1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
13

What should you do before you share your information on the Internet? A. Ask a trusted adult to make sure it is safe. B. Check t

he information to make sure it is untraceable. C. Never provide your information on the Internet. D. Read the website thoroughly.
Computers and Technology
1 answer:
lora16 [44]3 years ago
5 0

There are some websites that are trustworthy. For instance just beside the address bar there will be a lock. You can scroll over it with your mouse to see if it states that it is a secure connection.

Virus protection if accountable should also advise whether website is safe or not.

Always scroll down to the bottom of the page and check their security sites, as in McAfee, Norton, Etc.

The answer is D: Read the website thoroughly!!!!

Always be skeptical and reluctant, as technology advances, so do hackers and online criminals. People are far too brave and crazy these days.

Most bank accounts offer some type of an additional account you can use for online transactions. For instance you may have a checking that you have to pay your bills with (keep your bill money, etc in the account not being used online). Then they may offer another type of account, my  bank refers it to an eaccess account, This is where I can use their online app to transfer money, through my bank app, for online purchases only. Therefore if someone has my account information they aren't getting access to my money that is an absolute necessity, just the little online purchase at a time one, that is also FDIC insured and after a dispute you will be reimbursed in due time.

Another option is PayPal, Paypal actually has a cash debit card now that makes life so much easier when paying. Using paypal pay they only have access to a prepaid debit card.

You might be interested in
How do you use a iPad when it has a password ?
BaLLatris [955]
Take it to the Apple Store and they will help you or you can go on their site and press "Forgot Apple ID." If you choose the second option you have to enter the first and last name, and the email you used for the iCloud on the iPad. 
6 0
3 years ago
Read 2 more answers
What section in an ethernet frame will you find a Virtual Local Area Network (VLAN) header?
Vadim26 [7]

Answer:

Preamble

Explanation:

In the computer network , the ether-net is the frame of link layer protocol data. This frame is used ether net with physical layer of transport mechanism. The ether net frame is of different type.

  • The ether-net II
  • The Novel raw IEEE 802.3
  • IEEE 802.2 LLC
  • IEEE 802.2 SNAP

Each of the Ethernet frame started from Ether net header. It contains the source and the destination. The MAC address is called its first two address.

8 0
3 years ago
True or False. A geosynchronous satellite changes its area in the sky each day.
nataly862011 [7]

Answer: False

Explanation: they remain in the same area

7 0
3 years ago
Read 2 more answers
JAVA- If you have an int as the actual parameters, will it change to fit the parameters if it requires a double, or will the cod
ivann1987 [24]

If you have only 1 method that is not overloaded, then you will not be able to call it with inappropriate parameter types, that is, if the initial type of the parameter is int, then it will not be able to get the double, float, and other values, because of this an error will occur.

For this, method overloading is created.

Method overloading is when you create methods with the same name, but only the content and parameters of the methods are/can-be completely different.

6 0
3 years ago
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward t
stepladder [879]

Answer:

Repeaters

Explanation:

As the question points out, the signal strength diminishes (attenuates) as it travels farther from the source.  Deploying a repeater at critical points throughout the building would boost the signal strength as it continues on its way.

5 0
2 years ago
Other questions:
  • A. True
    7·1 answer
  • From an IT perspective, which of the following best describes BI and BI apps?
    13·1 answer
  • apple and adobe are in disagreement about the use of __________ to create apps for the iphone and ipad?
    10·1 answer
  • How do u use this app?
    15·2 answers
  • The Nigerian 4-6-9 scam refers to a fraudulent activity whereby individuals claiming to be from a foreign country will promise a
    11·1 answer
  • You were just hired as an IT Specialist for Smalltown School District. Your first assignment is to review a problem area& in
    11·1 answer
  • C++ Write a program that initially asks a user to enter two positive integer numbers a and b. If either a or are zero or negativ
    9·2 answers
  • How does polymorphism enable you to program "in the general" rather than "in the specific"? Discuss the key advantages of progra
    11·1 answer
  • In this paper https://arxiv.org/pdf/2008.10150.pdf, I'm having a hard time understanding how the assignment in the picture is de
    10·2 answers
  • What are some of the characteristics found in an editorial photograph?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!