1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anuta_ua [19.1K]
3 years ago
6

You can protect yourself from identity theft by using ____ when transmitting information over network connections. a. cookies b.

port-scanning c. biometrics d. encryption
Computers and Technology
1 answer:
Yakvenalex [24]3 years ago
5 0

Answer:

D

Explanation:

Encryption secures transmissions on the internet to or from your PC

You might be interested in
30points!!!! Plz answer quickly
stich3 [128]

Answer:

center

Explanation:

that is the focal point

3 0
3 years ago
Read 2 more answers
What is the best low end pc recording software​
julsineya [31]

Explanation:

democreator

D3DGear

nvidia shadow play etc

8 0
3 years ago
Read 2 more answers
The ________ of the operating system enables users to communicate with the computer system. modem window network adapter card us
Marysya12 [62]

Well Formatted Question:

The _______ of the operating system enables users to communicate with the computer system.  

a) modem

b) window

c) network adapter card

d) user interface

Answer:

(d) user interface.

Explanation:

A user interface acts as a middleman between the user of a computer and the operating system of that computer. With the user interface, a user can easily communicate with the computer system including the applications running on it.

The user interface can either be text-based or graphics-based.

With text-based user interface, the user enters commands (using keyboards) in form of texts basically on the command line and then the operating system executes these commands.

With the graphical user interface, users interact with the computer using graphics-like control items such as buttons and menus to give instructions to the computer.

6 0
4 years ago
Srooy but can you guys help me with this​(sorry again miss click
telo118 [61]

what miss click let me know when you got the real one      

5 0
3 years ago
Diferencia entre tipo de datos simple char y compuesto cadena​
fomenos
Man i do not speak spanish L
3 0
3 years ago
Other questions:
  • If you know about 3D printers could you help me fix mine?
    8·1 answer
  • Sql is an example of a ________ category programming language. 4gl 3gl 5gl 2gl
    15·1 answer
  • "explain why professional software is not just the programs that are developed for a customer"
    7·1 answer
  • Computer architecture:
    6·1 answer
  • Bill has released a new line of products for his business and is using Google Display Ads to influence customer consideration. H
    6·1 answer
  • The most common roof type is called a
    14·2 answers
  • Important tools used in the _____ phase of the DMAIC process include a project charter, a description of customer requirements,
    10·1 answer
  • Examples of websites that use . com
    10·1 answer
  • Ive already tried "word" and "star"
    12·1 answer
  • The term callee save denotes the case where the __________ (calling / called) program saves the contents of registers whose cont
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!