1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dmitriy555 [2]
3 years ago
7

3. Never

Computers and Technology
2 answers:
hjlf3 years ago
6 0

Answer:

\color{Blue}\huge\boxed{Answer}

B.Refuse

Rasek [7]3 years ago
5 0

Answer:

Never <u>reply</u><u> </u>to any instant messages, phone call, video call, or screen staring requests from someone you do not know.

Hope it helps u ARMY!!

You might be interested in
Which type of operating system is usually used in personal computers?
jeyben [28]

Answer:

A GUI based operating system is usually used in personal computers

Explanation:

The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux. Modern operating systems use a graphical user interface, or GUI (pronounced gooey).

4 0
3 years ago
NEED HELP NOW 25 POINTS!!!!!!
Ahat [919]
3. ram
idk what #4 is but i hope this helps


7 0
3 years ago
Read 2 more answers
I am a bunch of large LANS spread out over several physical locations. Who am I?
Ivan

Answer:

You're WAN

Explanation:

Wide Area Network

8 0
3 years ago
The use of present and past tenses​
brilliants [131]

Answer:

The past is used to describe things that have already happened (e.g., earlier in the day, yesterday, last week, three years ago). The present tense is used to describe things that are happening right now, or things that are continuous.

Explanation:

7 0
3 years ago
You are the security analyst for your organization and have discovered evidence that someone is attempting to brute-force the ro
cluponka [151]

This type of attack can be classified as an active attack.

<h3>The classification of attacks.</h3>

In Cybersecurity, there are four (4) main types of attacks and these include the following:

  • External
  • Passive
  • Inside
  • Active

In this scenario, the type of attack being experienced by the security analyst is an active attack because it was discovered that someone attempted to brute-force the root password on the web server.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

3 0
3 years ago
Other questions:
  • What X coordinate does the center of a game begin at?
    9·1 answer
  • Wright a 3 paragraph 5 sentences per graph story bout computers or the internet
    6·1 answer
  • In Broadbent's filter model of attention, the stages of information processing occur in which order?
    9·1 answer
  • You are about to install a new USB camera on your Linux system and you realize that there is no device special file available fo
    13·1 answer
  • What animal does maleficent transform into in order to defeat prince phillip?
    13·2 answers
  • What is the world first mobile phone brand​
    5·2 answers
  • 5. The operating system has two components
    12·2 answers
  • Write a python program to find factorial, use exception handling and display an appropriate message if the user inputs alphabets
    7·1 answer
  • Which of the following statements describes the general idea of an assistive media​
    7·1 answer
  • 1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!