1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnoma [55]
3 years ago
9

Internet Security: How can you work securely on the internet? What actions should be avoided and what are the pitfalls?

Computers and Technology
1 answer:
Cerrena [4.2K]3 years ago
8 0

Answer:First of all, to work safely at the internet you should avoid any not secure page, and if you can’t do that, avoid entering stuff such as credit cards or passwords on this sites. Now, to work safely it’s recomendable to have a VPN(virtual private network), that hides your IP direction.

Explanation:

You might be interested in
Jax earned 144 points on a research project. In this situation, what is the number 144? Group of answer choices data information
fredd [130]

Answer: data

Explanation:

Data refers to symbols or numbers that aren't meaningful. It's an an individual unit which consists of raw materials. Data hato be interpreted in order to become meaningful. They are fact or figures. Examples of data include 24, London, 144 etc.

Information on the other hand is a data that has been processed. e.g. Bob has an aggregate score of 144. Based on the question given, the number 144 is a data as it isn't meaningful yet.

3 0
3 years ago
What can u access various sites on
Klio2033 [76]
Search engines. (I'm Misty btw if you want to know)
3 0
3 years ago
Katla is a project manager. One of the programmers on her team comes to her and says that he permanently deleted some code mista
Aleonysh [2.5K]

Answer:

Version Control - Maintains the code log history and changes overtime.

8 0
3 years ago
How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability
Tresset [83]
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
7 0
3 years ago
Smileys Pizzeria has a special on cheese pizza this month. 6- inch personal pizzas are $5, 10-inch small pizzas are $8, 14-inch
ValentinkaMS [17]

Answer:

THE PROGRAM IS ANEW ONE IT IS CALLED SMILEYS CHOOSER

Explanation:

4 0
3 years ago
Other questions:
  • Why is it a good idea to view your HTML code in more than one web browser
    13·1 answer
  • Kiaan wants to give people who attend his presentation a printed copy of the slides. Instead of printing one slide on each piece
    11·1 answer
  • Where would the information needed to start a computer be stored
    10·1 answer
  • How does technology improve convenience, but impact our privacy?
    8·1 answer
  • can you give me a tip to fix my SIM card becuaus when i put it on my phone it has no signal , can anyone fix this , thank you.​
    9·2 answers
  • Which of the following is not considered a system component that can be found inside a computer? A-CPU B-RAM C-PCIe graphics ada
    6·1 answer
  • Universal Containers has two customer service contact centres and each focuses on a specific product line. Each contact centre h
    7·1 answer
  • Write a program that accepts two integers from the user and perform one of the four arithmetic operations based on user’s choice
    11·1 answer
  • Risk taker positive or negative​
    8·1 answer
  • After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!