Answer:
Changing password and screen names regularly.
Explanation:
The cyber attacks have been common in this age. The technological advancements have eased our lives but also create hundreds of risks. These risks can include cyber bullying. The best way to keep your self away from being victim of such threat is by changing passwords regularly. This reduces the chance of hacking passwords and cyber bullying.
Answer:
traceroute
Explanation:
This command traceroute implies its name, in networking, it is of interest sometimes to know the path a packet takes and how much time it uses between two nodes (PC). Using this command, will display the path that the packet follows when it is sent from one computer until it reaches the specified host (destination) , it reveals the entire routes and the hops the information packet makes on every switch, router and firewall and how much time it spent on each device along the way.
nawww dude im good look it up
Answer:
Option A is the correct answer for the above question.
Explanation:
A Victim is a person, who faces the problem of a criminal person. Here in the question, the scenario is that a user is a victim of the identity of being theft by some other person. So the user can get known by the help of option a, which suggests that the user's credit card report display something which is not done by him then it can be the scenario, where the user can understand that he is a victim. hence option a is the correct answer where the other option is not because--
- Option B suggests the user does not pay the bill on time but it is a general case because the bill is paid by the user is in every month not a single time.
- Option C suggests both options (A and B) are correct, but option b is not the correct.
- Option D suggests that no option is valid from the above but option A is the correct.