1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gwar [14]
3 years ago
9

using unsafe sites may be a. harmful to your computer c. okay as long as you don���t leave any personal information b. okay as l

ong as you leave the site within 5 minutes d. harmful to the site���s own computers
Computers and Technology
2 answers:
ra1l [238]3 years ago
7 0
You can get viruses/malware off it no matter how quickly you're off the site which can cause harm to your computer. 
statuscvo [17]3 years ago
5 0

Answer:

a. harmful to your computer

Explanation:

There are several risks involved in using a browser. Among them, we can mention:

- Execution of JavaScript or hostile Java programs; - execution of hostile ActiveX programs or controls; - obtaining and executing hostile programs on untrusted or fake websites; - access to fake websites, impersonating banking or e-commerce institutions; - Business or banking transactions via the Web, without any security mechanism.

You might be interested in
A technician would like to have the ability to add physical hard drives to a Storage Spaces storage pool at future times on an a
zavuch27 [327]

Answer:

b. Thin provisioning

Explanation:

Thin provisioning is a storage space feature that makes allocating disk storage space flexible based on the space needed by each user, it improves the way storage space is utilized.

4 0
3 years ago
In an object-oriented approach, functions used to carry out subtasks are also called ____.
kotegsom [21]
<span>In object-oriented approach, functions used to carry out subtasks are also called "helper" functions, because they are usually used by other functions in the object to complete "sub-tasks". Functions are also known as â€methods’. When the task to be carried out by an object is complicated, it is preferable to break it into subtasks or subroutines. It is accomplished by helper functions. They may or may not accept data and may or may not return a value.</span>
6 0
4 years ago
Which part holds the "brains" of the computer?
NeTakaya

The central processing unit or CPU

Explanation:

A CPU is a chip containing millions of tiny transistors

5 0
3 years ago
You are in charge of five software development projects. The ‘characteristics’ of each of your projects are as follows:
Tasya [4]
Pano po gagawen Jan?
8 0
3 years ago
Programmers use _____ languages in the Rapid Application Development (RAD) methodology to facilitate code reuse?
photoshop1234 [79]
The Go programming language
8 0
3 years ago
Other questions:
  • You have been tasked with finding the routers that have been installed between two networks. what utility would you use to provi
    5·1 answer
  • Decrypt the message OPEHHISTLWILKWPR which is the cyphertext produced by encrypting a plaintext message using the transposition
    14·1 answer
  • PP 11.1 – Write a program that creates an exception class called StringTooLongException, designed to be thrown when a string is
    14·1 answer
  • The person who Oversee the direct work of employees and is responsible for the day-to-day tasks the employees complete is likely
    7·2 answers
  • __________ is software that comes hidden in free downloadable software that tracks online movements, mines the information store
    14·1 answer
  • How to add running head and page number in word?
    5·1 answer
  • You are planning the requirements for a site tracking and reporting system for your company Web site. Which of the following inf
    10·1 answer
  • Mrs. Brown is a teacher at the elementary school. As the school year begins, she sends a couple of email messages to her student
    11·1 answer
  • You work part time at a computer repair store. You are in the process of building a new computer system. The customer wants a mo
    6·1 answer
  • What are the fundamental activities that are common to all software processes?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!