1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hjlf
3 years ago
8

Describe security risks associated with downloading items online

Computers and Technology
1 answer:
AURORKA [14]3 years ago
8 0

Answer:

1. Hackers could get information and sell it. 2. Hackers can get a hold of your files online. 3. Hackers can look at your photos. Download a VPN

You might be interested in
The trademarked name of the accepted standard for configuring wireless networks is _______________
enyata [817]

Answer:

WiFi

Explanation:

WiFi is a standard wireless network configuration developed by IEEE (Institute of Electrical and Electronics Engineers) as a 802.11 standard.

WiFi is embedded in chips in computers and configured for finding wireless routers. WiFi certified points can identify each other, this standardized networks are available almost all online electronic devices.  

Wi-Fi Alliance is the authority to certify devices which satisfy the IEEE 802.11 standards.

3 0
4 years ago
Find out the names of at least 20 programming languages and their developers.
arlik [135]

Answer:

lala

Explanation:

6 0
3 years ago
Read 2 more answers
How is an operating system like a translator?
emmasim [6.3K]

Answer:

Operating systems work like translators because they are able to take software and hardware, and put it all together to work in a way that is readable and usable for the consumer.

5 0
3 years ago
Create a class named Employee. The class must contain member variables for the employee name and salary. It should contain gette
Lerok [7]

Answer:

Explanation:

The following code was written in Java. The code contains the Employee class which contains the two variables (name, salary), the constructor, getter and setter methods for both variables, and an overwritten toString method. It also contains a tester class with the main method inside and creates a Employee object and initializes it. Then it calls the toString method. The output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.

8 0
3 years ago
____________________deals with syntax and semantics ofinformation exchange.
Goshia [24]

Answer:

The answer is (a).Presentation Layer

Explanation:

This layer is located at the 6th level of the OSI model, responsible for delivering and formatting the information to the upper layer for further processing. This service is needed because different types of computer uses different data representation. The presentation layer handles issues related to data presentation and transport, including encryption,translation and compression.

3 0
3 years ago
Other questions:
  • If you paste a word document text into an excel spreadsheet, the paste optio allow you to keep source formatting or
    9·1 answer
  • If an employee who needs eye protection wears prescription lenses he or she should
    14·1 answer
  • What process improves the life of a computer
    11·1 answer
  • You can toggle between different types of references by pressing the ____ key on your keyboard.
    15·1 answer
  • The term integration refers to the ability to
    6·1 answer
  • Write a program that prints the following text: In C, lowercase letters are significant. main() is where program execution begin
    14·1 answer
  • keeping in mind the role in order of precedence plays in equations, what would excel display as the result of the following equa
    14·1 answer
  • One way to initiate a file download from a web page is to
    8·1 answer
  • When doing a Risk assessment, what is one of the most important things to do?
    8·2 answers
  • Privacy, anonymity, and freedom of expression are all interrelated.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!