subject

Tessa heard that a hacker recently broke into her friend’s e-mail account. Tessa uses her home computer to manage her personal business and wants to make sure her information and online accounts are protected from hackers. What steps should Tessa take to protect her accounts? Check all that apply.

change passwords frequently
review privacy settings
change current screen name
purchase another computer
adjust safety settings

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 23:30
You picked the corridor which led you here. if the guards find you, they're going to be really angry! what is the synonym of angry
Answers: 1
question
Computers and Technology, 22.06.2019 13:30
In which phase does software coding and testing happen in the spiral model? the spiral model does not have a separate testing phase. both, software coding and testing occurs during the phase.
Answers: 3
question
Computers and Technology, 23.06.2019 16:10
What is the ooh? a. omaha occupation handbook b. online occupational c. occupations online d. occupational outlook handbook select the best answer from the choices provided
Answers: 3
question
Computers and Technology, 24.06.2019 11:00
These statements describe lists in presentation programs: a. bullets can be turned off and on. b. bullets cannot be turned off. c. bullet styles, colors, and sizes can be changed. d. lists don't have to use bullets or numbers. e. numbering styles, colors, and sizes can be changed. f. numbers can be turned off and on. g. numbers cannot be turned off. select all that apply
Answers: 2
You know the right answer?
Tessa heard that a hacker recently broke into her friend’s e-mail account. Tessa uses her home compu...
Questions
question
Physics, 11.11.2020 19:00
question
Mathematics, 11.11.2020 19:00
question
English, 11.11.2020 19:00
question
Mathematics, 11.11.2020 19:00
question
English, 11.11.2020 19:00
Questions on the website: 13722367