1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill115 [55]
2 years ago
9

How can you reduce the Impact of Hacking? pls help with this <3​

Computers and Technology
1 answer:
sergeinik [125]2 years ago
3 0

Answer:

Explanation:

To reduce the impact of hacking firstly dont ever give anyone your PASSWORD even to ur friends coz one day they can snake u off and use ur personal email/accounts.Try to use websites which are protected from hackers and anti-virus.Never use your personal details if u do make sure u write the user/password in a save place and LOG OUT your accounts when ur not using them.If u have a child you should install i child protecting apps.And make sure you block all anonymous websites/browsers/apps.Dont leave personal information on websites just to stay on the safe side.

Hope this helps

You might be interested in
Which document would most likely be written in an informal style?
Masteriza [31]

Answer:

An advertisement for sportswear

Explanation:

An advertisement for sportswear would most likely be written in an informal style.

6 0
3 years ago
Which option describes wearable technology?
kotykmax [81]
My opinion is the answers A and D. I would choose A if you can only choose one, though.
7 0
3 years ago
Read 2 more answers
Younger people haven’t established brand loyalty the way older people have
krek1111 [17]
What’s your question?
6 0
3 years ago
Electronic files created on a computer using programs such as Word software are considered to be _____.documents icons media sav
Rudiy27
Documents. Note that electronic document is a type of media too.
5 0
3 years ago
Answer this and you get free 100 points
Agata [3.3K]

Answer:

thanks my dude I needed it

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which of these can expose a computer to a virus? Check all that apply.
    9·2 answers
  • What type of topology gives you a direct connection between two routers so that there is one communication path?
    14·1 answer
  • Laura is confused with the spelling of the word pronunciation. She types the word pronunciation. Which feature of the auto corre
    8·2 answers
  • Which is the process that a wireless router uses to translate a private ip address on internal traffic to a routable address for
    14·1 answer
  • Project manager George is defining project management to his team. How should he define project management in one sentence?
    7·1 answer
  • The _____________computer function accepts data from input devices and sends it to the computer processor.
    11·1 answer
  • To generate a series of first ten counting number of algorithm​
    9·1 answer
  • Describe accessibility in Windows 7 ​
    13·1 answer
  • explain why the database system would not allow a tuple to be inserted into the database through this view
    12·1 answer
  • Create a program that prompts the user for a positive integer then prints a right-aligned pyramid using that number using the st
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!