1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulijaS [17]
2 years ago
5

Meg logs into her email account without entering her user ID and password manually every time. She also finds results from searc

h engines that are relevant to the place where she lives. Meg is aware that her personal information is not safe. What steps should Meg take for a safer browsing experience?
Meg should disable
of sensitive information such as her username and passwords. She should also disable the option to track her
in her web browser.
Reset
Computers and Technology
1 answer:
lianna [129]2 years ago
7 0

Answer: auto completion

Location

Explanation:

Based on the information given, Meg should disable (auto completion) of sensitive information such as her username and passwords and she should also disable the option to track her (location) in her web browser.

When auto completion is disabled, then she will have to enter her user ID and password manually every time she wants to login. Also, disabling the option to track her location will help in safeguarding her personal information.

You might be interested in
if a user has one column in a table and would like to make it into two columns which command should be used
BlackZzzverrR [31]
Don't know asdfghjklpoiuytrewqzxcvbnm,
4 0
3 years ago
Which is true about lists and stacks?
frutty [35]

Answer:

A. list are first in first out and stack are just a special case

<h3>hope this helps!</h3>
4 0
3 years ago
Want to.learn about computers​
MAVERICK [17]
Yes...I do want to learn about computer
6 0
3 years ago
The _______ valve protects the air pump from reverse-exhaust pressure.
alexandr402 [8]
D. The answer for this is the gulp
7 0
3 years ago
If you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use o
Colt1911 [192]
Hello  <span>Abigailguzman6347</span><span>


</span>Answer: If you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use of "unique index" and "not null" constraints.

Hope This Helps!
-Chris
6 0
3 years ago
Other questions:
  • What two images did you have to add to the wds server to handle the windows installation?
    7·1 answer
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 100. Follow each number w
    8·1 answer
  • Hybrid protocol is similar to which other protocol?
    10·1 answer
  • A professional bureaucracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of p
    7·1 answer
  • A prime number is an integer greater than 1 that is evenly divisible by only 1 and itself. For example, the number 5 is prime be
    11·1 answer
  • 5 negative impacts of digital life Explain
    9·1 answer
  • How does a Cloud-first strategy approach a client's migration to the Cloud?
    11·1 answer
  • There is a file of a few Sean Connery movies on the internet. Each entry has the following form:
    9·1 answer
  • Is a dot matrix printer an impact or non-impact printer
    12·2 answers
  • Unscramble the given word and identify the correct statement about it. ATTEPLSR
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!