1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnoma [55]
3 years ago
9

Internet Security: How can you work securely on the internet? What actions should be avoided and what are the pitfalls?

Computers and Technology
1 answer:
Cerrena [4.2K]3 years ago
8 0

Answer:First of all, to work safely at the internet you should avoid any not secure page, and if you can’t do that, avoid entering stuff such as credit cards or passwords on this sites. Now, to work safely it’s recomendable to have a VPN(virtual private network), that hides your IP direction.

Explanation:

You might be interested in
Accenture has put together a coalition of several ecosystem partners to implement the principles of blockchain and Multi-party S
lutik1710 [3]

Answer:

They include;

1. MAAG Pump Systems,

2. Automatik Plastics Machinery,

3. Gala Industries,

4. Reduction Engineering Scheer,

5. Ettlinger Kunststoffmaschinen and

6. XanTec EDV- und Steuerungstechnik

Explanation:

The MAAG group consists of six companies specialized in different aspects of polymer production. They provide their services to petrochemical, pharmaceutical and food production companies. They produce pellets, gear pumps, filtration systems and components, pelletizers, etc.

They have more than 1000 staff and their offices are located in about 11 countries of the world.

8 0
2 years ago
False when you tap or click the ‘decrease font size’ button, excel assigns the next lowest font size in the font size gallery to
castortr0y [4]
That is actually true. In order to format the font, margins and alignment of a form you need to s<span>elect the control that you want to format, then right-click the selection, and then click Format Control. What you do next is that on the Font tab you select the font type, font style, font size, other formatting options for the selected text and in order to finish to press ok </span>
6 0
3 years ago
What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to acc
abruzzese [7]

Answer:   b. LDAP injection

Explanation:

LDAP (Lightweight Directory Access Protocol ) Injection is defined as

  • an injection attack used by attacker to exploit web based applications by inserting LDAP statements based on user input.
  • It may be possible modify LDAP statements through some techniques if an application fails to properly sanitize user input.

So,<u> LDAP injection</u> is the attack that allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information.

Hence, the correct option is b. LDAP injection.

4 0
2 years ago
What is the difference between DWT and CWT?
Alexeev081 [22]

Answer:

raspuns:

Explanation:

amandoua sunt cam la fel dar si diferite pe alte parti

4 0
2 years ago
The use of computers in education is referred to as computer assisted instruction (CAI). Write a program that will help an eleme
dybincka [34]
I don't think some will write the whole program here, but which part are you having trouble with?
6 0
3 years ago
Other questions:
  • Can a Web developer guarantee that data presented is valid? Why or why not?
    9·1 answer
  • Which topology enables only one person, at one time, to send data to others on the network?
    6·1 answer
  • Why would an IT technician ever have to change out a computer’s motherboard?
    5·2 answers
  • You are configuring IP settings on a new network. For the external interfaces, you decide to obtain registered IP addresses from
    5·1 answer
  • Which statement most aptly defines the term networking?
    8·1 answer
  • People are able to predict future events to some extent because: (Select all that apply)
    11·1 answer
  • One key feature of malware is that it:
    13·1 answer
  • True or False The two types of general construction projects are residential for homes or dwellings and commercial for a commerc
    7·1 answer
  • The term Linux Intrusion Detection System ( LIDS) refers to a command that allows an administrator to run processes as root with
    5·1 answer
  • ________ is the use of information technology to support the sharing of content among networks of users.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!