how many hours it took to write the code

No, comments can answer it,

3 0
3 years ago
Read 2 more answers
Hardware failure, power outages, and DOS attacks will affect:
const2013 [10]

Answer:

The answer should be data availability

6 0
3 years ago
A graphic on-screen image representing an object or an idea is called a(n) A. menu. B. image. C. graphic. D. icon.
kap26 [50]
It's called D. icon
We often see these icons on our desktop page as soon as we logged on to our personal computer.
The icon on the destkop will acted as a short-cut that will opened up and connected us with the program simply by clicking the icon.
8 0
4 years ago
Read 2 more answers
Other questions:
  • Are self driving cars essential for the future of transportation
    10·1 answer
  • Why is it a good idea to leave an interview being courteous and polite?
    10·1 answer
  • You are the owner of a computer component manufacturing company. Your manufacturing plant has 10 different machines that can be
    6·1 answer
  • How many Iron molecules are in the compound Fe4O2?
    15·2 answers
  • Can Algorithms Be Used Again?
    8·1 answer
  • Which of the following guidelines about the subject line of e-mail messages is most appropriate?
    15·2 answers
  • How many times do you return after the dateline ?
    12·1 answer
  • You are purchasing a new printer. Which of the following is the most important requirement?
    5·1 answer
  • To find information on a network use a ____
    14·1 answer
  • you have been using snmp on your network for monitoring and management. you are concerned about the security of this configurati
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!