1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
3 years ago
9

State two security measures which should be observed to safeguard data against computer. viruses​

Computers and Technology
1 answer:
Klio2033 [76]3 years ago
3 0

Few things you could do.

Get an antivirus, paid or free I recommend McAfee

Use a firewall

Use a strong password

Dont click randoms links sent in emails

Back up your computer and its data just in case

I hope this helps!

You might be interested in
4. When emergency changes have to be made to systems, the system software may have to be modified before changes to the requirem
Vikentia [17]

Answer:

Incremental model

Explanation:

Incremental model is the best modification in older version are feasible and can be easily managed.

Incremental model involves the technique of developing soft ware in which the product is designed implemented and tested in stages until the product is finished. The term finished here means the product as meet all its requirement.

This model entails development as well as maintenance.

7 0
3 years ago
A ____ port is a connection in which eight data lines transmit an entire byte of data at one moment in time.​
harina [27]
A parallel port is a a connection in which eight data lines transmit an entire byte of data at one moment in time.
5 0
3 years ago
In India, the adoption of new telecommunication services was ____________ Select one: a. slow b. rapid c. frought with errors d.
irina1246 [14]

Answer:

The correct answer is letter "B": rapid.

Explanation:

Nowadays, India has become the second largest telecommunications network in the world. Phone and internet services are very low-price because of the vast number of competitors in the market. This scenario is boosted by the constant improvement technologies being implemented in the country in this matter such as better signaling gateways and fiber-optics. By the end of 2018, India had almost 20% of the world's share of internet users.

6 0
3 years ago
What is the difference between being an affiliate and an independent station ?what are the benefits to being an affiliate
katen-ka-za [31]

Answer:

So the difference is one does its own thing the other is someone who is working with another.The benifits are that if it is something good done you both get the reward the bad part is that if its bad then you both get in trouble for it.

Explanation:I hope this helps

6 0
3 years ago
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
Other questions:
  • most dialog boxes in windows programs requiring navigation follow a similar procedure. true or false.
    7·1 answer
  • What are 5 actions that you can do to take care of your camera
    14·2 answers
  • What is an efficiency target? Give an example of setting an efficiency target
    11·1 answer
  • Plz answer me will mark as brainliest ​
    7·2 answers
  • Why is it a good idea to understand what you are good at and what you enjoy
    11·2 answers
  • Which type of DNS zone resolves host names to IP addresses?
    8·1 answer
  • 3.<br>What is the meaning of *.VBP.<br>​
    6·2 answers
  • What is a common misconception about Agile and DevOps?
    9·1 answer
  • Which directory stores the cron configuration file?.
    8·1 answer
  • It's in Python, everything sort of explained in the image below,
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!