jenreluao577 jenreluao577
  • 14-01-2023
  • Computers and Technology
contestada

Which of the following methods of computer security prevents operating system attacks originating from harmful websites you have visited?A. using a firewallB. blocking certain sitesC. checking your credit reportD. choosing a strong password

Respuesta :

Otras preguntas

When one tectonic plate moves underneath another, what is occurring? A. subduction B. collision C. uplift D. slip
Why did Egyptians build pyramids?
round each decimal to the nearest whole number 30.92
How many 2/3 -ounce packages of peanuts can be made with 8 ounces of peanuts? Explain how you found your answer.
What is the value of x? 4x - 9 = 27
how to write 2000 using exponents
round each decimal to the nearest whole number 30.92
the product of a number w and 737
In a restaurant, Chad tracked the number of children and adults that came in over an hour. During that time, 16 children and 40 adults came in the restaurant. W
The data showed that there was no significant difference in healing times between the two groups, so the researcher concluded that calcium intake has no effect