1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa86 [58]
3 years ago
11

Cookies contain information about you. This information, if not encrypted, could be viewed by a third party. The best practice t

o prevent this from happening is: ________-
Computers and Technology
2 answers:
yarga [219]3 years ago
6 0

Answer:

Decline I think

Explanation:

Lady bird [3.3K]3 years ago
5 0

Answer:

Delete Cookies When You Can And If You Can Get A VPN But If You Can Do It, If It Doesn't Look Real Dont Click On Random Websites That Get Your Cookies

Explanation:

You might be interested in
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
uysha [10]

Answer:

Security Tab is the correct answer.

Explanation:

The Security Tab will enable the users to authorize anyone to use that file or directory.Many clients deleted the security tab because After that nobody can alter the security privileges on the device.

  • With the help of the Security tab, we will minimize the ActiveX attacks on Internet Explorer. This option is available in the Internet Options of the dialog box.
  • Other options are incorrect because they are not related to a given scenario.
8 0
3 years ago
What would you do for 20 points
gulaghasi [49]

i would answer this with a stupid answer then ask you to answer my recent question :)

7 0
3 years ago
In Java code, the line that begins with/* and ends with*/ is known as?​​​​​​​​​​​​​​​​​​​
Rainbow [258]

Answer:

It is known as comment.

6 0
4 years ago
5. What is the number one cause of accidents in the classroom, office, and home?
sp2606 [1]

Answer:

Lack of safety in technology and structures.

4 0
3 years ago
Just answer the 2 questions. THX
pogonyaev

Answer:

A then D

Explanation:

3 0
3 years ago
Other questions:
  • How many channels are in an ISDN PRI connection?
    12·2 answers
  • Working in a meat factory packaging and shipping the meat deliveries falls into which agricultural cluster?
    7·1 answer
  • Is LTE faster than 4G?
    8·1 answer
  • Which of the following is a file on the host computer used for temporary memory storage when a sudden surge in memory requiremen
    9·1 answer
  • If a laptop is getting no power while plugged in, which hardware part often needs to be replaced?
    5·1 answer
  • Ethan is a systems developer. He is working on a system where he will implement independent solutions for different processes. W
    7·1 answer
  • Write an application program in C++ to implement a class Fibonacci to print Fibonacci series upto N using member function series
    9·1 answer
  • Write an algorithm to calculate the sum of integer ​
    7·1 answer
  • What are the objects in object-oriented programming language?
    8·1 answer
  • Mention three types of pipeline hazards​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!