1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
3 years ago
10

Explain in details three security countermeasures you know.​

Computers and Technology
1 answer:
SpyIntel [72]3 years ago
4 0

Answer:

The three options are:

1. Avoid sharing files and folders over the network without the permission of your administrators. You might fall in trouble otherwise.

2. Never share your credit card details with a third party through the internet. You can lose a lot of or all your money.

3. Always ensure that your password is strong enough or else your account can be hacked, And never share them with anybody.

Explanation:

Please check the answer.

You might be interested in
Rhea has been asked to interview the new CEO of an energy company. She has scheduled a meeting with him in the company’s meeting
vovikov84 [41]
The correct answer would be B
7 0
3 years ago
Read 2 more answers
Smartart and shapes are useful tools because they allow you to
charle [14.2K]
Organize data within a document..draw any shape you wants within a document... easily create manipulate shapes within a document. hope this helps
4 0
3 years ago
A user on a home network needs to boost the signal of the wireless router. What should the user purchase to accomplish this?
alexira [117]

Answer:

Repeater

Explanation:

Repeater is the device that is used in networking to enhance or boost the signal to increase the range of the signal.

So the user should purchase the Repeater to boost the wireless signal.

6 0
3 years ago
Guys im getting the ps5 tomorrow :)​
Paha777 [63]

Answer:

lucky mf

Explanation:

5 0
2 years ago
Read 2 more answers
Help me i'll brainiest if its right
Dominik [7]

Answer:

Your response is correct.

I hope this helped at all.

4 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following should you avoid when designing your Print resume?
    11·1 answer
  • What's a good show to watch on Netflix?
    7·1 answer
  • In a database, __________ is used to uniquely identify each record for retrieval or manipulation. answer an attribute or a field
    7·1 answer
  • If str 1 and str2 are both Strings, which of the following expressions will correctly
    13·1 answer
  • Create the SQL statements for displaying the results for each of the following scenarios in the Academic Database. Save these st
    13·1 answer
  • What does the action tool allow you to do in Microsoft power point?
    9·1 answer
  • Fred wants to analyze his spending habits of the past few years and has gathered information on the checks he has written from 2
    6·1 answer
  • An internet connection is required to access which type of software?
    5·1 answer
  • Please answer the following essay question:
    13·1 answer
  • Question #4
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!