1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
5

1. What should you do if your computer is shared by your entire family and you install a plugin that saves user names and passwo

rds on the computer?
2. How does having weak security on your browser represent the weakest link in a network?
These questions are from pltw.
Computers and Technology
2 answers:
Citrus2011 [14]3 years ago
7 0

Explanation:

1 make sure only you know the password

2 having weak security on one browser is basically a doorway for someone to get into your network

Natalka [10]3 years ago
7 0

Answer:

1. We should always sign out and get it ready for the next person 2. Having weak security on your browser can represent the weakest link in network because you should make up a stronger password.

Explanation:

You might be interested in
Project planning output is :
-Dominant- [34]

Answer:

A

Explanation:

The main output of Project palnning is project plan.

5 0
3 years ago
Use computer magazines and/or the internet to investigate one of these DBMSs: DB2, SQL Server, MySQL, Oracle, or Sybase. Prepare
tigry1 [53]

Answer:

The definition for the problem is listed in the section below on the explanations.

Explanation:

<u>For SQL Server</u>

  • Data Recovery: Data recovery is done well on SQL Server. It is achieved by the restoration method. Behind this, a sysadmin must reconstruct a collection of SQL backups throughout a restore series that is technically right as well as relevant.
  • Data Security: There are several approvals as well as limits for accessing main data objects or databases. These data are accessed only by the approved clients.
  • Concurrency Control: This is essentially synchronization of the evidence or information accessed by multiple users as well as from separate locations.

Concurrency or Competitiveness control becomes accomplished with SQL Server Portable, using locking to further improve security. The locking regulates how multiple individuals can simultaneously navigate & alter shared storage, without interfering with one another.

8 0
3 years ago
What information is displayed in the message header of a received message? Check all that apply.
Aleks04 [339]

Answer:

the subject of the message

the sender's name

the recipient's name

the date and time when the message was received

Explanation:

Various information is displayed in the header of the message of a received message. And they are the subject of the message, which briefs what is there inside the message. And it mentions the sender's name as well as the recipient's name, and finally, the date and the time as well are stated that explains exactly when the message was being received. And all this information is shown in the header of the message.

3 0
4 years ago
If you want to clear an operating system's temporary files for storage, performance, or privacy reasons, you should run a disk _
VashaNatasha [74]

Answer:

Cleanup is correct:)

Explanation:

8 0
3 years ago
You have just changed the system time within your computer's BIOS. You choose to save the settings upon exit. What happens next?
ozzi
When you were to choose the setting when exiting, the next step that would appear to happen would be the fact that the drive or the chip it's self would just stop. It would continue to work,but the main focus would be that it would not be functional.
4 0
3 years ago
Other questions:
  • A. True
    8·2 answers
  • Which of the following can indicate what careers will be enjoyable ?
    5·1 answer
  • Jemima is reviewing her history report and notices that her headings are not formatted the same throughout the report. She wants
    5·2 answers
  • Businesses finance their operations using a mixture of ______. debt,
    14·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    10·1 answer
  • If you want a user to actively participate in an online activity, create a web ______________.
    12·2 answers
  • What are common names for some primary discrete components used on circuit boards?
    13·1 answer
  • ¡Hola! He visto en muchos comentarios de Twitter "svd" cuando alguien dice "dale fav a este Tweet y siganse entre ustedes" y en
    8·1 answer
  • What is Ce stands for?
    8·1 answer
  • Computer science - algorithms - flowcharts
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!