1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnoma [55]
3 years ago
9

Internet Security: How can you work securely on the internet? What actions should be avoided and what are the pitfalls?

Computers and Technology
1 answer:
Cerrena [4.2K]3 years ago
8 0

Answer:First of all, to work safely at the internet you should avoid any not secure page, and if you can’t do that, avoid entering stuff such as credit cards or passwords on this sites. Now, to work safely it’s recomendable to have a VPN(virtual private network), that hides your IP direction.

Explanation:

You might be interested in
Which is the correct formula to add the values in cells A1 and B1? A. SUM(A1+B1) B. =SUM(A1+B1) C. =SUMA1+B1 D. A1+B1
galina1969 [7]
D I'd the answer to the problem
4 0
3 years ago
Read 2 more answers
To resolve a domain name on the internet, the dns resolver first contacts:
777dan777 [17]
If it can't find the answer in it's own cache, it will contact one of the name servers that it was configured to use.
8 0
3 years ago
Which event represents an example of social media being used in an
Semmy [17]
Hello!

The answer is:
-D. Communication with friends and family after other systems were disabled by a major earthquake.

I hope this helps you! :)
7 0
2 years ago
When would you insert a merge field?
lutik1710 [3]

Answer:

Once you have a data source connected to your document, adding merge fields is a way to personalize a document with information from the data source.

4 0
3 years ago
Read 2 more answers
A man receives a fraudulent email from his bank asking him to confirm his user name and password by going to a particular websit
bonufazy [111]

Answer: The man's info has been found and a hacker was trying to make him confirm his passwrd so he can get a hold of it to hack the man further.

Explanation:

3 0
3 years ago
Other questions:
  • Under the Right to Know Rule, employers need to include information on which one of the following in a written and complete haza
    5·1 answer
  • How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
    15·1 answer
  • When a module is executing what happens when the end of the module is reached?
    10·1 answer
  • vehicles power system is disabled as the result of a collision, can an ACN system using a paired cell phone work to notify a PSA
    7·1 answer
  • Secure shell (SSH) operates over which port by default
    9·1 answer
  • How many of yall are willing too sub to my channel called "Space Juice" with around 200 subs?!​
    6·1 answer
  • describe the impact of technology in your life . how does it affects your human relations with other people .​
    12·1 answer
  • If Jake wants to find out if the size of a fruit has any effect on the total sales for the week of that particular fruit, what c
    15·1 answer
  • How does computer science play a role in art?
    6·1 answer
  • kidede secondary school in Kotido district has been selected to participate in the final continental debating competitions with
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!