1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
9

Which of the following activities poses the greatest personal cybersecurity risk?

Computers and Technology
2 answers:
schepotkina [342]3 years ago
7 0

Answer:

a

Explanation:

edge

tangare [24]3 years ago
4 0

Answer:

The answer Choices where

A)Making a purchase at an online store that uses public key encryption to transmit credit card information.

B) Paying a bill using a secure electronic payment system.

C)Reserving a hotel room by emailing credit card information to the hotel.

D)Withdrawing money from a bank using an automated teller machine.

Explanation:

By emailing the credit card information, that person has access to using the credit card in many different ways that are harmful. It would be best to meet up with them and scan it or pay via paypal or other money services.

You might be interested in
Which protocol, as a companion protocol to RTP, provides monitoring and reporting for RTP connections?
MrRa [10]
<span>The answer is Real Time Control Protocol (RTCP).   A companion to RTP, the RTCP provides monitoring and reporting for RTP connections.  It resembles the RTP but there are more alternate structures that depend upon the type of the RTCP packet.</span>
4 0
3 years ago
, how do you make this user <br> XtraCrispyIzzy<br> 12 characters or less for microsoft?
xxTIMURxx [149]

Answer:

Maybe take away the 'xtra'

8 0
2 years ago
What’s some WiFi passwords for some big brands that I can connect to while traveling?
Wewaii [24]

Answer:

download the app instabridge.

With Instabridge you get more than a million up-to-date WiFi passwords and spots on your phone.

7 0
3 years ago
____ port is a connection in which eight data lines transmit an entire byte of data at one moment in time.
yarga [219]
Hi!

This is going to be a <em>parallel </em>port. It <span>can send various bits of data concurrently using multiple data lines. 

Hopefully, this helps! =)</span>
4 0
3 years ago
Perform depth-first search on each of the following graphs; whenever there's a choice of vertices, pick the one that is alphabet
Vikki [24]

Answer:

See the table attached for complete solution to the problem.

7 0
3 years ago
Other questions:
  • Jameis is researching at his local library when he finds a perfect source to use in his paper. When he goes to check the book ou
    12·2 answers
  • Robert needs to apply formatting from one set of text to multiple other sets of text throughout the document. Which option shoul
    7·1 answer
  • Which kind of software allows users to draw pictures, shapes, and other graphical images with various on-screen tools such as a
    14·1 answer
  • In this challenge, write a function to add two floating point numbers. Determine the integer floor of the sum. The floor is the
    8·1 answer
  • Sandra is having difficulty with her reading assignment because she does not fully understand the language. Which online tool wo
    6·1 answer
  • A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
    8·1 answer
  • What does a page break do?
    13·1 answer
  • Virus program do not replicate themselves true or false one word answer only​
    15·2 answers
  • You are writing a program to help compare two sports teams. A sample member of the list scores is [2. 5] where your team scored
    5·2 answers
  • The unit we use to measure bending moment is...<br> A kg<br> B N<br> C Nm<br> D MPa
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!