How can you reduce the Impact of Hacking? 
pls help with this <3​

Answers

Answer 1

Answer:

Explanation:

To reduce the impact of hacking firstly dont ever give anyone your PASSWORD even to ur friends coz one day they can snake u off and use ur personal email/accounts.Try to use websites which are protected from hackers and anti-virus.Never use your personal details if u do make sure u write the user/password in a save place and LOG OUT your accounts when ur not using them.If u have a child you should install i child protecting apps.And make sure you block all anonymous websites/browsers/apps.Dont leave personal information on websites just to stay on the safe side.

Hope this helps


Related Questions

In the list [0, 13, 5.4, "integer"], which element is at index 2?
A.0
B.13
C.5.4
D.“integer”

Answers

Answer: C) 5.4

The index starts at 0

index 0 = 0index 1 = 13index 2 = 5.4index 3 = "integer"

If there are n elements in a list, then the index ranges from 0 to n-1.


Bill is pushing a box with 10 N of force to the left, while Alice is pushing the box with 30 N of force to the right. What is the
net force?

Answers

Answer:

Net force = 20 N

Explanation:

Given that,

Force acting on the left = 10 N

Force acting on the right = 30 N

Let right side is positive and left side is negative. Let the net force acting on the box is F. So,

F = -10+30

F = 20 N

So, the net force on the box is 20 N and it is in right side.

It was brought to Dennis's attention that some of his employees' e-mail practices were unethical. Read the scenarios described below and identify the unethical practices.


Darlene sends a memo to all employees outlining the new procedure for tracking inventory in the database.

Luke sends out an e-mail to co-workers asking them to sponsor him in a walkathon next month.

Nancy sends the latest computer jokes out to all the company's employees to brighten their day.

Bob forwards a customer inquiry to the sales representative assigned to the account.

Answers

Answer:

Answer: B (Luke sends out an e-mail to co-workers asking them to sponsor him in a walkathon next month.)

Explanation:

The answer would be B, if you can add multiple then C could also fall under the unethical catoagory.

Which group contains the command to manually conduct a spell check ?

Answers

Answer:To check spelling in a Word document, open up the document, head to the “Review” tab, then click on “Spelling & Grammar” (part of the “Proofing” group of tools). Then a window will appear showing the first word the program believes to be misspelled. Click through the options to review the whole document.

Explanation:Hope this helped u out btw can i plz have brainlist only if u wanna give me brainlist though have an great day kind sir or ma'am!

To navigate through your presentation slides, which key on your keyboard can you use?
Dankonace

Answers

Answer:

You use your arrow keys

Explanation:

Answer:

Space bar

Explanation:

(04.06 LC)

To navigate through your presentation slides, which key on your keyboard can you use?

Group of answer choices

Backspace

Tab key

Space bar

Enter key

can someone help me solve this pls

Answers

Answer:

1. Textbox

2. Button

3. Boolean

Select the correct answer from each drop-down menu.
A multimedia company wants to implement virtualization on machines with no host operating system. Which type of hypervisor should they
use?
The multimedia company should use a(n)
_______ hypervisor. This hypervisor is installed
__________

Answers

Answer:

1. Bare-metal hypervisor

2. top of a physical server

Explanation:

The multimedia company should use a(n) " BARE-METAL" Hypervisor. This hypervisor is installed "top of a physical server"

The bare-Metal hypervisor is often known as the Type 1 hypervisor. It is characterized by good performance and strength.

Also, this type 1 hypervisors is considered to be the operating system on its own.

Hence, in this case, the correct answer to the question is:

1. Bare-metal hypervisor

2. top of a physical server

Answer:

1.)TYPE 1  2.) Directly on the machine. :) I got the answer right!

Explanation:

A qué escala está dibujado el plano del Instituto si sabemos que la puerta principal de entrada tiene un ancho 3,40 metros y en el plano hemos medido con la regla 68mm

Answers

Answer:

[tex]\dfrac{1}{50}[/tex]

Explanation:

[tex]3.4\ \text{m}[/tex] es equivalente a

[tex]68\ \text{mm}[/tex]

[tex]=68\times 10^{-3}\ \text{m}[/tex] en el plan.

[tex]1\ \text{m}[/tex] del plan es equivalente a

[tex]\dfrac{68\times 10^{-3}}{3.4}[/tex]

[tex]=\dfrac{1}{50}[/tex]

Esto significa que el plan es [tex]\dfrac{1}{50}^{\text{th}}[/tex] de la dimensión real.

Por lo tanto, la escala del plan es [tex]\dfrac{1}{50}[/tex]

Which operating system (OS) is used to run your laptop?

Answers

Answer:

Windows or Linux

Explanation:

It would most likely be windows but theres not enough information to make a sure decition.

Answer:

The most known one are, macOS, Windows, and Linux.

Bonus: The most known smartphone operating systems are Android and iOS

Explanation:

I’m tutoring a kindergartener virtually and have run out of things to do that will keep her engaged. Does anybody have any ideas?

Answers

Maybe cut out some numbers in different colors, he/she might be more engaged!

Answer: Try to just make it fun. Include things they like, love, and or think are funny.

In a ______, the bars that represent the categories of a variable are spaced so that one bar is not directly next to another; whereas in a ______, the bars actually touch one another.

Answers

Answer:

The correct answer would be "bar graph; histogram".

Explanation:

The bar graph has become a photographic arrangement of information which always practices that relate bars to consider various give information. Alternatively, this is indeed a diagrammatic comparative analysis of univariate data. This same histogram demonstrates the variation including its frequency of repeated measures, introduces numerical information.

Choose the correct answer

Answers

that is the wrong answer the correct answer is textbox

Text box is the answer

What are the steps to insert an image into an email message place the steps in the correct order

Answers

Answer:

1. Start a new message

2. click the insert tab.

3. look for the illustrations command group

4. click pictures

5. browse, select, and insert your choice

Explanation:

Hey, anyone like will u jus help meh like pleaseee
Which type of Malware is hard to detect and collects personal data?
1.Spyware
2.Virus
3.Worm
4.Trojan Horse​

Answers

Answer:

1

Explanation:

Answer:

1. Spyware.

Explanation:

Sure... pls give another person brainliest...

love u ❤️

hope it helps

who invented the computer?
when was it made?
can u tell me the name of the oldest computer?
when did the first laptop come out?

Answers

The computer was invented by Charles Babbage 15 February 1946Antikythera Mechanism it came out in 1981

Hope it helps you

pls mark my answer as brainliest

Answer:

1 and 2: Charles Babbage invented the computer (he was an English mechanical engineer and polymath) Charles Babbage was deemed the "father of the computer", he thought up and created the very first mechanical computer at the beginning of the 19th century.

3: the first computer was named the ubiquitous x86-powered workhorse of desktop and portable computing. All latest PCs are descendants of the earliest from IBM, the original model 5150 which made its first appearence in August 1981.

4: The first laptop computer available to the public was the Osborne. the Osborne Computer Corporation issued this exact model to the public in the year 1981. It ran at a large price of $1795. At the time of discharge, the screen was about five inches long and the keyboard was on the cover of the computer.

i did a lot of research for this, lol. hope it helps.

(i promise i did not plagerise)

what is the range of values used whe setting velocity?

A. 0% to 100%

B. -100% to 100%

C. 0% to 200%

D. -100% to 200%

Answers

Answer:

A. 0% to 100%

Explanation:

Velocity can be defined as the rate of change in displacement (distance) with time. Velocity is a vector quantity and as such it has both magnitude and direction.

Mathematically, velocity is given by the equation;

[tex] Velocity = \frac{distance}{time} [/tex]

The range of values used when setting velocity is 0% to 100%.

Hence, when working on a virtual reality (VR) robot, you should use a range of 0% to 100% to the set the value of velocity. This range of values are used to denote the rate at which the robot moves i.e its forward and backward motion (movement).

How do I find a back door password on my computer?

Answers

Answer: It depends what you mean by "backdoor" if you mean "how do I change my password", than use cmd.

Explanation:

CMD (also known as Command Prompt) is a very powerful program used for Windows (assuming your using a windows). To change or disable any account on your computer use the following commands...

Change Password: net user <username> <password>

PRESS ENTER

Disable/Enable an account: net user <username> /active:<yes/no>

Be aware that if you disable all accounts on your computer you will not be able to access your computer. So use this command with caution. Should you decide to use command prompt, and you cannot gain access to an account, just go into recovery mode, and turn an unactive account active. Should you lose a password to your account, the recovery mode for your computer can work with this too.

If this does not answer your question, please let me know, and I will help you out.

Remember that there is no true way to protect your account without downloading 3rd-party programs that monitor your computer. But using cmd if someone gains access to your account, will always work. This will also allow you to gain access to the built-in Administrator account that if you have any problems on your main account, the built-in Administrator account should be used to fix any said issues.

what is a good site to do an educational screen capture tutorial?

Answers

You will need a Application/Software To Screen Capture

I suggest Using OBS

Differentiate Between
Master file and transaction file

Answers

Master file contains records of permanent data types and transaction files contains data which is used to update the records of master file for example address of the costumer etc.

Click this link to view O*NET's Skills section for Biomedical Engineers. Note that common skills are listed toward the top and less common skills are listed toward the bottom. According to O*NET, what are some common skills needed by Biomedical Engineers? Check all that apply. fine arts science complex problem solving critical thinking judgment and decision making building and construction

Answers

Answer:

Science

complex problem solving

critical thinking

judgment and decision making

Explanation:

im on endunety

Science, complex problem-solving, critical thinking and judgment and decision-making are some common skills needed by Biomedical Engineers. Hence, option B, C, D, and E are correct.

What is Biomedical Engineers?


In order to create new tools and machinery for enhancing human health, biomedical engineers concentrate on developments in technology and medicine. For instance, they might create computer simulations to evaluate new pharmacological regimens or software to run medical equipment.

One of the engineering fields with the highest growth is the relatively young field of biomedical engineering. The demand for qualified biomedical engineers to fill the gap created by technological breakthroughs and the desire for more advanced, creative healthcare is on the rise. The greatest engineering jobs list places biomedical engineering at number five.

Biomedical engineering is one of the most challenging engineering disciplines because it involves a lot of chemistry and biology coursework. While many engineering majors concentrate on physics, this one demands considerably more.

Thus, option B, C, D, and E are correct.

For more information about Biomedical Engineers, click here:

https://brainly.com/question/11617187

#SPJ5

An author’s qualifications are important in determining whether a media source is...

credible.
relevant.
valid.
copyrighted.

Answers

Answer:

An author's qualifications are important in determining whether a media source is;

Credible

Explanation:

In order to find out about the credibility of an author, the preface, forward, and or introduction including the book's back cover should be checked for the author's credentials, qualifications and areas where the author is an expert

The author's credential can also be checked by finding out about other books the author has written and also about the author's biography.

Answer:

a) credible.

Explanation:

TRUE OR FALSE - SQL language is used to query data in a Relational Database?

Answers

Answer:

Yes I agree with the other person who answered that

Which type of programmer writes code for operating systems?
A.
application programmer
B.
web programmer
C.
game tools programmer
D.
system programmer <------ Correct
E.
artificial intelligence programmer

Answers

Answer:

d.is the correct answer

Answer:

Answer is D.

Explanation:

1. Which of the following is true about social media content? D. Once the content is published, it is very difficult to edit or correct it. O C. The tools to create social media content are not easily accessible. B. It can be user-generated and shared by many people. D A It is only created and distributed by the publisher​

Answers

Answer:

B. It can be used-generated and shared by many people.

It can be user-generated and shared by many people, is true about social media content. Thus, option (b) is correct.

What is social media?

Social media is a term used to describe online communication. Social media systems enable users to have discussions, exchange information, and create content for the internet. Social media mostly used in the youth. The social media are to share the information quickly.

Social media re to share the content are the user generated and the share by the many people. The social media are the share the news and the information to the quickly, but sometimes share the information is fake, the audience are the trust. The social media are the opinion to share with everyone. It's the medium of the communication.

Therefore, option (b) is correct.

Learn more about on social media, here:

https://brainly.com/question/24687421

#SPJ2

Which organization publishes a handbook that describes various occupations? U.S. Department of Defense U.S. Department of Agriculture U.S. Bureau of Labor Statistics U.S. Bureau of Economic Analysis

Answers

Answer:

U.S. Bureau of Labor Statistics.

Explanation:

The Bureau of Labor Statistics is a unit of the United States Department of Labor assigned with the task of fact-finding in the field of labor and statistics for the government. The agency helps measure the labor activity in the market and evaluates all forms of activity regarding labor conditions for the government.

This agency also functions or serves as the principal agency for the United States Federal Statistical System. It not only collects information or data but also helps spread the said information to the government. It also published a biennial handbook describing various occupations.

Answer:

C

Explanation:

Austin works as a department head and frequently uses presentations to deliver information to his staff. He relies heavily on presentation technology because of its many benefits, which include _____.



ensured accuracy


visual appeal


work can't be lost


fast creation


ease of updating

pls help

Answers

Answer: ensured accuracy

Explanation:

Answer:visual appeal, ease of updating, fast creation

Explanation:

30 POINTS, ON A TIMER HELP ASAP

your answer will be removed if you steal my points!!

The history of the Internet dates back to the 1960s, when a group of scientists at Stanford University were entrusted to design which of the following as part of the competition between the US and its then Cold War enemy, the USSR?


a network of sophisticated computers

a mainframe to siphon information

a computer to control weapons

a super computer for the US government

Answers

b is not the answer

for c the goverment  dont  need a comptor to control weopons they have a briefase.      

for a it dont  make sense in that time

so it d pls mark barinliest    

The Internet was first used by which of the following institutions?
A.
Nazi party
B.
US Postal Service
C.
US Department of Defense
D.
British Broadcast Corporation

Answers

Answer:

U.S Department of Defense

Explanation:

(btw nazi party was around before the internet and ended before the internet therefor couldn't be that)

aux Which of the following is the best name for a history report about World War I? (6 points)​

Answers

Answer:

The best name of a history report for world war I:  The Great War

Explanation:

Based on what I learned in my past history classes, World War I was also known as The Great War. It was the most deadliest war in American history

Answer:

6 points

Explanation:

Which is the best reason for saving?

a) to buy what one wants now

b) to leave money to heirs

c) to achieve future goals

d) to accumulate wealth

Answers

C) to achieve future goals

The best reason for saving is to achieve future goals".

The correct option is C.

Saving money is a prudent financial practice that allows individuals to work towards and achieve their future goals. By saving, individuals can accumulate funds over time to finance important milestones.

While options like to buy what one wants now may provide immediate gratification, it does not necessarily contribute to long-term financial stability or help individuals reach their future goals.

Similarly, to leave money to heirs focuses on inheritance but may not align with everyone's priorities or circumstances.

On the other hand, to accumulate wealth can be seen as a valid reason for saving, as it implies building financial security and stability.

However, accumulating wealth is often viewed as a means to achieve future goals rather than an end in itself.

Learn more about Financial objectives here:

https://brainly.com/question/31435896

#SPJ6

Other Questions
12. When computer professionals take on jobs, they may not enter into relationships with which of thefollowing?a) emploverb) governmentc) clientd) society13. Which of the following does not come under the category of strongly differentiated profession?a) doctorb) engineerc) policeman d) computing professional14. Which of the following is not a characteristics of profession?a) knowledge b) code of ethicsc) autonomyd) happiness15. Which of the following is a mutual right duty of employer and employee?a) Fair wage paid promptlyb) Work well donec) Respect for company reputation d) Honesty of contrast. Please need help Lin ran 2 3/4 miles in 2/5 of an hour. How long would it take Lin to run 1 mile at that rate? A pan containing hot water is left on the counter and becomes cool mainly due to....A. water molecules moving apart.B. cold air penetrating the hot water.C. heat from the water moving into the cooler air.D. hot water reacting with the metal pan. What is 8/12-4/8 = reduced to its lowest terms Which sentence uses thesemicolon correctly?A. My head felt like it was stuffed; with tissues.B. My head felt like it was stuffed with tissues;from my congestionC. My head felt like it was stuffed with tissues; Iwas so congested The Tanners have received an $8000 gift from one of their parents to invest in their childs college education. they estimate that they will need $20000 in 12 years to achieve their educational goals for their child. What interest rate compounded semiannually would the Tanners need to achieve this goal? Which of the following is NOT a weapon of mass destruction?Group of answer choices r-4.5 1) 3r 2r=-9Quadratic formula Round 503.782 to the nearest tenth. Smokers are at a greater risk of becoming ill from germs that cause colds and the flu due to a weakened Which type of matter is always made up of only one kind of atom?(A) compound (B) element (C) mixture (D) moleculei really need help Which of the following are types of phrases? Select all that apply.prepositional participial subordinateabsolute What is it an example of when another text or event is referred to without directly stating it?AAlliterationBRhetorical QuestionCParallelismDAllusion For his reading goal this nine weeks, Jeonhee wants to read 1,000 pages. The first week he read 10 pages per day. The second week he read 15 pages per day. The third week he read 20 pages per day. How many more pages does he need to read to reach his goal? You are using a magnifying glass that shows the image of an object that is six times the object's actual size. Determine the length of the image of the termite seen through the magnifying glass. Which statement about African slavery is true? Slavery and a slave trade existed in Africa before Europeans came. Slavery existed in Africa before Europeans came, but Africans did not trade enslaved people. The trans-Atlantic slave trade introduced slavery to Africa. 6) The weights of five students are as follows. Find theirmedian weight. 48kg, 59kg, 43kg 63kg, 52kg what role can a society play to solve a conflict What is the combined meaning of the prefix and root in the word abduct?A. Lead acrossB. Lead awayC. Send acrossD. Send away