1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harrizon [31]
3 years ago
10

How can you have a safe browsing experience?

Computers and Technology
2 answers:
makkiz [27]3 years ago
5 0

Answer: Disable automatic completion of username and passwords or  Select the option to delete cookies when you close the browser.

Explanation: The rest aren't safe. If it's a one choice go with Disable automatic completion of username and passwords

Romashka [77]3 years ago
4 0
A or D but auto completion is probably what I would go with
You might be interested in
Computers store all characters as numbers stored as binary data. Each instruction or symbol gets a bit string assignment. The st
juin [17]

Answer:

0 and 1

Explanation:

Please mark brainliest

7 0
3 years ago
A slide in Blake's presentation contained the following information:
deff fn [24]

Answer:

consistent phrasing is missing

Explanation:

If you will note carefully, the bullets are not in correct format. The model is missing. The correct one is as below.

Risks

The correct form of presentation is as below:

1. Risks

a. employees  

              a. physical illness

              b. mental illness

              c. death  

2. Customers  

              a.   complaints

              b.   downtime

3.  Benefits

However, the content seems to be complete now, and hence not anything else is required. And since its not something very tough to decide to go with, bite the bullet is certainly not an issue.  

3 0
3 years ago
What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet
Luden [163]

Answer:

Explanation:

Asymmetric cryptography, is a cryptographic system that uses two different types of keys both public and private keys. Symmetric cryptography on the other hand uses the same type of key for both encryption. The benefit of using a combination when transferring data across the internet is that Asymmetrical cryptography is necessary to establish a secure connection while symmetrical cryptography can enhance the speed of the data transmission after connection has been established, thus both provide a unique benefit.

7 0
4 years ago
What are some advantages and disadvantages of streaming and downloading?
stepladder [879]

Answer:

Pro Cons

It is possible to download legitimate music files that do not include DRM and so makes it easier for you to listen to your tracks on different devices. The file may include DRM protection that you were not expecting when you joined the service. Read the fine print.

Explanation:

7 0
3 years ago
What is prototyping in system design phase? Under what condition this approach is most suited? Also what is the disadvantage of
Novay_Z [31]
Prototyping refers to the process of developing prototypes. Prototype model is most suitable for use when the desired system requires a lot of interaction with the end users. One of the disadvantages of prototyping is the extra funds that is spent on the development of the prototypes. Another disadvantage is the accuracy of the prototype. 
8 0
3 years ago
Other questions:
  • A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. zombie
    15·1 answer
  • The structure of a language has five different components: __________ refers to the smallest unit of meaning in a language, wher
    12·1 answer
  • How do graphic designers showcase their work?
    14·2 answers
  • What are personal skills?
    5·1 answer
  • Describe the basic features of the relational data model and discuss their importance to the end user and the designer. Describe
    9·1 answer
  • True or False: Wire service provide tabloid news reports to media outlets.
    12·1 answer
  • Suppose that the performance measure is concerned with just the first T time steps of the environment and ignores everything the
    14·1 answer
  • NEXT
    15·2 answers
  • It is used to loosen or tighten slotted screws. * 1 point A. Hex Driver B. Torx Screwdriver C. Philips Head Screwdriver D. Flat
    13·1 answer
  • Write a function that receives a one-dimensional array of integers and returns a Python tuple with two values - the minimum and
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!