1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
13

What should you do before you share your information on the Internet? A. Ask a trusted adult to make sure it is safe. B. Check t

he information to make sure it is untraceable. C. Never provide your information on the Internet. D. Read the website thoroughly.
Computers and Technology
1 answer:
lora16 [44]3 years ago
5 0

There are some websites that are trustworthy. For instance just beside the address bar there will be a lock. You can scroll over it with your mouse to see if it states that it is a secure connection.

Virus protection if accountable should also advise whether website is safe or not.

Always scroll down to the bottom of the page and check their security sites, as in McAfee, Norton, Etc.

The answer is D: Read the website thoroughly!!!!

Always be skeptical and reluctant, as technology advances, so do hackers and online criminals. People are far too brave and crazy these days.

Most bank accounts offer some type of an additional account you can use for online transactions. For instance you may have a checking that you have to pay your bills with (keep your bill money, etc in the account not being used online). Then they may offer another type of account, my  bank refers it to an eaccess account, This is where I can use their online app to transfer money, through my bank app, for online purchases only. Therefore if someone has my account information they aren't getting access to my money that is an absolute necessity, just the little online purchase at a time one, that is also FDIC insured and after a dispute you will be reimbursed in due time.

Another option is PayPal, Paypal actually has a cash debit card now that makes life so much easier when paying. Using paypal pay they only have access to a prepaid debit card.

You might be interested in
Why is time zone an important factor affecting when communicating
PilotLPTM [1.2K]

Answer:

Regarding real time communication, time zone differences between two count- tries impedes communication and may lead in the extreme case to no overlap in business working hours. With respect to traveling, East-West distance is more severe since a jet lag may affect the productivity of business travelers.

Explanation:

4 0
3 years ago
The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
sp2606 [1]

Change default user name and password is the first step that should be performed by Derek to secure the wireless router

<h3><u>Explanation:</u></h3>

The device that helps in accessing internet or to any private computer network is the wireless router. It is a devices that acts as the access point which is wireless in nature. There are many steps involved in securing  the wireless router. If the wireless router is not secured then it will be used by others without our knowledge.

In order to secure the wireless router firstly we should create our won password and username deleting the default username and password.To do this, we must open router setting page and change the default username and password with our own. The SSID name of the network must also be changed.

6 0
4 years ago
What are placeholders in Java?
Goryan [66]
C variables are placeholders in Java
5 0
3 years ago
What is one way a senior employee can mentor a new employee? Give orders about what to do and what not to do Gossip about which
den301095 [7]

A good way for a senior employee to mentor a new employee is to share company knowledge and job expertise.

7 0
3 years ago
The ________ contains the central electronic components of the computer. select one:
Sati [7]
The motherboard contains the central electronic components of the computer.
6 0
3 years ago
Other questions:
  • Assume that to_the_power_of is a function that expects two int parameters and returns the value of the first parameter raised to
    11·1 answer
  • What is the purpose of the operating systems processor management function
    7·1 answer
  • Can somebody help me with this problem
    10·1 answer
  • The _________ check is a type of hardware control that involves adding a "1" or a "0" to the end of every 8 bit byte such that t
    11·1 answer
  • When the hyper-v role is added to a windows server 2012 r2 server, what is loaded first during boot?
    6·1 answer
  • What is an efficient way to ensure that the code is working as per the acceptance criteria/business requirements? (1 correct ans
    11·2 answers
  • True / False<br> General purpose registers can be read and written by ML programs
    10·1 answer
  • What techniques are required to accept
    12·1 answer
  • A person is trying to remember a list of 12 different items:
    6·2 answers
  • Words that are restricted for use in object names because they belong to the SQL programming language are called _______________
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!