1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jobisdone [24]
3 years ago
15

Precautionary measures to be observed when using ICT tools​

Computers and Technology
1 answer:
Dafna11 [192]3 years ago
7 0

Answer:

ICT is the abbreviated form of Information and Communication. It included different technologies like mobile phones, computers, USBs etc.

Following are two precautionary measures which should be observed when using any kind of ICT:

  1. Use of Antivirus: It can used to protect anything placed inside the technology especially from hacking and viruses which can create many issues.
  2. Backup Data: Creating a backup of the data stored in the device is important as it can be recalled when the device malfunctions. Backup of the data can be created through using USBs, CDs etc or through cloud storage
You might be interested in
If there is no computer how would human beings have performed the workk
Katena32 [7]

I’m pretty sure we would do things at the agency would do it because overall th i’m pretty sure we would do things at the agency would do it because overall the agents were actually much smarter than we are literally right now and someways because they use more organic and natural and a whole things like herbs Escentuals would help you more than the chemicals in the flu shots that we take and have chemicals and are bad for the body

3 0
3 years ago
Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current
Nonamiya [84]

Answer:

The correct answer for the given question is an option(b) i.e java.

Explanation:

Java is an object oriented programming language that is mostly used for the creating the websites.Java is most secure and reliable programming language than the other programming language.

C is a programming language but it is not object oriented programming language thats why this option is incorrect.

Visual basic is a Programming language it is also used to create a web page but it is not commonly used to create a web page  thats why this option is incorrect.

The scheme is not used to create a web page  thats why this option is also incorrect.

7 0
3 years ago
Why was the 80s bad for Disney i know one example but ill tell you after you answer
Bond [772]

Answer:

The dark stories behind it? i dont  know lol

5 0
2 years ago
Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t
Tems11 [23]

Answer:

Answer explained below

Explanation:

Think about all of the cloud services you use. How vulnerable are you right now to having your data stolen?

At its most basic level, “the cloud” is just fancy talk for a network of connected servers. (And a server is simply a computer that provides data or services to other computers). When you save files to the cloud, they can be accessed from any computer connected to that cloud’s network.

The cloud is not just a few servers strung together with Cat5 chords. Instead, it’s a system comprised of thousands of servers typically stored in a spaceship-sized warehouse—or several hundred spaceship-sized warehouses. These warehouses are guarded and managed by companies capable of housing massive loads of data, including the likes of Google (Google Docs), Apple (iCloud), and Dropbox.

So, it’s not just some nebulous concept. It’s physical, tangible, real.

When you save files to the cloud, you can access them on any computer, provided it’s connected to the Internet and you’re signed into your cloud services platform. Take Google Drive. If you use any mail, you can access Drive anywhere you can access your email. Sign in for one service and find your entire library of documents and photos in another.

Why are people concerned with cloud security?

It’s physically out of your hands.

You aren’t saving files to a hard drive at your house. You are sending your data to another company, which could be saving your data thousands of miles away, so keeping that information safe is now dependent on them. “Whether data is being sent automatically (think apps that sync to the cloud) or driven by users uploading photos to social media, the end result is that it’s all there somewhere being logged and stored,” says Jérôme Segura, Senior Security Researcher at Malwarebytes.

And that somewhere is a place that’s not in your direct control.

Risks of cloud storage

Cloud security is tight, but it’s not infallible. Cyber gurus can get into those files, whether by guessing security questions or bypassing passwords. That’s what happened in The Great iCloud Hack of 2014, where unwanted pictures of celebrities were accessed and published online.

But the bigger risk with cloud storage is privacy. Even if data isn’t stolen or published, it can still be viewed. Governments can legally request information stored in the cloud, and it’s up to the cloud services provider to deny access.

8 0
3 years ago
The object-oriented database model supports _______________. that is, new objects can be automatically created by replicating so
Talja [164]
The answer is Inheritance! Hope this helps!
5 0
3 years ago
Other questions:
  • If your computer freezes on a regular basis and you checked your hard drive and you have insufficient space you've not installed
    11·2 answers
  • Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru
    12·1 answer
  • What do you need to do in order get paid for ads running on your content?
    11·1 answer
  • Why do astronomers prefer to use the reflecting telescope rather than the refracting telescope to view distant objects in space?
    15·2 answers
  • Which describes a composite primary key? Check all that apply.
    11·1 answer
  • .____________ is a way to identify and differentiate goods andservices through use of a name or distinctive design element.
    10·1 answer
  • Which of the following is your personal record of payments and bill-paying?
    13·1 answer
  • The default for automatic replies in outlook is what?
    6·2 answers
  • ~ I already know this ~ who was the bits victim in five nights at freddys 4 <br> ___10 points___
    12·2 answers
  • The algorithm for solving the problem of average of five (5) numbers​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!