jenreluao577 jenreluao577
  • 14-01-2023
  • Computers and Technology
contestada

Which of the following methods of computer security prevents operating system attacks originating from harmful websites you have visited?A. using a firewallB. blocking certain sitesC. checking your credit reportD. choosing a strong password

Respuesta :

Otras preguntas

what is the formula of quadratic using factoring. And explain the formula?​
Which of the following individuals is using stress management techniques? A. Preston gets really stressed if he gets behind so he will occasionally stay late a
How was the rule of the weak and corrupt rulers different than the rule of Constantine?
Repaso 4A Exam answersHelppp
BRANILIEST IF CORRECT THOUGH! PLEASE HELP ME!!!!!!!
find the total surface area of this cuboid the cuboid has a length of 4cm and the width of 2cm and the height of 5cm
The table shows the change in the water level (in centimeters) of a reservoir for three months. Find the total change in the water level for the three-month per
342.5 divided by 34.25
Janay cut a drinking straw into three pieces (shown below) to investigate a triangle postulate. He moves the straw pieces to make triangles that have been trans
The equation whose roots are multiplied by 3 of those of 2x^2 + 3x – 1=0 is ​