1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
7

If you were required to give a speech identifying the risks of using computers and digital devices, which group of items would y

ou include?
Computers and Technology
1 answer:
Ulleksa [173]3 years ago
3 0

Camera and Mic

These 2 things are the most likely things to get you in trouble. Unless you have a 100% protected device, and honestly even if you do, cover up the camera and close your mic. This will definitely save you later.

You might be interested in
College entrance requirements are the expectations for admission.
qwelly [4]

College entrance requirements are the expectations for admission.

O A. only

O B. least important

O C. maximum

O D. minimum

<h3>D.Minimum</h3>

College entrance requirements are the <u>minimum</u> expectations for admission.

6 0
3 years ago
A man-in-the-middle attack or impersonation are likely to result in problems with
Ivan

Answer:

Data Confidentiality

Explanation:

A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.

6 0
3 years ago
A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to
ArbitrLikvidat [17]

Answer:

A virtual privte network is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.

5 0
2 years ago
How many pieces are there in a normal laptop??? Good luck and solve carefully
polet [3.4K]

What do you mean pieces? Like Laptop components? If so then motherboard,ram,cpu, and psu for a basic laptop so 4 I guess (5 if you want to include a gpu).

4 0
3 years ago
Jason wants to set up his Wi-Fi’s security. He cannot install a central server for authentication. However, he wants to use a pr
jolli1 [7]

Answer:

Answer = a ig

wpa. ig ig ig ig

4 0
3 years ago
Other questions:
  • Var cookie = "username=mike2009";
    10·1 answer
  • Device that converts sound into electrical signals, which are sent to the computer or other recording device
    6·1 answer
  • Jason is working on a project that requires him to manage a huge amount of data. The spreadsheet he is working on has data relat
    12·1 answer
  • 5. Drawing Conclusions If you were a person in
    10·1 answer
  • Which precaution should be taken when working inside computer systems??
    9·1 answer
  • Write a Java program that generates GUI (Graphical User Interface). Your program should provide labels and textfields to a user
    9·1 answer
  • What is the meaning of 4 8 15 16 23 42?
    14·1 answer
  • Web design and development tools
    13·1 answer
  • What is pollution?
    14·2 answers
  • Say true or false
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!