jenreluao577 jenreluao577
  • 14-01-2023
  • Computers and Technology
contestada

Which of the following methods of computer security prevents operating system attacks originating from harmful websites you have visited?A. using a firewallB. blocking certain sitesC. checking your credit reportD. choosing a strong password

Relax

Respuesta :

Otras preguntas

What is the mass of a truck that has a momentum of 10,000 kg*m/s and a velocity of 4m/s North?
write any 5 safety measures that should be followed while working at industry .​
What produces sperm and eggs? A. spores B. an adult moss plant
With this tool, the author attempts to describe the unknown term using a different word with a similar, though not identical, meaning.
Why did republican Henry Cabot lodge refuse to ratify the League Nations?
what statement can you make that will be true of the population of all six district
How can we make our country an ideal country
Balance the equation Mg+CO2 - - - - - -) MgO+c ​
In parallelogram LMNO, MP = 21 m, LP = (y + 3) m, NP = (3y – 1) m, and OP = (2x – 1) m. Parallelogram L M N O is shown. Diagonals are drawn from point M to poin
among the intermolecular forces,which forces are typically the weakest