1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnoma [55]
2 years ago
15

The sticky notes often have strings of characters written on them that appear to be passwords. What can you do to prevent the se

curity risk that this practice presents
Computers and Technology
1 answer:
Varvara68 [4.7K]2 years ago
8 0
Educate the user on how to make strong passwords
You might be interested in
A(n) ________ network is a computer network that spans a relatively small area, allowing all computer users to connect with each
Kay [80]

Answer:

D) local area

Explanation:

Is a computer network that links devices within a building or group of adjacent buildings, especially one with a radius of less than 1 km.

5 0
3 years ago
Frank - as the Scrum Master of a Scrum Team - is invited for a Daily Scrum meeting at 9am. The teamgets together in front of the
Bezzdna [24]

The thing that Frank should do according to the options given is to Wait until the discussion is over.

<h3>What is a Scrum Master do?</h3>

A Scrum master is known to be a person who is said to often leads a team in course of a project through the use of Agile project management techniques.

Note that in the above scenario, Frank should wait until the discussion is over and then give a note of warning to the employee at fault.

See options below

What should Frank do?

A) Wait until the discussion is over.

B) Interrupt the discussion and organize a follow-up meeting directly after the Daily Scrum meeting.

C) Stop the discussion. The team member who started working on this particular task is responsible and he decides what and how to do with this.

All of the above

None of the above

Learn more about Scrum Master from

brainly.com/question/4763588

7 0
2 years ago
Assume the integer variable num has been assigned a valid value. What is the purpose of the following code segment?
Pie

Answer:

2

Explanation:

The num%4 operation returns the remainder, so only if num is not a multiple of 4, this value will be non-zero (it will be 1, 2 or 3).

7 0
3 years ago
Provide examples of how you can use a computerized
Alexus [3.1K]
File management systems are vital! For example, when you are developing a website, having a good file management system is critical for successful development.

Each file needs a corresponding folder where it can belong. When you are working on developing a website, you will be extracting files in your code from a certain directory. It's because of a good file management system that this is possible! =)
3 0
3 years ago
Which is the following should be selected in the paragraph dialogue box to prevent page break from occurring within a paragraph
Savatey [412]

Answer:

Explanation: keep lines together

6 0
3 years ago
Other questions:
  • Presentation guidelines state that slides should have no more than bullet points.
    9·2 answers
  • Tricia needs to tell her browser how to display a web page. What will she need to use? Compiler
    8·1 answer
  • 3. Find the product of (a² +3a+5) x (a+7)​
    7·1 answer
  • Kerry wants to save her file but give it a new name. Kerry should use the ____ command
    7·1 answer
  • Declare and implement a function called gameOver.gameOver receives a single 3x3 char[] [] array as a parameter, representing a t
    13·1 answer
  • Write a structured algorithm that prompts the user to input the name and price of an item and the quantity purchased. It should
    10·1 answer
  • Tasavvuf kelimesi soyut bir kelimedir.​
    7·1 answer
  • Python;
    6·1 answer
  • In critical thinking, an argument is:
    12·2 answers
  • How does a computer do its work? Mention its working principle.<br><br>​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!