Solution 2024.
By recycling electronics, you can help _____.
B. reuse valuable materials
C. keep toxic materials out of the water we drink
D. preserve limited resources
The goals of email spoofing include luring the user into _______.
A. clicking a link in the message
C. replying to the message
D. downloading malware
As a best practice, always navigate to sensitive accounts through links in email
messages you receive.
False
Using a lock screen limits unauthorized access to a device.
True
To use a security cable with a smartphone, you may need to add a(n) _______.
locking plate
For greater network security, leave encryption on your router turned off.
False
Full disk encryption protects _____.
a drive or device
Some web browsers do not support plug-ins.
True
Biometric input devices include _____.
A. numeric keypads
B. fingerprint readers
D. facial recognition scanners
Prolonged typing without sufficient breaks can cause nerve damage.
True
Before donating a computer, you should _____.
B. back up and transfer data to your new computer
C. securely remove your personal information
The ______ in flat panel fluorescent backlights is difficult to recycle.
mercury
To limit the potential damage from power spikes, use a(n) _______.
surge suppressor
Sandra has been getting multiple blank calls every day from an unknown caller.
She has also been getting rude emails from email addresses she does not
recognize, and intimidating messages on Facebook Messenger from a fake
profile. What can you conclude about Sandra?
She is a victim of cyberbullying.