1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
4 years ago
10

For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally iden

tifiable information. Sierra uses a long pass phrase such as "A stitch in time saves 9" with special characters between the words for her bank account password.
Computers and Technology
1 answer:
a_sh-v [17]4 years ago
8 0

Answer: it is good practice

Explanation: Even if you are able to guess the phrase that Sierra uses, you will find it very difficult to write them exactly as she does hence you cannot have access to her bank account

You might be interested in
Read the PIC Data sheet Chapter 2.0 and 3.0 2. List at least 3 big differences between the Flash and RAM 3. How many RAM locatio
Alex Ar [27]

Answer: Incomplete question

Explanation: The question attached is incomplete and incoherent, possible solution of this will be difficult to assume. Take adequate time to post complete questions.

Regards.

4 0
3 years ago
As a general rule, what is the size of a brochure?
svlad2 [7]
The general size of a brochure is 8.5x11 when open or flat. Typically they are broken into three segments though!
5 0
4 years ago
The development of online capabilities created the ________, an information- and communication-based electronic exchange environ
Reil [10]

It should be noted that development of online capabilities created the marketspace, where an information- and communication-based electronic exchange is been done.

The digital market place  serves as the environment occupied by sophisticated computer and telecommunication technologies and digital offerings.

<h3>What is a marketspace?</h3>

marketspace can be regarded as a place where buying and selling takes place and this could be digital in nature.

Learn more about marketspace at;

brainly.com/question/11408596

5 0
2 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
4 years ago
1. Select two forms of case designed suitable for ATX power supply and
jekas [21]
The answer should be c
4 0
3 years ago
Other questions:
  • HELP ME RIGHT NOW !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    8·1 answer
  • A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is true if the el
    10·1 answer
  • On other questions, how do I write my own question, without commenting on others questions? It is only allowed two, I think, the
    13·1 answer
  • Conduct online research to determine specific conflict-resolution and management techniques and skills that would be beneficial
    5·1 answer
  • As the operations manager for a supermarket chain, Mai needs to find a telecommunications technology that: enables managers in r
    9·1 answer
  • _____ remove the part of an image starting from an edge​
    13·1 answer
  • Compared to a virtual image, a real image
    15·2 answers
  • True or false? Colons are required when entering the MAC address into the Reservation window?
    14·1 answer
  • What are the process of boots up a computer?​
    15·2 answers
  • T/F static development is the process of constructing the programs and code modules that serve as the building blocks of the inf
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!