1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
9

Which of the following activities poses the greatest personal cybersecurity risk?

Computers and Technology
2 answers:
schepotkina [342]3 years ago
7 0

Answer:

a

Explanation:

edge

tangare [24]3 years ago
4 0

Answer:

The answer Choices where

A)Making a purchase at an online store that uses public key encryption to transmit credit card information.

B) Paying a bill using a secure electronic payment system.

C)Reserving a hotel room by emailing credit card information to the hotel.

D)Withdrawing money from a bank using an automated teller machine.

Explanation:

By emailing the credit card information, that person has access to using the credit card in many different ways that are harmful. It would be best to meet up with them and scan it or pay via paypal or other money services.

You might be interested in
RDBMS stands for_________________
Aliun [14]
The term "RDBMS" stands for <span>relational database management system. 

I hope this helped! :)</span>
4 0
3 years ago
What adaptation Judy and her parents have that help them run from predators coming?​
Elza [17]

Answer:

.57

Explanation:

3 0
3 years ago
What is used to configure data sources for applications that require access to a database?
Radda [10]
A network is used to configure data sources for applications that require access to a database?
6 0
3 years ago
Let's revisit our lucky_number function. We want to change it, so that instead of printing the message, it returns the message.
maksim [4K]

Answer:

Replace the first blank with:

message = "Hello " + name + ". Your lucky number is " + str(number)

Replace the second blank with:

return message

Explanation:

The first blank needs to be filled with a variable; we can make use of any variable name as long as it follows the variable naming convention.

Having said that, I decided to make use of variable name "message", without the quotes

The next blank is meant to return the variable on the previous line;

Since the variable that was used is message, the next blank will be "return message", without the quotes

3 0
3 years ago
Smallest kind of computer
jeka57 [31]
I don’t know if i’m right but like Michigan Micro Mote ?
3 0
2 years ago
Read 2 more answers
Other questions:
  • Naseer has inserted an image into his document but needs the image to appear on its own line.
    14·2 answers
  • You have a site (Site1) that has about 20 users. For the last few months, users at Site1 have been complaining about the perform
    9·1 answer
  • A block style business letter is
    14·1 answer
  • Which type of programmer designs programs for applications executed on the internet?
    10·1 answer
  • 3-Write a program in some language that has both static and stack dynamic local variables in subprograms. Create six large (at l
    9·2 answers
  • Write a program that prints the day number of the year, given the date in the form month-day-year. For example, if the input is
    9·1 answer
  • Write a program that asks the user to enter the size of a triangle (an integer from 1 to 50). Display the triangle by writing li
    14·1 answer
  • several ways that we commonly use technology today that people couldn't 10 years ago. Are these uses helpful or harmful to socie
    9·1 answer
  • Which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data
    12·1 answer
  • I am a non-volatile type of built-in memory. I store my contents long-term. My job is to store critical programs that the comput
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!