Which of the following are risks you take when you browse the Web as an ordinary user on a properly-configured Linux system? (Select all that apply.)

What will be an ideal response?


Most Web sites are unencrypted, so data transferred from the site and your computer, or vice-versa, can be intercepted

Some Web sites deliver mini-programs that run on your computer, and if such a site delivers a malicious program, it could do just about anything, including steal your personal data files

Computer Science & Information Technology

You might also like to view...

The Math class is a part of the ____ package, so it need not be imported using the import statement.

A. java.util B. java.lang C. java.awt D. javax.swing

Computer Science & Information Technology

Overridable functions are declared using keyword _________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Magnetic Lasso Tool adds ____________________ that define the selection marquee based on the frequency you specify.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When preparing a case, you can apply ____ to problem solving.

a. standard programming rules b. standard police investigation c. standard systems analysis steps d. bottom-up analysis

Computer Science & Information Technology