1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
14

Write 8 tips for cyber safety

Computers and Technology
1 answer:
alina1380 [7]3 years ago
5 0

Answer:

8 tips for cyber safety

1. Keep Personal Information Professional and Limited

2. Keep Your Privacy Settings On

3. Practice Safe Browsing

4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection

5. Be Careful What You Download

6. Choose Strong Passwords

7. Make Online Purchases From Secure Sites

8. Be Careful What You Post

8 STEPS TO STOP YOUR CHILD’S CYBERBULLY

Resist The Urge To Respond Or Retaliate

Document The Bullying

Get Help

Block The Bully

Keep Passwords Secret

Be A Teammate

Approach The Parents

Support Your Child With A Stress-Free, Supportive Home

Explanation:

You might be interested in
What is virtual memory? What is the function of associative memory?
zheka24 [161]

Answer:

Virtual memory is a feature of an operating system that enables a computer to be able to compensate shortages of physical memory by transferring pages of data from random access memory to disk storage. ... This means that when RAM runs low, virtual memory can move data from it to a space called a paging file.

Associative memory is also known as content addressable memory (CAM) or associative storage or associative array. It is a special type of memory that is optimized for performing searches through data, as opposed to providing a simple direct access to the data based on the address.

3 0
3 years ago
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
After creating an organizational strategy based on porter's models, a company can?
malfutka [58]
1.B 2.B 3.C 4.B 5.B 6.C 7.A 8.A 9.C 10.A
3 0
3 years ago
Read 2 more answers
Tysm for Ace! :O<br> Hurray!
professor190 [17]

Answer:

Good job!! You deserve it.

Explanation:

3 0
3 years ago
Read 2 more answers
Sanford is creating an excel spreadsheet and needs to insert many worksheets to organize his data. What is the limit of the numb
Varvara68 [4.7K]

Answer:

The answer is given below in explanation section.

Explanation:

As asked in the question Sanford is creating an excel spreadsheet and needs to insert many workbooks sheets to organize his data, then what is the limit of the number of worksheets excel con contain.

The excel spreadsheet contains as many worksheets as you want but it is limited by the available memory of your computer and system resources. If you have very little memory then you cannot create many worksheets. If you have memory in GBs then you can create thousands of worksheets.

However, it is noted that to create the worksheet is not limited by Excel but it is limited by avilabe memory and system resources. If you have enough computer memory and resources like CPU power etc, then you can create worksheet as many as you want.

It is also noted that the excel worksheet is limited by its number of rows and number of columns it contains e.g. the total number of rows and columns on a worksheet are 1,048,576 rows by 16,384 columns.

If you want to study more about Excel limitation and specifications, the following link may help you

https://support.office.com/en-us/article/excel-specifications-and-limits-1672b34d-7043-467e-8e27-269d656771c3

5 0
3 years ago
Read 2 more answers
Other questions:
  • If you wanna buy a Monitor, please explain why you wanna buy it! PLEASE HELP ME!!!!!!!!!!!!!!!!!!!!!!!!!
    9·1 answer
  • Peter accumulated many photos from his visit to Wisconsin. He wants to upload these photos to a social networking site. Which fi
    12·1 answer
  • The power we use at home has a frequency of 60 HZ. What is the time period of such a power?
    10·1 answer
  • When asking questions critisim it is best to
    13·2 answers
  • For this exercise, you are given a phrase. Return the number of time the word “dog” appears in the phrase.
    7·1 answer
  • With the _______ network topology, reliability is the major advantage while high cost is the disadvantage.
    13·1 answer
  • A ________ is an input device that responds to finger touch.
    8·2 answers
  • Why can it be helpful to perform mathematical calculations using programming? Choose the best answer.
    11·1 answer
  • A data table is a range that displays what?
    15·2 answers
  • Cho một File Input.TXT chứa dãy nhị phân liên tiếp của một văn bản đã mã
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!