1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenKa [72]
3 years ago
13

Which of the following activities poses the greatest personal cybersecurity risk? A. Making a purchase on an online store that u

ses public key encryption to transmit information B. Paying a bill using a secure online electronic payment system C. Purchasing a couch by emailing a credit card number to the couch owner D.Checking a bank account on a bank’s website that uses HTTPS for secure communication
Computers and Technology
1 answer:
Lorico [155]3 years ago
7 0

Answer:

C

Explanation:

por

You might be interested in
What is big data life cycle?​
Angelina_Jolie [31]

Explanation:

The data life cycle is the sequence of stages that a particular unit of data goes through from its initial generation or capture to its eventual archival and/or deletion at the end of its useful life. Although specifics vary, data management experts often identify six or more stages in the data life cycle.

PLEASE MARK ME AS BRAINLIST

3 0
1 year ago
A typeface, plus any special attributes applied to the text is called ________.
grandymaker [24]

Answer:

I would like to say font but not sure

3 0
2 years ago
Read 2 more answers
What naming scheme identifies the rows in a worksheet?
masha68 [24]
The naming scheme that identifies the rows in a worksheet is B. 1, 2, 3.
Rows are horizontal, and they are identified by numbers in an Excel worksheet. On the other hand, columns are vertical, and they are identified by letters in the same Excel worksheet. 
7 0
2 years ago
Read 2 more answers
Write a program that allow a customer to input the value of goods bought, The program should then decide the discount to give a
Thepotemich [5.8K]

Answer:

geeksforgeeks is the answer

5 0
2 years ago
A user complains because the social media apps on his mobile device always note his location. The user is worried about privacy,
stich3 [128]

Answer:

Geotracking feature needs to be adjusted.

Explanation:

5 0
3 years ago
Other questions:
  • Clearing the computer's cache helps store recently-used information.<br><br> True<br> False
    10·2 answers
  • Who invented the Graphical User Interface (GUI)?
    5·1 answer
  • Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output tho
    9·1 answer
  • STEAM game launcher question.
    15·1 answer
  • Consider the packets exchanged in TCP connection setup between Host A and Host B. Assume that Host A's initial sequence number i
    7·1 answer
  • The Fibonacci sequence begins with 0 and then 1 follows. All subsequent values are the sumof the previous two, for example: 0, 1
    11·1 answer
  • Write a C++ Programm in which inheritance is used
    7·1 answer
  • We can use formatting before and after typing.​
    8·1 answer
  • Whenever you press a key, click the mouse or start an application, you're sending instructions tow
    9·1 answer
  • Answer this crossword for brainliest and 15 points
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!