1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
4 years ago
10

For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally iden

tifiable information. Sierra uses a long pass phrase such as "A stitch in time saves 9" with special characters between the words for her bank account password.
Computers and Technology
1 answer:
a_sh-v [17]4 years ago
8 0

Answer: it is good practice

Explanation: Even if you are able to guess the phrase that Sierra uses, you will find it very difficult to write them exactly as she does hence you cannot have access to her bank account

You might be interested in
Which three decisions might a specialized drone delivering medical supplies make once it's algorithm has started and it is scann
densk [106]

The decisions that a specialized drone delivering medical supplies make once it's algorithm has started and it is scanning its surround are:

  • A  tilt backyard when sensor detects an obstacle within 10 feet.
  • To disable self flying and alert pilot when sensor detects an obstacle within 3 feet.
  • To resume normal speed when sensor doesn't detect an obstacle within two feet.

<h3>How are drones used in healthcare?</h3>

Hospitals are known to have started  using drones to transport laboratory samples and also to carry out other kinds of humanitarian aids.

The use of  drones  is said to be one that is cost-effective and it is one that bring blood products, vaccines, medical supplies, and others to rural areas or areas that has small infrastructure.

A drone can find way to move around obstacles but they should not shut down where there is obstacle.

Learn more about drone from

brainly.com/question/24530012

5 0
3 years ago
A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
AnnyKZ [126]
You have a raspberry pi connected to all the sensors and a code running to  trigger if the sensors are triggered. Each sensor and keypad would run to a different input on the pi. They should al be able to be powered with a single cell lipo. Is that what you are asking?
5 0
3 years ago
Describe the features of agile modeling​
Allushta [10]

Answer:

si gigi hadid tapos si bella poarch

Explanation:

7 0
3 years ago
List and describe the three types of cloud models described by Microsoft.
anygoal [31]

There are three main service models of cloud computing – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). There are clear differences between the three and what they can offer a business in terms of storage and resource pooling, but they can also interact with each other to form one comprehensive model of cloud computing.

aaS (Infrastructure as Service)

This is the most common service model of cloud computing as it offers the fundamental infrastructure of virtual servers, network, operating systems and data storage drives. It allows for the flexibility, reliability and scalability that many businesses seek with the cloud, and removes the need for hardware in the office. This makes it ideal for small and medium sized organisations looking for a cost-effective IT solution to support business growth. IaaS is a fully outsourced pay-for-use service and is available as a public, private or hybrid infrastructure.

PaaS (Platform-as-a-Service)

This is where cloud computing providers deploy the infrastructure and software framework, but businesses can develop and run their own applications. Web applications can be created quickly and easily via PaaS, and the service is flexible and robust enough to support them. PaaS solutions are scalable and ideal for business environments where multiple developers are working on a single project. It is also handy for situations where an existing data source (such as CRM tool) needs to be leveraged.

SaaS (Software as a Service)

This cloud computing solution involves the deployment of software over the internet to variousbusinesses who pay via subscription or a pay-per-use model. It is a valuable tool for CRM and for applications that need a lot of web or mobile access – such as mobile sales management software. SaaS is managed from a central location so businesses don’t have to worry about maintaining it themselves, and is ideal for short-term projects.

3 0
3 years ago
persisting clumps of clippings can cause the turf below to yellow and possibly die. this phonomenon is called _________________
SOVA2 [1]

The turf below may turn yellow and even die as a result of persistent clumps of clippings. The silo effect is the name given to this phenomenon.

<h3>What is the business silo effect?</h3>

The term "silo effect," which is used frequently in the business and organizational communities to describe a lack of communication and shared objectives between departments in an organization, is used to describe this situation. Employee groups that typically operate independently within an organization are referred to as silos.

<h3>Silo mentality definition?</h3>

A silo mentality occurs when different teams or team members within the same organization purposefully withhold important information from other employees. This silo mentality undermines a company's unified vision and prevents long-term objectives from being reached.

To know more about clumps of clippings visit:-

brainly.com/question/29454362

#SPJ4

5 0
1 year ago
Other questions:
  • Which area of the network would a college it staff most likely have to redesign as a direct result of many students bringing the
    10·1 answer
  • Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or t
    14·1 answer
  • Which of the following statements describes a good reason to use lossless audio compression?
    6·1 answer
  • In a distributed database system, the data placement alternative with the highest reliability and availability is Group of answe
    9·1 answer
  • How old was the mummy where they found a wooden prosthetic toe on him?
    6·1 answer
  • Write a python program to accept a number and check whether it is divisible by 4 or not​
    10·1 answer
  • Match each term in the second column with its correct definition in the first column. Write the letter of the term on the blank
    12·1 answer
  • How does this happen on brianly???
    5·2 answers
  • Is it possible build a real time machine?
    7·2 answers
  • Have the javascript function CountingMinutes(str) take the str parameter being passed which will be two times (each properly for
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!