1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
4 years ago
10

For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally iden

tifiable information. Sierra uses a long pass phrase such as "A stitch in time saves 9" with special characters between the words for her bank account password.
Computers and Technology
1 answer:
a_sh-v [17]4 years ago
8 0

Answer: it is good practice

Explanation: Even if you are able to guess the phrase that Sierra uses, you will find it very difficult to write them exactly as she does hence you cannot have access to her bank account

You might be interested in
Energía de movimiento de los átomos o moléculas
olasank [31]

Answer:

g

Explanation:

4 0
3 years ago
"Most of us know that when we come into a college classroom, we will see desks and chairs, a computer station and a projector. A
gayaneshka [121]
Accessibility... I think
3 0
3 years ago
You are leading a project that will collect vast amounts of data, which will need processing. In your research, you learn about
Helga [31]

Answer:

Grid Computing

Explanation:

Grid computing is a processor architecture that combines computer resources from various domains to reach a main objective. In grid computing, the computers on the network can work on a task together, thus functioning as a supercomputer.

Cheers

5 0
3 years ago
Read 2 more answers
Damean works as receptionist for a car dealership. The weekends are always a challenge for Damean because there are more custome
slavikrds [6]

Ineffective communication

3 0
3 years ago
Read 2 more answers
The technology Herman Hollerith created in the 1880s began the modern-day data processing function in computers.
ololo11 [35]

Answer:

punched-card machine

Explanation:

We know this as the punched-card machine, and it is also known as the Hollerith cards or the IBM cards. At that time, and through this technology, we used to punch a hole with hand or with the machine, and each hole used to represent the data and the instruction. And these were widely used for inputting the data in the early computers.

6 0
3 years ago
Other questions:
  • ​some forms use a _____ that contains icons or buttons that represent shortcuts for executing common commands.
    14·1 answer
  • There are many differenttypes of models, but an individual DSS can consist of onlyone.
    15·1 answer
  • The _____ establishes that the destination device is present on the network, verifies active service, and informs the destinatio
    13·1 answer
  • P**nhub or x-videos or other
    9·1 answer
  • Assume that the array arr has been defined and initialized with the values {4, 2, 5, 3, 1}. What are the values in the array arr
    15·1 answer
  • Write a method called min that takes three integers as parameters and returns the smallest of the three values, such that a call
    13·1 answer
  • Write a program that ask the user to enter air water or Steele and the distance that a sound wave will travel in the medium the
    9·1 answer
  • Microsoft vs Sony who wins ​
    13·2 answers
  • 32.
    9·1 answer
  • You are working with a database table that contains data about music. The table includes columns for track_id, track_name (name
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!