1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
4 years ago
12

The MAA is responsible on a daily basis to protect office computers and patient records and personal information from hackers. R

esearch using Google or another search engine and briefly explain and list two things that you can do to protect these assets while using the computer or Internet.
Computers and Technology
1 answer:
d1i1m1o1n [39]4 years ago
3 0

Two things that I can do in order to protect these assets with the use of the computer or the internet is by first, downloading and using an antivirus software where this has the ability to protect the computer from invaders, hackers and other viruses that could get into the system of the computer. Second, making the data encrypted, so that it will be protected with a code to prevent other people who are trying to get in the data.

You might be interested in
BRAINLYEST IF CORRECT!!! What is the special feature of the View Side by Side command?
xeze [42]

<u> Allows you to see two parts of the same worksheet side by side</u>

<u>Option: B</u>

<u>Explanation:</u>

The View Side by Side command helps to see the two documents side by side in Word. When using this feature, both the documents open at the same time in different windows side by side.

To view this, click the View tab in Word and then click the View side by side button. Now the document opens in two windows with side by side views. This is used to compare the documents. In case, if we want to disable this view, click the 'View Side by Side' button again so that it comes to the normal view.

6 0
3 years ago
Read 2 more answers
What is the difference between master file and transaction file​
klio [65]

Answer:

master file contains data types while transaction file is used to record Master file

Explanation:

hope it helps

3 0
3 years ago
When a hostname is configured through the cisco cli, which three naming conventions are part of the guidelines? (choose three.)?
Advocard [28]
When a hostname is configured through the Cisco cli,  there are some naming <span>conventions are part of the guidelines that should be followed.

From these conventions:
1- the name of the host shouldn't contain any spaces.
2- the name of the host should always begin with a letter
3- the name of the host should be less than 64 characters in length.</span>
3 0
4 years ago
I need help figuring out 2 pictures with topics that I can put on a magazine about the serengeti. This is something I'm doing fo
Usimov [2.4K]

Answer:

how about lions, trees, or zebras

Explanation:

i looked it up

4 0
3 years ago
Read 2 more answers
Computer Hardware and Maintenance
Gnesinka [82]

Answer:

All of these answers

Explanation:

8 0
3 years ago
Other questions:
  • In the Scrum board, prioritizing the issue backlog is done in the ———- mode.
    7·1 answer
  • Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?
    10·1 answer
  • Clifford created a table using OpenOffice Writer and entered some information into the table. Later, he needed to add more rows
    15·2 answers
  • Why do local variables lose their values between calls to the function in which they are
    5·1 answer
  • Select the correct text in the passage.
    5·1 answer
  • Explain what a surrogate key is.
    13·1 answer
  • Assume v is a vector of integers that has been declared and initialized. Write a statement that adds the value 42 to the vector.
    14·1 answer
  • Which line of code will cause the loop to execute exactly one time?
    13·1 answer
  • Is climate change a man-made problem or a natural occurrence ? Why or why not ?
    8·1 answer
  • A computer hardware feature that is vital to the effective operation of a multiprogramming operating system is:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!