1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenKa [72]
3 years ago
13

Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase on an online store that u

ses public key encryption to transmit information B. Paying a bill using a secure online electronic payment system C. Purchasing a couch by emailing a credit card number to the couch owner D.Checking a bank account on a bank’s website that uses HTTPS for secure communication
Computers and Technology
1 answer:
Lorico [155]3 years ago
7 0

Answer:

C

Explanation:

por

You might be interested in
_____ interviews rely on scenarios and reflections to evaluate an applicant’s skill set.
ra1l [238]
I think its behavioral
4 0
3 years ago
Read 2 more answers
Who are the founders of video-sharing site Dailymotion?
Pavlova-9 [17]

In March 2005, Benjamin Bejbaum and Olivier Poitrey founded the Dailymotion website from the living room of Poitrey's apartment in Paris. Six individuals pooled together €6,000 ($9,271 USD) to start the business. In September 2006, Dailymotion raised funds in collaboration with Atlas Ventures and Partech International. They raised 7 million euros which was considered to be the most funds raised in 2006 from the French Web 2.0. In October 2009, the French government invested in Dailymotion through the Strategic Investment Fund. On 25 January 2011, Orange acquired a 49% stake in Dailymotion for €62 million, valuing the company at €120 million.[6]


4 0
2 years ago
What are the pros and cons of using ICT
qaws [65]

Answer:

Pros:

- Connect with friends, family in a short period of connecting time

- Faster, easier than paper

- The messages can be stored in the device for longer times, without being damaged, unlike paper files that easily get damages

- Digital communication can be done over large distances through internet and other things.

And many other pros

Cons:

- Software can be easily hacked

- Digital Communication has completelymake people become far to others. They would stop meeting face-to-face but instead of that, video call, chatting is become more popular

- Most of devices have hidden recording mechanisms that can take your information unknowingly and may be used to attack you in the future

And many other cons

Hope this helped :3

5 0
3 years ago
You have installed a point-to-point connection using wireless bridges and Omni directional antennas between two buildings. The t
kozerog [31]

Answer and Explanation:

Omnidirectional antenna are those antennas which receives the signals from multiple directions equally.These are the antennas that cannot  get the signal from a particular direction thus gives the low throughput.

To get high throughput, directional antennas should be installed because they receive the signal from a particular direction only .Thus the signal received from these antenna work for a certain area.Example-Television antenna at homes are directional antennas names as Yagi-uda antennas.

3 0
3 years ago
IN C++
Natali [406]

Answer:

I only do Design and Technology

sorry don't understand.

4 0
3 years ago
Other questions:
  • Henry uploaded the photos of his birthday to a cloud storage system. He feels that it’s a safe option for data storage. His frie
    12·1 answer
  • If you purchase a software suite for personal use, you can install the software how many times on how many different machines?
    6·1 answer
  • >
    6·1 answer
  • Plz tell me a storage device that should be used for this and why
    11·1 answer
  • What is the role of the federal government in regulating the media and the internet?
    6·2 answers
  • In rolling a die four times, what is the odds that at least one 5 would appear?
    6·1 answer
  • Write a Java program that generates a new string by concatenating the reversed substrings of even indexes and odd indexes separa
    5·1 answer
  • Viết thuật toán, chương trình xử lý hạn chế trong việc xử lý số liệu phần nguyên để hiển thị lên lcd
    14·1 answer
  • What is the long tube on a microscope called​
    15·1 answer
  • In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!