1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
10

What happen if there is no authentication??

Computers and Technology
2 answers:
creativ13 [48]3 years ago
7 0

Answer:

anyone could access something and hack others

Explanation:

Luda [366]3 years ago
4 0

Answer:

without it you wont have privacy or your password or any otter security's will be exposed by them hacking as well.

You might be interested in
What is the main function of the motherboard?
djyliett [7]

Answer: The MotherBoard is an essential component or part of a computer. It includes some of the important parts which are CPU, memory, connection of inpit and output devices.

Explanation:

5 0
4 years ago
One disadvantage of using the styles feature of a word processor is that you cannot modify existing styles. true or false
gayaneshka [121]
I think its false
but im not possitive

8 0
3 years ago
Which of the following is another type of brake system used in trucks
Doss [256]

answer is d hope it helps

4 0
3 years ago
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
Which allows for saving a setting on one device and having the setting synchronize to other devices? Choose two answers.
barxatty [35]

Answer:

Bookmarks

Calendars

Explanation:

In Android devices we could save some information and then share if we use sync, we case save Bookmarks and Calendars, in addition, we could save other data like:

  • History and open tabs
  • Passwords
  • Payment info  
  • Addresses, phone numbers and more
  • Settings and preferences

Also, if you don't want to save any data in your device, you can Turn off Sync everything.

3 0
4 years ago
Other questions:
  • Match the job skills with the correct job role.
    12·1 answer
  • What setting must be enabled to view data in Demographics and Interests Reports? Content Grouping Advertising features User perm
    13·1 answer
  • Classify the following skills: communication, creativity, and independence.
    15·1 answer
  • What are Manuscript signs​
    8·1 answer
  • 1
    7·1 answer
  • Why do some people have random numbers as their usernames?
    9·2 answers
  • This is my paragraph . The type of color is ude in this code line is ..............................
    5·1 answer
  • Ramesh goes to market for buying some fruits and vegetables .He
    14·1 answer
  • Who is known as the first computer programmer?​
    13·1 answer
  • How to add a legend to a graph in excel?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!