1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatiyna
3 years ago
5

What do you think is the biggest threat to the security of your personal information?

Computers and Technology
2 answers:
soldier1979 [14.2K]3 years ago
8 0

Answer: Lack of security Websites and online services that don't have the latest and most robust security, can effectively leave the information they might hold on you and the data flowing between your computer and a web server, at risk from hackers.

The fact that everything is now done/posted/shared online is a big threat to anyone's personal info.

-Hope this helped :)

Oxana [17]3 years ago
6 0
The internet is the biggest threat.
You might be interested in
The Linux operating system is widely used in industry, especially for servers. Why do you believe this is the case?
Anit [1.1K]

Answer:

Asking why Linux is used as a server operating system? It has many advantages

Explanation:

1. Linux has very small kernel footprints

It can be on a USB, embedded system and the like.

2. Requires very little hardware resource to run.

Building on the first point, Linux dos not need much jard ware resource to run implying it can be run on outdated CPUs, a low RAM size, small disk space and it would be possible - doesn't matter with Linux - bar the effect on performance.

3. Linux runs 80% of the Internet today

4. It's free

...... and so much more.

- Reference: Andrew Holcomb, Quorate

How Linux compares with other OS - like Windows or Mac?

May Help:

https://www.quora.com/What-are-the-advantages-of-Linux-as-a-server-operating-system

Recommendation: Jason Montoya and Glen Becker, BI Analyst, SAS Expert

6 0
3 years ago
When configuring a vpn server to automatically assign ​ip addresses to remote clients, how many ip addresses are in a single poo
xz_007 [3.2K]
<span>When configuring a vpn server to automatically assign ip addresses to remote clients, how many ip addresses are in a single pool allocated by the vpn server?
Answer: 10</span>
5 0
4 years ago
Which of the following programs can open a bitmap file?
choli [55]
Windows paint can be used to open a bitmap file. Usually, when you have a picture, you can use that to edit it.
Also, on a side note, notepad is specifically used for html codes. 

Answer: Windows Paint
4 0
4 years ago
Read 2 more answers
When an EC2 instance is being modified to have more RAM, is this considered Scaling Up or Scaling Out?
Nastasia [14]

If an EC2 instance is being modified to have more RAM, this is known as Scaling Up.

<h3> What is EC2 Auto Scaling?</h3>

The Amazon EC2 Auto Scaling is known to be a type of fully well handled service that has been set up to launch or hinder Amazon EC2 instances automatically.

It is often made so as to help make sure that people have the correct number of Amazon EC2 instances that is available to manage the load for their  application. To scaleup is to bring up.

Learn more about RAM from

brainly.com/question/13196228

7 0
3 years ago
Good HTML skills will be required in order to prevent what from happening in the design of a web page?
Verizon [17]

Answer:

to properly use the tags in the web page

Explanation:

The full form HTML is Hyper Text Mark up Language. HTML is used in designing a good web page in the computer. It is used to design the document that are displayed in the web browser.

Instead of using a programming language to do the functions of a web page, the markup language uses the tags to identify the different types of the contents and purposes that they serve in the web page. A good HTML skills are required to prevent the web page from any improper designing of the contents in the web page.

5 0
3 years ago
Other questions:
  • How will you be assigned with a mailbox with any OSP
    6·1 answer
  • HELPPP ASAPP
    8·2 answers
  • Write a note on secondary storage​
    14·1 answer
  • What output is produced by the following program segment? Why? (Recall that name.charAt(i) is the i-th character in the string,
    11·1 answer
  • 6-3.1 After visiting a large number of Web sites to complete your research for a lengthy research paper, your computer begins to
    14·2 answers
  • You've just purchased 10 new notebook systems for your users. You are concerned that users will leave the systems on for long pe
    10·1 answer
  • Question # 4
    8·2 answers
  • Visual-verbal synergy has nothing to do with text, but solely with images used in a design.
    9·1 answer
  • Ayuda necesito 7 objetos que se utilizan en la vida diaria
    8·1 answer
  • Pleaseee helpppppppppp
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!