1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreyy89
3 years ago
9

Ad identifies and describes at least four ways to prevent downloading of spyware, adware, and viruses to computer

Computers and Technology
1 answer:
Mashutka [201]3 years ago
6 0
Four ways to prevent downloading of spyware, adware, and viruses are:
Antivirus tools
Knowing whether sites are safe or not
Not falling for scams or phishing attempts
Not granting remote access to non-trusted people.
You might be interested in
What are the commands used in windows 2012 to mount the nfs share on the linux server?
mestny [16]
Mount -o mytype=hard
5 0
3 years ago
What are some of the issues that organizations need to be aware of when designing and managing data?
tensa zangetsu [6.8K]

Answer and Explanation:

There are two primary issues.  

The principal issues is Security of data or information.

The information must be overseen such that it is upheld up regularly and kept secure from any catastrophic event or outer hacking.  

Second, when planning a framework to oversee information, we have to make it versatile and adaptable.

The data should be scalable , i.e., the component used to store the information must be effectively ready to develop as we collect more information or the sort of information contribution to the framework needs to change after some time.

7 0
3 years ago
Security controls are measures taken to protect systems from attacks on the integrity, confidentiality, and availability of the
Delvig [45]

Answer:

The correct option is D: Administrative controls

Explanation:

Administrative controls are also known as work practice controls and involves changes in the procedure of work such as rules, schedules, policies, training etc, with the intention of cutting down to the barest minimum incidence, duration, and the graveness of exposure to situations or chemical that constitute a hazard. Drug screening test would be to ensure that the employee is fit to work and does not form a hazard and thus is an administrative control.

4 0
3 years ago
What is the phase of a waveform ?
allsm [11]

In sinusoidal functions or in waves, "phase" has two different, but closely related, meanings. One is the initial angle of a sinusoidal function at its origin and is sometimes called phase offset or phase difference. Another usage is the fraction of the wave cycle that has elapsed relative to the origin.

6 0
3 years ago
What's the biggest security issue with using social networking sites to market your listings?
Savatey [412]

The biggest security issue with using social networking sites to market your listings is Criminals may use social networking sites to identify your personal data.

<h3>What is a social marketing site?</h3>

A social marketing site is a site where people from around the world are connected in one place and share their thoughts and photos and other data.

The social sites are on the internet and there is a chance of stealing data and it identity theft, phishing, online predators, internet fraud, and other cybercriminal attacks are also some risks.

Thus, the largest security concern with using social networking sites to sell your listings is that thieves could use these sites to find personal information about you.

To learn more about social marketing sites, refer to the link:

brainly.com/question/15051868

#SPJ4

6 0
1 year ago
Other questions:
  • The analog signals that carry analog or digital data comprise composites built from combinations of simple sine waves.
    12·1 answer
  • A ____ client locates all or most of the processing logic on the server.
    11·1 answer
  • If your problem is caused by a bad hardware or software installation and you get an error message the first time you restart the
    6·1 answer
  • Between Handshake protocol, change cipher suite, alert and appplication data protocols, the first one to use is:
    13·1 answer
  • ON QUIZ PLEASE HELP
    13·1 answer
  • What are the four common tags used on webpages?
    11·1 answer
  • I will upvote....
    10·1 answer
  • Monitors display images by using a grid made up of millions of tiny dots, called ________.
    13·1 answer
  • Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to be availabl
    5·2 answers
  • What does IDLE stand for
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!