1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
13

What should you do before you share your information on the Internet? A. Ask a trusted adult to make sure it is safe. B. Check t

he information to make sure it is untraceable. C. Never provide your information on the Internet. D. Read the website thoroughly.
Computers and Technology
1 answer:
lora16 [44]3 years ago
5 0

There are some websites that are trustworthy. For instance just beside the address bar there will be a lock. You can scroll over it with your mouse to see if it states that it is a secure connection.

Virus protection if accountable should also advise whether website is safe or not.

Always scroll down to the bottom of the page and check their security sites, as in McAfee, Norton, Etc.

The answer is D: Read the website thoroughly!!!!

Always be skeptical and reluctant, as technology advances, so do hackers and online criminals. People are far too brave and crazy these days.

Most bank accounts offer some type of an additional account you can use for online transactions. For instance you may have a checking that you have to pay your bills with (keep your bill money, etc in the account not being used online). Then they may offer another type of account, my  bank refers it to an eaccess account, This is where I can use their online app to transfer money, through my bank app, for online purchases only. Therefore if someone has my account information they aren't getting access to my money that is an absolute necessity, just the little online purchase at a time one, that is also FDIC insured and after a dispute you will be reimbursed in due time.

Another option is PayPal, Paypal actually has a cash debit card now that makes life so much easier when paying. Using paypal pay they only have access to a prepaid debit card.

You might be interested in
Question 1
elena-14-01-66 [18.8K]

Answer:

Option A, Volts

Explanation:

Volts  is the unit of pressure of the electrons in a wire. One Volt is the required pressure to allow flow of one unit of current in a circuit against a resistance of one ohm.

Hence, option A is correct

7 0
3 years ago
In a sport like baseball, which of the following could be considered a “rule”?
ki77a [65]
The answer is all of the above since safety is a priority but when you swing the bat you have to make sure you use enough force.

Hope this helps mark me brainliest please
3 0
3 years ago
The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
Rudiy27

Answer:

True

Explanation:

Computer security is basically divided into three main areas:

  1. Vulnerability/threat assessment and risk management refers to a process that requires the identification, quantification and ranking of a system's possible vulnerabilities.
  2. network intrusion detection and incident response refers to software that detects malicious activity or policy violations, and blocks them
  3. digital forensic investigation refers to the process of identifying, recovering and interpreting (or validating) electronic data.

Generally a single individual may specialize in one of these areas, that is why he/she may need help with the others.

8 0
4 years ago
Read 2 more answers
Se citește un număr natural n cu cel mult 16 cifre. Fie q numărul de cifre ale numărului n. Prin eliminarea unei singure cifre d
exis [7]
He said Read a natural number n with a maximum of 16 digits. Either q the number of digits in the number born by removing a single digit number n is given by writing a sequence of q numbers. To be displayed in ascending order, the numbers in this sequence which not null are prime number b. input data input File numere16.in contains the first line number b. output Data the output file URnumere16.out will contain the first line separated by a space, that respects the ownership requirement. Restrictions and details 2 ≤ q ≤ 16 if we don't have any numbers that respects us permission requirement message does not exist. if you can help him read this

6 0
3 years ago
A user from the sales department calls to report that he is experiencing problems connecting to the sales file server. All users
g100num [7]

Answer: B

Explanation:  Replace the network card in the user's computer this would only be a problem with The one computer if the others aren't having problems.

4 0
3 years ago
Other questions:
  • What is the special feature of the view side by side command?
    11·2 answers
  • What component of a computer system holds the operating system when the computer is not running
    6·2 answers
  • Linux is
    8·1 answer
  • In the receiving computer, UDP receives a datagram from the __________ layer.
    15·1 answer
  • Ask the user to input an integer. Print out the next three consecutive numbers. in python
    13·1 answer
  • The code that is executed when the user clicks a button is known as ________.
    7·1 answer
  • Tightly.
    5·1 answer
  • LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will prin
    9·1 answer
  • The best presentations try to include as much text as possible on each slide true or false ​
    13·1 answer
  • What is the difference between concrete language and abstract language? give an example of each.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!