subject
Computers and Technology, 25.04.2020 03:47 tj88345

Sara is using her personal laptop (which is password protected) at a "hotspot" at a local cafe with wifi access. She is in the middle of placing an online order when friends arrive and she stops her work to visit. What is her best (and most convenient) way to protect the PII that she has already entered (she has only logged onto a site with her ID and password and put some items in her basket for purchase)? Question 22 options: A) It is okay to stop her work and leave the site open. Since she has not yet arrived at the Pay information, her credit card information or pay type has not been entered. B) Close the lid on the laptop. In most cases this will put the computer in hibernate mode (closes programs and shuts down the computer. All the programs and web pages that were open will restart when the laptop is opened again.). Some information might be lost on the order page, but that is safer than exposing her PII. C) Exit all programs and shut down the compute

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 16:00, sdonachy7
You have inserted new slides based on a word outline. how do you format these new slides to match the powerpoint presentation formatting? a. select all slides in the presentation and click format on the home tab. b. select the new slides and click reset on the home tab. c. select all slides in the presentation and click reset on the home tab. d. select the new slides and click format on the home tab.
Answers: 3
image
Computers and Technology, 23.06.2019 04:31, Remba
Q14 what is most important for you to choose before you build a network? a. private network b. nos c. network media d. network protocol e. directory service
Answers: 1
image
Computers and Technology, 23.06.2019 13:50, mrfishyyyy
Explain how email technologies enable the exchange of messages between users. find out the typical parts of an email address and explain each part.
Answers: 1
image
Computers and Technology, 23.06.2019 14:30, ahmedeldyame
Select the correct answer. which step can possibly increase the severity of an incident? a. separating sensitive data from non-sensitive data b. immediately spreading the news about the incident response plan c. installing new hard disks d. increasing access controls
Answers: 2
You know the right answer?
Sara is using her personal laptop (which is password protected) at a "hotspot" at a local cafe with...

Questions in other subjects:

Konu
Mathematics, 06.11.2020 01:00