Which of the following is NOT a recommended safe browsing technique?

A. Turn off location sharing.
B. Enable a pop-up blocker.
C. Keep your browsing history in your cache.
D. Never store passwords.


Answer: C

Computer Science & Information Technology

You might also like to view...

When trying to find out about users, the gold standard is to watch a user in the context of the workplace. However, this isn't always possible. Who else in a company knows about the users? Suppose you are consulting company that sells computers and you needed to find out about the people who use this equipment. However, you cannot interview the users (customers) directly. Where would you turn? What departments or people would you consult? Name at least three.

What will be an ideal response?

Computer Science & Information Technology

The Source Manager dialog box is used in Word to create a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The option for displaying the Navigation pane is in the ________ group of the View tab

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following statements about trees is false?

A. Trees have their origins in the work of mathematician Gustav Kirchhoff. B. Tree applications range from artificial intelligence systems to efficient search algorithms for large, dynamic lists. C. The entry node in a tree is known as a leaf. D. Binary trees are implemented with two pointers, one to the left subtree and one to the right subtree. E. A tree is a hierarchical data structure.

Computer Science & Information Technology