1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
3 years ago
6

How can you prevent online shopping risks

Computers and Technology
2 answers:
VLD [36.1K]3 years ago
8 0
I believe the answer is c because A is obviously not it because then anyone can acsess your account. B is no it because some could use  it from you device if they got on and d though cmmonly done isnot very smart either hope this helps :)
steposvetlana [31]3 years ago
3 0
<span> Use a secure browse, this will help you monitor the invents happeninig</span>
You might be interested in
Can development and conservation of environment go hand-in-hand? Explain your point of view
Wewaii [24]

No, development and conservation of environment cannot hand in hand.

Explanation:

Because during the developmental process the destruction of the environment is necessary.For example,if you want to construct a Road which is one of the developmental activity,so to construct road the clear of forest is must .

5 0
2 years ago
Self contained sequences of actions to be performed are?
Firlakuza [10]

Answer:

Self contained sequences of actions to be performed are algorithms. - b

6 0
2 years ago
it just said i was blocked from brainly for a sec i was like- dang- then i logged in again then it was back to normal uHhHh can
PSYCHO15rus [73]

Answer:

it has been doing the same to me if your on a school computer at home then it will bug sometimes but if you were at school then it would probably be entirely blocked but idrk

Explanation:

5 0
2 years ago
Read 2 more answers
How do you create a CA file? short answer
SashulF [63]

1.Create the root CA directory: mkdir -p /root/internalca cd /root/internalca.
2.Generate the private key of the root CA: openssl genrsa -out rootCAKey.pem 2048.
3.Generate the self-signed root CA certificate: ...
4.Review the certificate:
8 0
2 years ago
Describe encryption at gateways in thePresentation layer of the OSI Reference Model
puteri [66]

Answer:  

In the presentation layer of the OSI reference model provides a variety of coding and functions that can be applied in application layer data. Information send by the application layer are ensured by these functions. As, presentation layer is the important layer in the OSI reference model because it is responsible for important services like  data compression, data conversion, decryption and encryption.

Encryption at gateway is defined as, when the important data is first encrypted using protocol and then it is transferred in the network. And gateway re-director operates in the presentation layer.

4 0
2 years ago
Other questions:
  • What is the last step in conducting url search
    11·1 answer
  • A type TW cable containing two No. 12 copper conductors has a maximum overcurrent protection of
    7·2 answers
  • list six external parts or peripherals of a computer system and identify which are output and which are input devices
    8·1 answer
  • What needs to be increased in order to increase image size and clarity?
    10·1 answer
  • 2.13 LAB: Branches: Leap Year
    11·1 answer
  • We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
    13·1 answer
  • What is the sequence of instructions performed to execute one program instruction
    13·1 answer
  • Question 1(Multiple Choice Worth 5 points)
    9·2 answers
  • Which of the following is NOT a reason we use subprograms?
    7·1 answer
  • Which tool uses images and other visual elements to provide artistic
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!