1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
4 years ago
10

For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally iden

tifiable information. Sierra uses a long pass phrase such as "A stitch in time saves 9" with special characters between the words for her bank account password.
Computers and Technology
1 answer:
a_sh-v [17]4 years ago
8 0

Answer: it is good practice

Explanation: Even if you are able to guess the phrase that Sierra uses, you will find it very difficult to write them exactly as she does hence you cannot have access to her bank account

You might be interested in
What virtual, logically defined device operates at the data link layer to pass frames between nodes?
GalinKa [24]

The vSwitch (virtual switch) or bridge is a logically defined device that operates at the Data Link layer to pass frames between nodes.

<h3 /><h3>What is vSwitch (virtual switch) or bridge?</h3>

One virtual machine (VM) can communicate with another through the use of a virtual switch (vSwitch), which is a piece of software. Additionally, virtual switches are used to connect physical and virtual networks and to transport a VM's traffic to other VMs or a physical network.

Virtual machines (VMs) are linked to both virtual and physical networks using a virtual switch. This enables data traffic interchange between virtual machines as well as between those machines and the organization's intranet and the internet.

On the other hand, virtual switches serve as immaterial pieces of software that make it possible for network elements like virtual computers to communicate with one another.

To learn more about virtual switch, refer to:

brainly.com/question/28301699

#SPJ4

4 0
2 years ago
What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?
denpristay [2]
A domain network would be the answer
6 0
3 years ago
Explain what a surrogate key is.
Irina18 [472]

answer - surrogate key is a unique identifier used in databases for a modeled entity or an object. It is a unique key whose only significance is to act as the primary identifier of an object or entity and is not derived from any other data in the database and may or may not be used as the primary key.

4 0
3 years ago
You are an administrator for a large corporation and you are responsible for deploying computers often and quickly. Which server
sashaice [31]

Answer:

The deployment method to use is called Zero touch deployment

Explanation:

Zero-touch deployment or installation is considered as a high volume installation procedure for large and medium organizations. Many computers are configured remotely through the help of the command line. With this process computers are deployed often and quickly because the installations are automated.

The benefits of zero-touch deployment include the following:

  1. Easy distribution of computer resources. Resources are scarce in business, hence, there is a great need to be able to recycle business resources as often and quickly as possible.
  2. Reduces operational costs. Businesses are focused on reducing the operational cost to the barest minimum because deployment can be easily managed by internal staff, deploying zero-touch deployment will greatly reduce operational cost.
5 0
3 years ago
The Go To feature can be accessed from which of the following dialog boxes?
Aliun [14]

Answer:

hoose the answer.

•Font

•Open

•Insert Hyperlink

Explanation:

4 0
3 years ago
Other questions:
  • What is the slide sorter view used for?
    11·1 answer
  • Quien invento el primer vehiculo con motor?
    15·2 answers
  • The creation of​ __________ with digital media allows for large quantities of numerical or textual data to be searched online by
    10·2 answers
  • Using for loop . Input an integer and identify whether it's EVEN OR ODD ( without using modulo operator )
    9·1 answer
  • Which of the following is true about radio waves? They have short wavelengths. They have high energies. They reveal hot gases. T
    10·2 answers
  • ______ norms are usually unstated rules that regulate members' interaction.
    12·1 answer
  • What type of system is associated with weather that has lots of clouds and thunderstorms with the possibility of tornadoes?
    10·1 answer
  • Help Me<br><br> What are the four types of graphic models?
    10·1 answer
  • Match the following internet related terms to their definition
    13·1 answer
  • give the tightest asymptotic bounds you can for the following recurrences and provide a short explanation for your solution. you
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!