Which of the following is not a way to protect yourself online?

What will be an ideal response?


Enter your user name and password on any site that requests them.

Computer Science & Information Technology

You might also like to view...

The text formatting feature that creates definition between letters and the slide background is ________

A) Shadow B) Text Fill C) Glow D) Text Outline

Computer Science & Information Technology

A shorthand notation for decrementing a variable is ____.

A. variable++ B. variable=+ C. variable-- D. variable+-

Computer Science & Information Technology

The concept of least privilege involves assigning the maximum privileges required for a person to do his job

Indicate whether the statement is true or false.

Computer Science & Information Technology

?If you receive an email message from a sender that you don't recognize and the message contains an attached file, you should ____.

A. ?contact the local police so they can run a trace on the email B. ?only open the file in the evenings, when malicious code is less virulent C. ?immediately delete the email and reboot the computer D. ?avoid opening the file until you are sure that it doesn't contain a virus

Computer Science & Information Technology