1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
4 years ago
12

*hacked*

Computers and Technology
1 answer:
galben [10]4 years ago
5 0

Hey Litz06,

Sorry that happened to you.

Try changing your password to something complicated so it’s more secure.

You might be interested in
Which statement correctly differentiates how to use list and table styles?
irina [24]
What statement please explain correctly
5 0
3 years ago
Read 2 more answers
How secure is a password protected word document?
tensa zangetsu [6.8K]
Secure enough to keep someone out who get on your pc but you should encrypted it so no one o the pc or remotely access it with out a password or with out decrypting it
8 0
4 years ago
How do you create a reference page in apa format with all websites?
Gre4nikov [31]
Use Cite This For Me's APA citation generator to create a reference page in APA format with all websites.
6 0
3 years ago
Select the correct answer.
grandymaker [24]

Answer: C

Explanation:

5 0
3 years ago
Select the four tactics that cyber criminals use for stealing information from the list below.
Snowcat [4.5K]
Baiting clickjacking pharming spamming
6 0
2 years ago
Other questions:
  • Two of the goals of community mobilization are getting the community interested and
    6·1 answer
  • A file extension of .xlsx means that the file contains what? *
    12·2 answers
  • List the applications in the CyberOps menu.
    15·1 answer
  • Of the key reasons for creating organizational units which of the following is not one of them?
    13·1 answer
  • An object is suspended in a wind tunnel and the force measured for various levels of wind velocity: v (m/s) 10 20 30 40 50 60 70
    10·1 answer
  • Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s person
    7·2 answers
  • PLEASE HELP ASAP IT'S DUE TODAY! WILL GIVE BRAINLIEST, FIVE STARS, AND THANKS!! PLEASE HELP!
    12·1 answer
  • Which one is not considered part of the cinematography team?
    7·2 answers
  • When measuring processor speed,a megahertz is much faster than a gigahertz.true or fals
    12·1 answer
  • 2. How would you categorize the software that runs on mobile devices? Break down these apps into at least three basic categories
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!