1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fudgin [204]
3 years ago
12

Among the rights you have as a user of computing resources is the right to​ _______.

Computers and Technology
2 answers:
Zinaida [17]3 years ago
4 0

Answer:

C) protection from​ viruses, worms, and other threats

Explanation:

Your obligations include:

  • You should follow the standard techniques for using applications.
  • You should only report important and relevant problems.
  • You should use your mobile following your organization's guidelines and not at free will.
  • You should treat your password very seriously.

You are entitled to be protected from viruses, worms, and other threats  when you use your computing resources.

Ivanshal [37]3 years ago
3 0
Protection from​ viruses, worms, and other threats
You might be interested in
Which advertising medium has the widest reach on a global front?
lesya [120]

Answer: B

The internet would allow businesses to easily expand globally with the help of social media and the ever expanding resources being poured onto the internet, reaching customers anywhere in the world.

8 0
3 years ago
Which telecommunications offering is a component of social media? A.)web conferencing
vichka [17]
I would say C. podcast??? not for sure
7 0
3 years ago
Read 2 more answers
True or false? because you have made it a practice to never access the
Flauer [41]

Answer: False

Explanation: Even if the internet service is not connected with the operating system while accessing the database, it is still on risk and can be vulnerable to get attacked. Devices of the system like USB drive can happen to have the malware which creates the risk towards database.

The computer system can get invoked with the virus or other attack while the user connects the internet afterwards when he/she is not accessing the database, these malware get stored in system once they get invoked and corrupt the system and its database even when the internet connection is not present .Thus, the statement given is false.

6 0
3 years ago
Write an if/else statement that compares the variable age with 65, adds 1 to the variable seniorCitizens if age is greater than
Oduvanchick [21]

if age >= 65:

seniorCitizens = seniorCitizens + 1

else:

nonSeniors = nonSeniors + 1

6 0
3 years ago
If you cause a car accident, which type of insurance will require you to pay the least out of pocket?
Luden [163]
A high deductible plan if that person blames you for it and said that it was on purpose
5 0
3 years ago
Other questions:
  • DJ wants to see how his document will look when printed. Where would he find the button to see the document in print view? the P
    5·2 answers
  • If your BAL is .10 you can expect a _______ drop in complex performance compared to the sober level
    6·1 answer
  • Implement a java program to find the smallest distance between two neighbouring numbers in an array.
    7·1 answer
  • You specify the shape of an oval in a Java applet by defining the oval's:__________.
    5·1 answer
  • MS Excel is a powerful spreadsheet program that helps people with complex mathematical calculations. In what ways could you use
    10·1 answer
  • The Technology Librarian asks you to find out how many hops it takes to get to the first Wi-Fi kiosk. What Windows command can y
    5·1 answer
  • 2) What is the value stored in the variable z by the statements below?
    11·1 answer
  • Which is the OS that can be obtained for free or at a much lower price than other major operating systems?
    15·2 answers
  • You receive an email that appears to legitimately be from your Bank. The email indicates the need for verification of your infor
    15·2 answers
  • Rectangle perimeter is 72 .Find the new perimeter if length is doubled and breadth is tripled​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!