1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vesna_86 [32]
3 years ago
13

Which of the following are computer safety techniques? Check all of the boxes that apply.Identify Computer Safety Techniques:

Computers and Technology
1 answer:
zvonat [6]3 years ago
4 0

Answer: Protect the system with a password  

               Use spam protection.

               Avoid using questionable software.

               

Explanation:

You might be interested in
How many fonts are there in a theme?<br> A. 1<br> B. 2<br> C. 4<br> D. 5
BlackZzzverrR [31]

B. 2

If incorrect, sorry

6 0
3 years ago
Select all examples of proper keyboarding technique.
emmasim [6.3K]
Keep your eyes on the text and aim to make no mistakes
4 0
3 years ago
Read 2 more answers
Live footage refers to:
QveST [7]

Answer:

D

Explanation:

live refers to happening right now and footage refers to videos taken and captured.

8 0
1 year ago
What did Adam and Eve look like?
Nata [24]
No one could possibly know, unfortunately.
6 0
3 years ago
Read 2 more answers
How to control what is on the x and y axis in excel?
kozerog [31]
The value on X you choose first and create a graph then you add values to graphs Y axis.
8 0
3 years ago
Other questions:
  • Which of the following actions would help people determine their interests?
    11·1 answer
  • When you move or size a control in the Form Designer, Visual Studio automatically adjusts the ________________ that specify the
    9·1 answer
  • Select a classification for File2 so that: Alice can read and write to File2 Bob and Charlie can write to File2, but can't read
    6·1 answer
  • List the names of 3 computer scientists
    6·2 answers
  • So can u please follow my new ig acc i just started it yesterday its called stunnerspamz
    5·2 answers
  • Assume that the message M has to be transmitted. Given the generator function G for the CRC scheme, calculate CRC. What will be
    15·1 answer
  • PACIFIC NORTHWEST
    10·1 answer
  • Different he launc.<br>in function are available with MS-Excel<br>Many​
    14·1 answer
  • Any my hero academia fans out there don't report at all just what more friends to
    14·2 answers
  • Develop a program to sort a file consisting of bonks details in the alphabetical order of author names. The details of books inc
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!