1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
9

Which of the following activities poses the greatest personal cybersecurity risk?

Computers and Technology
2 answers:
schepotkina [342]3 years ago
7 0

Answer:

a

Explanation:

edge

tangare [24]3 years ago
4 0

Answer:

The answer Choices where

A)Making a purchase at an online store that uses public key encryption to transmit credit card information.

B) Paying a bill using a secure electronic payment system.

C)Reserving a hotel room by emailing credit card information to the hotel.

D)Withdrawing money from a bank using an automated teller machine.

Explanation:

By emailing the credit card information, that person has access to using the credit card in many different ways that are harmful. It would be best to meet up with them and scan it or pay via paypal or other money services.

You might be interested in
How many base cases are in the functionabove?
baherus [9]

Answer:

The answer is (b). 1.

Explanation:

In the code there is only 1 base case .

the base case is as following:-

if(n==0)

return 0;

this is the base case.

Base case is the most important statement in the function that uses recursion because without base case the recursion calls will keep on going and we will get a run time error.

5 0
3 years ago
Once we have reached complete efficiency in the third part of the LRAS Curve, what occurs?
sergiy2304 [10]

your answer is c hope this helps


8 0
4 years ago
Is anyone familiar in drawing flow charts for c++ programming
Elina [12.6K]
Yes, but I use Unreal Engine

3 0
3 years ago
To remove an embedded chart, you should _____ it and press the DELETE key. (Points : 2) move drag hide click
Readme [11.4K]
I think the answer would be "click" 
3 0
3 years ago
What is a file manger ? The file manger is user A . Medium B.platform C. Interface .
zysi [14]

Answer: C. Interface.

Explanation:

File manager is an interface between the hardware part of a computer and the software. the main function of a file manager is to help the user manage all files which they have stored up on their computers. for example the file managers allows the users to view, copy, delete and edit the files which they have stored up on their computer storage devices.

5 0
4 years ago
Other questions:
  • What is the primary purpose of a business plan? To file for incorporation To help you identify your goals and plan how you will
    6·1 answer
  • An operating system is an example of _______. The hard drive, keyboard and monitor are example of_______.​
    11·1 answer
  • A production house needs an operating system that captures, saves, and generates information within specific time. Which type of
    13·2 answers
  • The email program shipped with Microsoft office
    15·1 answer
  • Explain the concept of scalability. How would you respond?
    15·1 answer
  • Suppose for the worst case, given input size n: Algorithm 1 performs f(n) = n2 + n/2 steps Algorithm 2 performs f(n) = 12n + 500
    6·1 answer
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    11·1 answer
  • It means fruit- trees garden.
    8·1 answer
  • Utility software includes which of the following ? <br> Select all that apply
    10·1 answer
  • Which very high-speed fiber network was already in place and being used for wide area networking (wan) transmissions, before the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!