1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zmey [24]
3 years ago
5

Which sentence describe internet safety precautions?

Computers and Technology
1 answer:
koban [17]3 years ago
5 0

Which sentences describe Internet safety precautions? It is advisable to install anti-virus software on your computer. You should use strong passwords for your Internet accounts. In addition, you should avoid sharing personal information over the Internet.

#hope it helps ^_^

mark me as brainliest please

You might be interested in
Match the metric units with these measurements
zavuch27 [327]
Force:newtons
distance:meters
work:joules
power:either watts or horsepower
energy:joules
time:kiloseconds and milliseconds
6 0
3 years ago
Consider the steps for debugging. First, you should
SCORPION-xisa [38]

Answer:

run the code to see where the error is

Explanation:

4 0
2 years ago
Sending a busy manager a long email represents a problem in which area of the communication process
FromTheMoon [43]
Time management,they wouldn’t have enough time to read it and they would become more stressed out
3 0
3 years ago
The tcp protocol provides error detection and correction. <br><br> a. True <br> b. False
ANEK [815]
B. False

Explanation

TCP provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network.
4 0
2 years ago
Least common multiple of 78,90, and 140
Daniel [21]
The least common multiple (LCM) of 78, 90, and 140 is: 16,380

78 × 210 = 16,380
90 × 182 = 16,380
140 × 117 = 16,380
5 0
3 years ago
Read 2 more answers
Other questions:
  • EBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general
    5·1 answer
  • What feature could you use to automatically shade cells containing a negative value in red?
    7·2 answers
  • What OS has a large market share but is limited because it can be installed only on one particular brand?
    8·2 answers
  • Consider the scenario below and determine the most likely source of the problem. A user reports that her or his printer is not r
    13·2 answers
  • The __________ vulnerability assessment is a process designed to find and document selected vulnerabilities that are likely to b
    15·1 answer
  • Write a program that asks the user to enter a whole number then outputs a 0 if the number is even or a 1 if the number is odd. (
    14·1 answer
  • Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would
    6·1 answer
  • John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the dat
    10·1 answer
  • Can someone help me answer this, I can’t fail tysm :)
    11·1 answer
  • What are the advantages of mine shaft gear and the disadvantaged​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!