Get premium membership and access questions with answers, video lessons as well as revision papers.
1. Make sure you use different passwords for each of your accounts.
2. Be sure no one watches when you enter your password.
3. Always log off if you leave your device and anyone is around—it only takes a moment for someone to steal or change the password.
4. Use comprehensive security software and keep it up to date to avoid keyloggers (keystroke loggers) and other malware.
5. Avoid entering passwords on computers you don’t control (like computers at an Internet
Titany answered the question on November 30, 2021 at 07:29
- John was required to install communication software for his company, Outline four factors that he should consider before installing the software, other than cost(Solved)
John was required to install communication software for his company, Outline four factors that he should consider before installing the software, other than cost
Date posted: November 30, 2021. Answers (1)
- Network design is a very important phase in networking. Explain three objectives to be attained by the phase(Solved)
Network design is a very important phase in networking. Explain three objectives to be attained by the phase
Date posted: November 30, 2021. Answers (1)
- Outline factors to consider when selecting transmission media over cost(Solved)
Outline factors to consider when selecting transmission media over cost
Date posted: November 30, 2021. Answers (1)
- Distinguish between hub and switch as used in networking(Solved)
Distinguish between hub and switch as used in networking
Date posted: November 30, 2021. Answers (1)
- Outline disadvantages of hybrid topology networks(Solved)
Outline disadvantages of hybrid topology networks
Date posted: November 30, 2021. Answers (1)
- Outline advantages of hybrid topology networks(Solved)
Outline advantages of hybrid topology networks
Date posted: November 30, 2021. Answers (1)