1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataly_w [17]
3 years ago
13

A reason improper use of netiquette can be risky is that users can

Computers and Technology
2 answers:
GaryK [48]3 years ago
4 0

Answer:

A) Become vulnerable to online harassment

Explanation:

From my understanding, Netiquette refers to talking to other people, and being rude to others isn't gonna get you very far

son4ous [18]3 years ago
4 0

Answer:

A

Explanation:

You might be interested in
What is web <br>searching engine ?​
Nikolay [14]
A Web search engine is a specialized computer server that searches for information on the Web. The search results of a user query are often returned as a list. The hits may consist of web pages, images, and other types of files.
4 0
3 years ago
Observing users as they enter passwords or other personal information to a computer Auditing software often used to test compute
GuDViN [60]

Answer:

Explanation:

1. Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data - (shoulder surfing)

2. An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer --- (CSI)

3. A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans - (COOKIES)

4. A software program specifically designed for computer forensic investigations - (EnCase)

5. A type of fraud in which the perpetrator steals small amounts from many different accounts - (salami technique)

6. A software program or hardware device designed to prevent unauthorized data communications - (firewall)

7. Malicious software similar to a computer virus -- (_worm)

8. Federal legislation aimed specifically at computer crime (CFAA)

8 0
3 years ago
With an Internet connection, you can view, modify and delete files stored in your
Soloha48 [4]

Answer:

Computer

Explanation:

Files stored in the "cloud" are stored remotely in some file system in one or more data centers. To access these files from any device you need to have an internet connection. Technically speaking, you can Create, Read, Update and Delete(C.R.U.D) anything stored in any cloud from any internet connected device as long as you have the permission to do so.

4 0
3 years ago
Which of these is installed only on Apple smartphones and tablets?
melomori [17]
IOS. It's Apple's own custom OS system, built for their tech.
5 0
3 years ago
Read 2 more answers
Role of User Defined Iprms for creation of paten
Mazyrski [523]

Answer:

3

Explanation:

3 0
3 years ago
Other questions:
  • Progressively enhancing a web page for different viewing contexts (such as smartphones and tablets) through the use of coding te
    11·1 answer
  • Before using large downloaded files that are in a compressed format, it is necessary to_____ them. A) Copy B) Extract C) Open D)
    9·1 answer
  • How to manufacture an ict application?
    15·1 answer
  • If an additional term relates to payment, quality, quantity, price, time, and place of delivery, the CISG considers the added te
    12·1 answer
  • Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
    12·1 answer
  • Which of the following would be considered the highest risk portfolio?
    9·1 answer
  • Algoritmos para llevar a cabo una actividad
    15·1 answer
  • Use the drop-down menus to complete the sentences about the Calendar view Arrange command group.
    6·1 answer
  • PLEASE HELP!!!
    11·1 answer
  • Which of the following programming languag
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!