1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin [286]
3 years ago
13

Liam noticed someone had accessed his social media account and made several posts without his knowledge. Which of the following

practices will keep unauthorized users from gaining access to his online accounts?
ITS DUE TODAY I WILL MARK YOU BRAINLIEST YES I AM IN FLVS
Computers and Technology
1 answer:
jok3333 [9.3K]3 years ago
4 0

Answer:

Liam could

1) Change the password

Be sure to change the password to a "strong" one (containing lots of characters, numbers, symbols) so that way the password would be difficult to guess.

2) Avoid logging onto social media on public computers or WiFi connections.

Using public WiFi leaves you vulnerable to someone accessing your information through Internet traffic. If you do use public computers, just make sure to log out.

3) Avoid giving out account information to friends and avoid opening suspicious links and emails.

Opening suspicious links or emails could allow malware to infect your computer the moment you open them. Friends can unknowingly share these links that are designed to steal information.

I hope this helped <3 please lmk if there's anything more to add.

You might be interested in
Described the importance of developing strategies to conduct educational research.
melamori03 [73]

Step 1: Identifying a Problem.

2

Step 2: Reviewing the Literature.

3

Step 3: Specifying a Purpose and Research Questions. Writing purpose statements, research questions, and hypotheses provide critical direction to an educational research study. ...

4

Step 4: Designing a Study.

ecu

5 0
2 years ago
Transmission Control Protocol (TCP) arrives out of order. What allows the data to be put back together in the correct order?
Reptile [31]

Answer:

Reliability feature in transport layer ensures correct order.

Explanation:

TCP (Transmission Control Protocol) is a communication protocol over network. TCP has a layered architecture and transport layer controls the data transmitted arrives in correct form. This is called reliability feature.

Control data header at transport layer ensures correct delivery. It tracks the transmitted data and re-transmits in case of en error.

7 0
3 years ago
Read 2 more answers
Normalization works through a series of stages called normal forms. For most purposes in business database design, _____ stages
rusak2 [61]
I do believe it’s A.....
6 0
3 years ago
Read 2 more answers
The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
umka21 [38]

Answer: File History

Explanation: File history is the history that gets created in the form of back-up that keeps the record of the stored files. It is used in protecting the files  that is present on the system like desktop, libraries,etc.

It creates the duplicate records in the storage for any future use and it can also be restored easily.File history also facilitates with feature of deleting the unnecessary history afterward when the user wants.

6 0
3 years ago
WILL MARK BRAINLIEST AND WILL GIVE 100 POINTS!!!!!!!!!
yaroslaw [1]

i have learned that an excel spreadsheet can:

1. calculate the sums of many values within that sheet

2. sort values by title

3. format specific values to have different colors or highlights

4. form pie charts out of tables of data

5. make tables of data

6.  form bar graphs out of tables of data

7. calculate how many cells have numerical values within a set of data

8. change the width of cells

9. change the height of cells

10. fill a cell in with color

8 0
4 years ago
Read 2 more answers
Other questions:
  • Designing the moving parts of a car—including the engine, drivetrain, steering, and brakes—is done by what type of engineer?
    11·2 answers
  • Write a python program to calculate the compound interest
    7·1 answer
  • A user from the accounting department has contacted you regarding problems with a dot matrix printer. When you examine the outpu
    7·1 answer
  • Describe a new career in computer science that may be created in the future. Include supporting evidence in your response that s
    13·1 answer
  • Use of the Internet for recruiting is: a. popular with job seekers, but not recruiters. b. the most commonly used search tactic
    5·1 answer
  • Which type of styles can be applied to a word, phrase, or sentence?
    7·1 answer
  • Blanca is overwhelmed by all the things she has to do after school. How can she best manage her time more effectively?
    14·2 answers
  • Đất trồng có tầm quan trọng như thế nào đối với đời sống của cây:
    12·1 answer
  • What does error code 18 indicate?
    11·1 answer
  • What is pseudocode? O A way of describing a set of instructions in text form using plain english O A diagrammatic representation
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!