1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
3 years ago
10

Explain in details three security countermeasures you know.​

Computers and Technology
1 answer:
SpyIntel [72]3 years ago
4 0

Answer:

The three options are:

1. Avoid sharing files and folders over the network without the permission of your administrators. You might fall in trouble otherwise.

2. Never share your credit card details with a third party through the internet. You can lose a lot of or all your money.

3. Always ensure that your password is strong enough or else your account can be hacked, And never share them with anybody.

Explanation:

Please check the answer.

You might be interested in
Why not to use settimeout in angular.
barxatty [35]

Answer:

start with what you know

Explanation:

you can learn alot

4 0
3 years ago
Which excel feature makes it easy to copy and paste formulas in multiple cells?.
timama [110]

Answer:

Ctrl + R - Copy a formula from the cell to the left and adjusts the cell references. For example, if you have a formula in cell A2 and you want to copy it to cell B2, select B2 and press Ctrl + R. Tip. Both of the above shortcuts can be used to copy formulas to multiple cells too.

Explanation:

8 0
2 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
Abstract: Design, implement, explain, test, and debug a simple, but complete command- line interpreter named cli.
ZanzabumX [31]

Answer:

that is very long question ask a profesional

Explanation:

8 0
3 years ago
Which of the following statements is true? 1. The Internet is just a network of computers. 2. The internet is now an Internet of
lisabon 2012 [21]

Answer:

All statements are true

Explanation:

  1. The internet is a network of globally interconnected millions of computers that communicate wit themselves remotely using standardized communication protocols via a web server.
  2. The internet is also refer to as internet of things (IoT)as devices and gadgets in homes and cars can now be connected to the internet with the exchange of billions of information using cheap processors and WLAN
  3. Everything on IoT needs an Internet Protocol address (like an house address) to function and exchange data.
  4. It must be be able to exchange information with other inter-connected devices for it to be an IoT.
7 0
4 years ago
Other questions:
  • Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru
    12·1 answer
  • How to find the largest number in an array java?
    13·1 answer
  • Which of the following is not System Software?
    5·1 answer
  • Describe the purpose of shell scripts. Provide one example to reflect the use of variables, constructs, or functions.
    11·1 answer
  • While organizing his computer's power cords, Matt realizes his printer power cord is frayed (coming apart). What should Matt do
    10·1 answer
  • Hey does anyone know any sites like you tube i can watch on my school chrome book or tell me how to unblock sites cause everythi
    8·1 answer
  • If someone you don’t know asks where you go to school, what should you do
    12·1 answer
  • Three PCs are on an Ethernet LAN, connected by a hub. Describe how the Ethernet protocol deals with collisions in this situation
    9·1 answer
  • For which input values will the following loop not correctly compute the maximum of the values? 1. Scanner in = new Scanner (Sys
    14·1 answer
  • How many times is the second for loop going to loop in this block of code? Write your answer in numeric form in the box provided
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!