1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
3 years ago
7

Identify at least three tips you would give to people to stay safe on the Internet so that their information stays secure. Expla

in why these tips are useful.
Computers and Technology
2 answers:
Soloha48 [4]3 years ago
7 0

Answer:

1. Do not give away personal information such as your address, school you go to, or anything like that (obvious reasons

2. Do not share your passwords because people can hack into your things

3. Don't make guessable passwords such as Cookies, ILovePizza, Money

AveGali [126]3 years ago
4 0
1. Never give out your address, phone number, school name, etc.
This can lead to so many bad things. To protect yourself and others around you, don’t share your personal information to people you don’t know or trust.

2. Don’t add people on social media that you don’t know. I know a lot of people have public accounts and I’m not saying thats bad, but I am saying that you need to be careful on who’s adding you. There are a lot of creepy people out there.

3. Never open links people send you. If someone sends you a link online, it’s best to not open it. This opens up a whole new world for creeps to mess with you. They can track you, give you a virus or viruses. Never open random links that random people send you.
You might be interested in
Place the steps in order for adding an additional email account in outlook
Zielflug [23.3K]

Answer:

Give Thanks to JessicaRoberts715

1. Click the file tab

2. Click the add account button

3. Type the account information

4. Outlook will auto-configure the account

5. A new account appears in the folder list

6 0
3 years ago
If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls for applying soc
katrin2010 [14]

Answer:

Baiting. As its name implies, baiting attacks use a false promise to pique a victim's greed or curiosity. ...

Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. ...

Pretexting. Here an attacker obtains information through a series of cleverly crafted lies. ...

Phishing. ...

Spear phishing

Explanation:

thank me later

7 0
3 years ago
A systemic approach to creating and ensuring channel fluidity in the flows of goods and services through shared information, com
likoan [24]

Answer:

Explanation:

The one which best describes it is Co-opetition. Co-opetition often takes place when companies which are in the same market work put aside their differences and work together in the gathering of knowledge and research of new products, but they still compete for market-share of their products and in the application of the joint knowledge created.

7 0
3 years ago
Read 2 more answers
These statements describe lists in presentation programs:
Law Incorporation [45]

Answer:

A

Explanation:

3 0
3 years ago
Read 2 more answers
Hat are the technical risks and the human risks for the ticktacktoe game
Ierofanga [76]

Answer:

 The technical risk basically occur due to some possible impact modification in the system and due to some technical problem or issue in the entire infrastructure.

Human risk are mainly occur due to the human interference. The technical and human risks are the two main types of risks for ticktacktoe game.

The different types of risks that occur are as follows:

  •  The operational risk
  •   Strategic risk
  •   Compliance risk
  •   Program risk

8 0
3 years ago
Other questions:
  • Which occupation requires certification by the state?
    15·2 answers
  • Proxy is a network computer that can serve as an intermediary for connecting with other computers.
    13·1 answer
  • When you start a browser, it automatically loads and displays a page from a web site. This is known as your ____. Class: compute
    9·1 answer
  • Which statement must be included in a program in order touse a deque container?
    6·1 answer
  • What is the output after running the following code snippet? int number = 600; if (number < 200) { System.out.println("Low sp
    15·1 answer
  • In the URL, what is the subdomain and what is the domain name?
    5·1 answer
  • Identify the type of error described
    6·1 answer
  • You designed a program to create a username using the first three letters from the first name and the first four letters of the
    6·1 answer
  • A network administrator wants to authenticate server machines using Transport Layer Security (TLS). What can the administrator i
    15·1 answer
  • What are two benefits of defining a function?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!