Tessa heard that a hacker recently broke into her friend’s e-mail account. Tessa uses her home computer to manage her personal business and wants to make sure her information and online accounts are protected from hackers.

What steps should Tessa take to protect her accounts? Check all that apply.

change passwords frequently
review privacy settings
change current screen name
purchase another computer
adjust safety settings

Answers

Answer 1
Answer:
Adjust privacy settings
Change passwords frequently
Adjust safety settings
Explanation:
Hope that helped
Answer 2

The steps Tessa should take to protect her accounts are:

Change passwords frequently

Review privacy settings

Adjust safety settings

Change current screen name

Given that Tessa want to protect her accounts from the hackers,

We need to provide the steps to do the same,

To protect her accounts from hackers, Tessa should take the following steps:

a) Change passwords frequently: Regularly changing passwords for her online accounts can help prevent unauthorized access.

Strong, unique passwords that include a combination of letters, numbers, and symbols should be used.

b) Review privacy settings: Tessa should review the privacy settings on her online accounts and ensure that they are set to the appropriate level of security.

This includes adjusting who can see her personal information, posts, and photos.

c) Adjust safety settings: Tessa should check the safety settings on her computer and enable features like firewalls and antivirus software to protect against malware and other threats.

d) Change current screen name: If Tessa is using a screen name that can be easily linked to her personal information, it's advisable to change it to something less identifiable to reduce the risk of targeted attacks.

e) Purchase another computer: While purchasing another computer may be an option in certain cases, it's not a necessary step for general account protection.

However, if Tessa's current computer is outdated or lacks essential security features, upgrading to a more secure device could be beneficial.

Therefore, the steps Tessa should take to protect her accounts are:

Change passwords frequently

Review privacy settings

Adjust safety settings

Change current screen name

Learn more about Hacking click;

https://brainly.com/question/28311147

#SPJ2


Related Questions

Question #1
Dropdown
Identify the type of data for each value below.

12.023
O string
O float
O int

‘Hello World’
O string
O float
O int

52
O string
O float
O int

Answers

Answer:

12.023 : float

'Hello World' : string

52 : int

Explanation:

Edg2021

At which point should a user select the option to make a delegate aware of permissions?
in the message body after selecting the recipient
after configuring the permissions in the dialog box
before assigning the permissions in the delegate dialog box
in the user’s contact information by clicking Send Permissions

Answers

Answer:

after configuring the permissions in the dialog box

Explanation:

Answer:

B) after configuring the permissions in the dialog box

Explanation:

Just got it right

Credible sites contain___________information,
a.
Accurate
c.
Reliable
b.
Familiar
d.
All of the above


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

C:  Reliable

Explanation:

Credible sites are not always accurate. Credible sites are sites you trust and usually have a resume of being correct.

For example, if you like a news website that you trust and are usually correct, you could say that's a Reliable source.

Credible sites contain "accurate, reliable and familiar" information. this makes the correct answer D: All of the above.

What are Credible sites contain?

A Credible sites includes the date of any information, cite the source of the information presented, are well designed and professional.

Some example of credible site are; the site of an university , while a non-credible site is a site that wants to sell you something by sending you repeated email.

A Credible sites are not always accurate

Also, Credible sites are sites you trust and usually have a resume of being correct.

Hence Credible sites contain "accurate, reliable and familiar" information. this makes the correct answer D: All of the above.

Learn more about the similar question;

https://brainly.com/question/3235225

#SPJ2

Why is the role of the computer in banking system?

Answers

Answer:

The role of computer in banking system is that it maintain customer accounts, ledger, updating, electronic fund transfer and processing of huge amount of cheques, credit cards and and the major transaction that take place daily.

The roles of the computer in the banking system are to store the account,  information of customers and verify the financial records in a matter of seconds.

What is the function of computers?

A computer's four major functions are to receive data and instructions from a user, process the data according to the instructions, and display or store the produced data.

Computers are used in banks for a variety of purposes. For starters, they aid in saving customer account information and authenticating financial data in a matter of seconds.

Therefore, the computer's role in the banking system is to maintain customer accounts, and ledgers, update electronic fund transfers, and the processing of large amounts of checks, credit cards, and important transactions that occur on a daily basis.

To learn more about the function of computers, refer to the link:

https://brainly.com/question/15827489

#SPJ5

does Assembler directives execute at runtime?

Answers

Answer:

Instructions are executed at run-time. Directives are instructions for the assembler and thus are not really executed at all.

Explanation:

Write a function, named series_of_letters, that takes a reference to a vector of chars and returns nothing. The function should modify the vector to contain a series of letters increasing from the smallest letter (by ASCII value) in the vector. Note, the vector should not change in size, and the initial contents of the vector (excepting the smallest letter) do not matter.

Answers

Answer:

Follows are the code to this question:

#include <iostream>//defining header file

#include <vector>//defining header file

#include <algorithm>//defining header file

#include <iterator>//defining header file

using namespace std;//use namespace

void series_of_letters(vector<char> &d)//defining a method series_of_letters that accept a vector array  

{

char f = *min_element(d.begin(), d.end()); //defining a character array  that holds parameter address

   int k = 0;//defining integer vaiable  

   std::transform(d.begin(), d.end(), d.begin(), [&f, &k](char c) -> char//use namespace that uses transform method  

   {

       return (char)(f + k++);//return transform values

   });  

}

int main() //defining main method

{

   vector<char> x{ 'h', 'a', 'd' };//defining vector array x that holds character value

   series_of_letters(x);//calling series_of_letters method

   std::copy(x.begin(),x.end(),//use namespace to copy and print values

           std::ostream_iterator<char>(std::cout, " "));//print values

}

Output:

a b c

Explanation:

In the above code, a method "series_of_letters" is defined that accepts a vector array in its parameter, it uses a variable "d" that is a reference type, inside the method a char variable "f" is defined that uses the "min_element" method for holds ita value and use the transform method to convert its value.

Inside the main method, a vector array "x" is defined that holds character value, which is passed into the "series_of_letters" to call the method and it also uses the namespace to print its values.

What is a popular method used to address or remove the requirement for no-preemption for deadlock prevention:

Answers

Answer:

Hello the options related to your question is missing below are the missing options

A)  Process termination

B)  Mutual exclusion

C)  Rollback or check-pointing mechanisms

D)  None of these are methods used to address no-preemption

answer : Process termination ( A )

Explanation:

The popular method used to address or remove the requirement for no-preemption for deadlock prevention is called  Process termination.

Process termination is a process/method used for the termination of a process even before they are commenced especially in the prevention of a  deadlock situation

while Mutual exclusion prevents the access to a shared source concurrently

What is the smallest value that can be written to the address of the LED array in order to turn on all 8 LEDs

Answers

Answer:

0xFF

Explanation:

0xff is a computer programming character which is the hexadecimal number FF that has an integer value of 255. It is represented as a binary in 00000000000000000000000011111111 (under the 32-bit integer).

In this case given that 0xFF has a one (1) in bits 0 to 7, thus representing the value, 0xf01000ff, will turn on all 8 LEDs.

Hence, the correct answer is "0xFF"

3.5) BEST ANSWER BRAINLIEST
your answer will be reported if it is ridiculous

Which of the following are parts of the Physical Layer?


connectors

pins

cables

pointers

Answers

Answer:cables

Explanation:

Answer:

Cable And Connectors

Explanation:

write a program that implements a simple movie selection decision tree. The decision tree will help the user determine which Dwayne Johnson movie to see.

Answers

Answer:

In order to make the following code in C it is necessary to take in consideration the possible tree of choices, or decision make trees.

Code:

#include <stdio.h>

int main(){

       printf("Please answer with (y/n) \n");

       printf("How about comedy movies?  ");

       char optional[2];

       scanf("%s",&optional);

       if(optional[0] == 'y'){

               printf("Recommended: CENTRAL INTELLIGENCE\n");

       } else if(optional[0] == 'n'){

               printf("Then, how about a current movie ?  ");

               scanf("%s",&optional);

               if(optional[0] == 'y' ){

                       printf("Recommended: HOBBS & SHAW\n");

               }else if(optional[0] == 'n') {

                       printf("how about electronic games ?  ");

                       scanf("%s",&optional);

                       if(optional[0] == 'y' ){

                               printf("Certified Fresh ?  ");

                               scanf("%s",&optional);

                               if(optional[0] == 'y'){

                                       printf("recommended JUMANJI : WELCOME TO THE JUNGLE\n");

                               }else if(optional[0] == 'n') {

                                       printf("RAMPAGE");

                               }

                       }else if(optional[0] == 'n') {

                               

                               printf("about franchises ?  ");

                               scanf("%s",&optional);

                               if(optional[0] == 'y'){

                                       printf("Recommended: FAST FIVE\n");

                               }else if(optional[0] == 'n') {

                                       printf("How about animation ?  ");

                                       scanf("%s",&optional);

                                       if(optional[0] == 'y'){

                                               printf("recommended: MOANA\n");

                                       }else if(optional[0] == 'n') {

                                               printf("recommended: SKYSCRAPPER\n");

                                       }

                               }

                               

                       }

               }

       }        

       return 1;

}

What is the best reason a student should cite an online source for a school report?

It demonstrates the credibility of the online source.
It shows the student wants to get a good grade.
It shows the student was interested in the topic.
It demonstrates the length of time it took to write the report.

Answers

Answer:

A

Explanation: B and C are easy to cross off, as they aren't related strictly to citing your sources. D doesn't make sense because anything can be cited in any amount of time. The answer is A.

Answer:

it demonstrates the credibility of the online source for a school report

Explanation:

A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC

Answers

Answer: 3001.

Explanation:

The Server would acknowledge the 3001 information after it receives two packets of data from the personal computer, which is being used to communicate with the web server of the TCP (Transmission Control Protocol) with a window of 6000.

A TCP is the defined standard which is used for establishing and maintaining a network conversation. this is a medium from which applications programs exchange data.

The TCP is explicitly called the Transmission Control Protocol which allows computing devices to communicate and exchange information by sending packets over a network. Hence, the byte of information acknowledged after receiving 2 packets of data is 3001.

Size perpacket data = 1500 bytes Number of packets sent = 2

The bytes of information acknowledged by the web server can be calculated thus :

Size per packet data sent × number of packets

1500 × 2 = 3000

Therefore, the bytes of information that would be acknowledged by the web server is 3001.

Learn more : https://brainly.com/question/12191237

you can apply a gradient or solid background to a publication.​

Answers

Oh okay that’s wassup

Answer:

TRUE!

Explanation:

Click on background

what is the importance of ICT in agriculture​

Answers

Answer:

ICT helps in growing demand for new approaches. It also helps in empowering the rural people by providing better access to natural resources, improved agricultural technologies, effective production strategies, markets, banking and financial services etc.

Explanation:

ICT helps in growing demand for new approaches. It also helps in empowering the rural people by providing better access to natural resources, improved agricultural technologies, effective production strategies, markets, banking and financial services etc.

How did the advertising company know he was interested in those shoes? Or in that store?

Answers

Answer:

Because they have ads based on what you search most

Explanation:

Critical Thinking 5-1: DoS Attacks Denial of service (DoS) attacks can cripple an organization that relies heavily on its web application servers, such as online retailers. What are some of the most widely publicized DoS attacks that have occurred recently (within the last two years)

Answers

Explanation:

The DDoS attacks occur when a bad actor bombards an online network or service with very large amounts of traffic in an effort to overwhelm the network and then disrupting the services from their full operation.

Some of the most widely publicized DoS attacks that have occurred recently include:

The AWS (Amazon Web Services) DDoS Attack occurred in February 2020.The GitHub DDoS attack which occurred in February 2018.The Dyn DDoS attack which occurred in October 2016.

Write a C program which dynamically allocates memory to define an integer array with the length 15 by using the calloc function. Do not forget to free the memory in the end of your program. What happens if you attempt to print your string before and after freeing memory

Answers

Answer:

When you try to print values from the array before setting free the memory previously allocated, it will return values that were inserted while runtime.

For this it is used the calloc, that is a function of the stdlib.h library, of the C programming language. Its objective is to create a vector of dynamic size, that is, defined during the execution of the program. It differs from the malloc function, also from C, because in addition to initializing the memory spaces, it also assigns the value 0 (zero) to each one. It is useful, because in C when a variable is declared, the space in the memory map used by it probably contains some garbage value.

Code:

#include <stdio.h>

#include <stdlib.h>

int main()

{

   int* ptr;

   int n, i;

   n = 15;

   ptr = (int*)calloc(n, sizeof(int));

   if (ptr == NULL) {

       printf("\n Memory is not allocated");

       exit(0);

   }

   else {

       printf("\n Memory allocated");

       for (i = 0; i < n; i++) {

printf("\n Input value in the array at position %d: ",i);

scanf("%d",&ptr[i]);

       }

      printf("\n The elements of the array are: ");

       for (i = 0; i < n; i++) {

           printf("%d, ", ptr[i]);

       }

free(ptr);

   }

return 0;

}

You are doing a multimedia presentation on World War I, and you want to use a visual aid to show the battle areas. What visual aid is best suited for this purpose?

Answers

Answer:

Map

Explanation:

I put it in on Edg and got it correct, hope this helps :)

Answer:

The correct answer is map

Explanation:

I just did the assignment on edge 2020 and got it right

python Factoring of integers. Write a program that asks the user for an integer and then prints out all its factors. For example, when the user enters 150 (which equals 2 * 3 * 5 * 5), the program should print: The factors of 150 are: 2 3 5 5

Answers

Answer:

Written in Python:

num = int(input("Number: "))

i = 2

print("The factors of "+str(num)+" are ",end='')

while num > 1:

     if num%i == 0:

           num = num/i

           print(str(i)+" ",end='')

           i = 2

     else:

           i = i + 1

Explanation:

This line prompts user for input

num = int(input("Number: "))

This line initializes divisor, i to 2

i = 2

This line prints the literal in quotes

print("The factors of "+str(num)+" are ",end='')

The following while loop checks for divisor of user input and prints them accordingly

while num > 1:

     if num%i == 0:  This checks for factor

           num = num/i  Integer division

           print(str(i)+" ",end='')  This prints each factor

           i = 2  This resets the divisor back to 2

     else:

           i = i + 1

The program that asks the user for an integer and then prints out all its factors is represented as follows:

x = int(input("please input an integer: "))

for i in range(1, x+1):

  if x%i == 0:

     print(i)

The first line of code ask the user to input the integer number.

Then we loop through the the range of 1 to the inputted integer plus one.

The integers is then divided by the looped numbers . if it has no remainder then it is a factor.

Finally, we print the factors.

learn more about python here; https://brainly.com/question/17184408?referrer=searchResults

The formula for calculating your BMI is below.

BMI=703weight in pounds(height in inches)2
Which line of code will correctly calculate the BMI? Select 3 options.


bmi = 703 * weight / height ** 2

bmi = 703 * weight / height * height

bmi = (703 * weight) / height ** 2

bmi = 703 * weight / (height * height)

bmi = 703 * weight / height ^ 2

Answers

The first, third, and fourth choices are correct.

The line of code that will correctly calculate the BMI are bmi = 703 * weight/height ** 2, bmi = (703 * weight) / height ** 2,. and bmi = 703 * weight / (height * height). The correct options are a, c, and d.

What is BMI?

Body mass index is a measurement based on a person's weight and height. The BMI is calculated by dividing the body weight by the square of the size, and it is expressed in kilograms per square meter (kg/m2) since weight is measured in kilograms and height is measured in meters.

Body Mass Index (BMI) is calculated by dividing a person's weight in kilograms (or pounds) by their size in meters squared (or feet). People who are exceptionally muscular may have a high BMI because muscle weighs more than fat.

Therefore, the correct options are:

bmi = 703 * weight / height ** 2bmi = (703 * weight) / height ** 2bmi = 703 * weight / (height * height)

To learn more about BMI, refer to the link:

https://brainly.com/question/28517673

#SPJ2

When you want to add information to a document, what role does your operating system play?

Answers

Not sure how to answer this question but I have a laptop so when you want to edit or type on a document, that’s already made, click “Editing document”. If you want to make your own click “Open”. Then, click save as if you want to add your name to the document and save it to your device :)

When you want to add information to a document, the operating system assigns the file its name, location, and size.

What is an operating system?

An operating system (OS) is the program that manages all of the other application programs in a computer after being loaded into the computer by a boot program. The application programs interact with the operating system by requesting services via a predefined application program interface (API).

The file's name, location, and size are determined by the operating system. When you add information to a word-processing document, one of the functions of your operating system is to store unsaved work in temporary storage.

Therefore, when you add information to a document, the operating system names locates and sizes the file.

To learn more about the operating system, refer to the link:

https://brainly.com/question/6689423

#SPJ6

Which command displays various pieces of information about the current IOS version, including the licensing details at the end of the command's output

Answers

Answer:

The show version command

Explanation:

It is the show version command that display various pieces of information about the current IOS version, including the licensing details at the end of the command’s output.

This command is an example of a command that can be used to gather information about the current IOS version running on the given router.

It also has the capability of giving several other manufacturing information about the router in question. Summarily, it helps to give information about details related to the hardware present (e.g memory) and the software (e.g IOS version of the router)

What goes in the red blanks?

Answers

Answer: In the middle you would put the definition or meaning, on the right side you would put the code, on the left side you would put the code in between </    >.

Explanation:

1. List three hardware computer components? Describe each component, and what its function is.

Answers

Explanation:

I can't just describe it hope this much is fine for the....

Answer:

Three hardware components are;

input deviceoutput deviceC.P.U

The input devices are used to get data into a computer.

The output device are used to get processed data out of a computer.

The C.P.U which is known as the central processing unit, it is known as the brain of the computer, it takes the raw data and turns it into information.

Kelsey noticed one of the new employees at her job is struggling with the amount work assigned to her. What can Kelsey do to support her co-worker?

A: Complete the work for her co-worker.
B: Offer to help her co-worker.
C: Ignore her co-worker. It's none of her business.
D: Document it, then tell her manager.

Answers

Answer:B. Offer to help her co-worker.

Explanation: She can help, but A, meaning she would do all the work for her co-worker and Kelsey not get paid.

B is the best option!

-AW

Answer: B offer to help her co-worker.

Explanation:

Just trust me I did the test.

What network appliance senses irregularities and plays an active role in stopping that irregular activity from continuing?
A) System administratorB) FirewallC) IPSD) IDP

Answers

Answer:

C IPS

Explanation:

its called in-plane switching It was designed to solve the main limitations

Look at the following assignment statements:

word1 = "skate"
word2 = "board"

What is the correct way to concatenate the strings?


newWord = word1 / word2
newWord = word1 + word2
newWord = word1 * word2
newWord = word1 = word2

Answers

The correct way to concatenate the strings is:

newWord = word1 + word2

Answer:

newWord = word1 + word2

Explanation:


PLS ANSWER ASAP
——————————————



Question 2 (1 point)
What function would you use to find the most popular video?
Max
Average
Sum
Count
Min

Answers

Count explanation: I don’t really know how to explain it hope it helps:)

Answer:

Count

Explanation:

Because most popular vidoes need a count of viewers to determine how popular it is. Think of it like the cliche bar chart sued to determine what is the most popular ice cream flavor. A computer could anaylse this data and count each reponse to see what flavor had the most responses. Hope this helps! Let me know if you need more info!  

Write a function biggestAndRest that accepts one argument---a list containing integers. biggestAndRest should then return a tuple with two items: (1) the largest integer in the original list and (2) a nested tuple containing the rest of the items in the original list. For example, biggestAndRest([3,1,4,2]) should return (4, (3,2,1))

Answers

Open your python console and execute the following .py code.

Code:

def biggestAndRest(lis):

   mxE = max(lis)

   maxIdx = lis.index(mxE)

   l2 = lis.copy()

   l2.pop(maxIdx)

   return mxE,tuple(l2)

r = biggestAndRest([3,1,4,2])

print(r)

Output

(4, (3, 1, 2))

Discussion

From [3,1,4,2] it became (4, (3, 1, 2))

following the principle of the function biggest and rest

Someone explain? Java

Answers

First, the code initializes a variable of type int. The variable x = 15. The if statement runs if x is greater than 10, which x is greater than 10. The program prints A and B to the console. The else statement is ignored because the if statement runs.

Other Questions
What type of evidence does Minow use to develop the idea that what is on television lacks value? By including expert testimony from two professional television executives By listing examples of the things one would see in a day of watching television By providing facts about the different types of people who watch television daily By using statistics on the amount of time children watch television each day Help me with this question pleaseeee ASAP!! What are the best questions for a writer to consider when developing ideas for an essay? Check all that apply.Which section of the essay should be the longest?How much time will it take to write the essay?What do I know about the topic of the essay?What central idea do I want to communicate?Which details support the central idea of the essay?How do the ideas connect to one another and the writing prompt? HELP!! After picking apples at Fruitville Orchards, Kendra stops at the orchard's market to get some fresh apple cider. She wants to drink a pint of cider at the orchard. She also wants to bring a pint of cider to each of her 5 friends later in the day. How many 1-quart jugs of apple cider should she buy? sound travels slowest through what temperature of water? a. 20b. 40c. 60 d. 80 If f(x) = 6x 4, what is f(x) when x = 8?A 2B 16C 44D 52 Which type of work would include providing advice to managers on how to reduce the organization's costs?OA public relations managerB. management analystOC. marketing researcherODH.R. manager How do humans influence the environment? What is the equation of a line through the points (0.9) and (3, 0)?9-0because m-0-3: -3x + 99-0because m-0-3:y=-3x + 33-0because m 0-9:-*Giy--+93-0because m- What would it be help plz Express the ratio 8:12 in lowest terms How do tissues repair? 2-3x-2x=0 using completing the square method A hot air balloon traveled 3.5 at 15 m/hr. What is its distance traveled Write a sentence for each of the four future tenses using the subject "artists" and the verb "create." Which quotation from the excerpt presents acounterclaim to the idea that the invention of thetelephone was a triumphant event?O The story of the telephone's invention in 1876 is oneof hard work, determination, and triumph.O After all, it has a terrific happy ending in which thehero, Alexander Graham Bell, uses his astonishingnew device to transmit the words "Mr. Watson, comehere. I want to see you."However, the true story of how the telephone came tobe is not quite as happy as most imagine. In fact, it isnot a tale of triumph at all, but one of tragedy.What's more, the first words ever spoken over a wirecould not possibly have been uttered by AlexanderGraham Bell, because he was only two years old atthe time. What are the BCNOs in relation to the periodic table? A circular pizza with diameter of 10 inches. The pizza is in a square box with side lengths of 14 inches. In square inches, how much of the box is empty? What is one way the author increases the sense of horror and suspense in this excerpt? Cite textual evidence to explain your ideas. Read this sentence from R.M.S. Titanic. The band still playsbut not ragtime: Nearer my God to Thee. Nearer to Thee . . . Which part of the plot does this sentence represent?