1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allochka39001 [22]
1 year ago
12

What do you think that private information like passwords pin number will be guarded or shared with the public? why?

Computers and Technology
1 answer:
konstantin123 [22]1 year ago
4 0

The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

<h3>Why should you use passwords to protect private information?</h3>

Passwords is known to be that factor that tends to give the first line of defense against any form of what we call illegal access to your computer and also that of one's personal information.

Note that the stronger a password of a person is, the more protected one can say that one's computer will be from any kind of hackers and malicious software.

Therefore one need to or one  should maintain the use of a strong passwords for all accounts that are present on your computer.

Hence, The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

Learn more about passwords from

brainly.com/question/17174600

#SPJ1

You might be interested in
I can create spreadsheets in Google Draw. False True
Over [174]
False, it's usually only in google sheets.
5 0
3 years ago
Read 2 more answers
Henry has created a software product that manages a database of company clients. He wants to install the software on a client's
UkoKoshka [18]

Answer:

The answer is " Run the software on the original web browser practically".

Explanation:

The Virtual servers enable you to run programming not programmed to the devices. Let's all presume which Henry's software will operate on computers but not on the mac. Since Mac is unable to run this software, it can practically install Linux on MC and install this.

  • The several common software applications such as parallels, VMware, and Virtual machines could be practically used during mac to install windows.
  • Its platform operating system from a macOS software perspective is a true physical computer with almost everything set.
5 0
2 years ago
Which of the following is true about advertisements?
katrin [286]

the answer is they often contain biases :)

3 0
2 years ago
Whats the next lyric,i baked you a pie,pie,pie
eduard
“oh boy what flavor”
4 0
2 years ago
Read 2 more answers
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
Other questions:
  • Illustrate the process of using an operating system to manipulate a computer’s desktop, files and disks.
    12·1 answer
  • Which of the following is considered information?
    6·2 answers
  • Design and implement your own simple class to represent any household item of your choice (toaster, fan, hair dryer, piano ...)
    11·1 answer
  • Match the challenge with the term or process that offers a solution.
    6·1 answer
  • What items do you keep in a data base
    5·1 answer
  • How can an administrator make only the files and folders to which a user has at least Read permissions visible?
    13·1 answer
  • All 24-point fonts take up the same amount of space on a slide. True False
    7·2 answers
  • Where do you define parameter variables?
    14·1 answer
  • Write a C program to input a character, then check if the input
    5·1 answer
  • To create an SSL connection, a Web server requires a ________, which is an electronic document that confirms the identity of a w
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!