1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
4 years ago
10

For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally iden

tifiable information. Sierra uses a long pass phrase such as "A stitch in time saves 9" with special characters between the words for her bank account password.
Computers and Technology
1 answer:
a_sh-v [17]4 years ago
8 0

Answer: it is good practice

Explanation: Even if you are able to guess the phrase that Sierra uses, you will find it very difficult to write them exactly as she does hence you cannot have access to her bank account

You might be interested in
This is computer and programming
miv72 [106K]

Answer:yes

Explanation:because

3 0
3 years ago
Read 2 more answers
9,105,?,161,?,241,257,?,401​
almond37 [142]
What is the question……..
4 0
3 years ago
Read 2 more answers
Can someone help me please ​
Romashka [77]

Answer:

this is more up to you on what you think you are good at and what you need to develop in.

6 0
3 years ago
What is the instruction phase of the central processing unit​
belka [17]

Answer:

The instruction cycle (also known as the fetch–decode–execute cycle, or simply the fetch-execute cycle) is the cycle that the central processing unit (CPU) follows from boot-up until the computer has shut down in order to process instructions.

7 0
3 years ago
____________ describes all the communication channels that allow community-based input, interaction, content-sharing and collabo
vladimir1956 [14]

Answer:

Social media.

Explanation:

The social media is an online platform that provides its users with the web application interface for easy communication. Since it is online, the user must subscribe to a ISP service, create an account on the social media website, and optionally download it's application on the device for easy access.

User accounts are secured with a username and password. The user on the site can share graphic, video, audio and text content, interact with friends etc.

7 0
4 years ago
Other questions:
  • Suppose the program counter (pc) is set to 0x2000 0000. is it possible to use the jump (j) mips assembly instruction to set the
    15·1 answer
  • Can someone help me? Thanks.
    10·1 answer
  • How do you send a private message on facebook to someone who is not your friend?
    9·1 answer
  • How do i set up a RAID 1 array?​
    6·1 answer
  • To increase the view of a document on the screen, use the _____. View icon Zoom slider full-screen reading boldface font
    9·1 answer
  • "Two technicians are discussing FWD driveshaft service. Technician A says that removal of the driveshaft usually requires partia
    15·1 answer
  • "When an interrupt or a system call transfers control to the operating system, a kernel stack area separate from the stack of th
    11·1 answer
  • When discussing the data-modeling building blocks, anything (a person, a place, a thing, or an event) about which data are to be
    15·1 answer
  • If an additional term relates to payment, quality, quantity, price, time, and place of delivery, the CISG considers the added te
    12·1 answer
  • Print numbers 0, 1, 2, ..., userNum as shown, with each number indented by that number of spaces. For each printed line, print t
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!