1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
3 years ago
15

Which of the following is a good precaution to take when making online purchases? (1 point)

Computers and Technology
1 answer:
Fantom [35]3 years ago
5 0

Answer:

A.

Explanation:

A is the answer..

This is because you can use a private browser for safety precautions so no hackers would target you and steal your personal information. Also the other options make no sense at all. Option B states that you can use the same strong password for all online accounts and that's not good. It's not recommended because hackers or other people on the dark web can hack into your accounts and steal your data. Option C states that you must make sure http: and an open padlock displays on the address bar. This means that your connection is insecure and people can track you down. Option D is a good thing to do but option A is the best option overall. It's the right step to take when making online purchases <3

You might be interested in
A(n) ____ is a grouping of related objects within a domain,
Anna11 [10]

Answer:

A. OU

Explanation:

An organization unit (OU) is used to group objects that are related, having similar administrative and security requirements within a domain. It provides a way of classifying objects in a directory, such as differentiating between objects with the same name or managing and creating objects. An OU can be nested into another OU, thus it can be used to create a hierarchy within an organization.

5 0
2 years ago
What is printed to the console?<br> console.log(15 % 4);<br><br> 1<br><br> 2<br><br> 3<br><br> 4
Radda [10]

Answer:

3

Explanation:

7 0
2 years ago
This is your code.
lubasha [3.4K]

Answer:

35

Explanation:

We will be going inside B array, because he was in second place in array E,and will be the first element of array B, so it's 35

E can be understanded as:

E=[[21, 'dog', 'red'],[35, 'cat', 'blue'],[12, 'fish', 'green']], so, you can see array E as array of arrays or so-called two-dimensional array

6 0
2 years ago
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
Most _____ focus on galning entry over the internet to a secure computer system by finding a
dangina [55]

Most <u>Malware</u>  focus on gaining entry over the internet to a secure computer system by finding a  working user ID and password combination.

<u>Explanation:</u>

A malware is a small computer program which works on the user’s system without knowing to the user. Different malware works differently.

Some malware sits on the user computer, create multiple unnecessary files and make the hard drive full, some people create viruses to show their computer skills which they tend to prove in a wrong way, some malware sits in the computer to steal data especially while using internet.

So there are malware's like Virus, Worm, Trojan, spyware, etc.

5 0
3 years ago
Other questions:
  • 1. of the following individuals, who was the most recent to develop information searching tools online? (points : 1) otlet wells
    5·1 answer
  • MTTF is a file format developed by Microsoft commonly used on Windows systems; it offers file security, large volume size, large
    11·1 answer
  • To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
    5·1 answer
  • A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database da
    6·1 answer
  • Computer hardware without computer software is useless while computer software without computer hardware is meaningless. Discuss
    10·1 answer
  • How is the cia triad used to evaluate encryption methods?
    6·1 answer
  • One key to success in a career is to be an accomplished
    15·1 answer
  • What is the best food to eat before workout? why?​
    10·2 answers
  • Tinh T = a1*a2*a3*...an<br><br> Giúp em với
    13·1 answer
  • Why does my roku tv keep disconnecting from the internet.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!