1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrMuchimi
3 years ago
15

Why is it more secure to require a user to press ctrl+alt+delete to log on rather than displaying the windows welcome screen?

Computers and Technology
1 answer:
Levart [38]3 years ago
5 0
Let's say for example you have a toddler, or a pet. Let's say a cat. If the ctrl+alt+delete wasn't there. It would go straight to entering the password. Now let's say your child or pet likes to press the keys for a while. If they manage to press enter and enter the incorrect password. Eventually it will lock up your computer.
You might be interested in
Your ___________ is what you can see without the presence of an obstruction.
SCORPION-xisa [38]

Answer:

Line of sight

Explanation:

Your line of sight is the noticeable path of travel from your vehicle to your destination area. This line can be obstructed by a curve, a hill, high-forest wooded zones, large trucks, or other obstruction that prevents drivers from seeing the vehicle ahead. Therefore, if you cannot see around an obstruction, you should slow down and be willing to adjust your position until you can reestablish a clear line of sight to your path of travel and targeting area.

8 0
3 years ago
All of the following are search operators EXCEPT _______________. a. AND b. OR c. NOT d. GET
ella [17]
D is ur answer. Hope this helps
5 0
4 years ago
Read 2 more answers
An important result of the development of anesthesia was?
Ksju [112]
It could be #2 since the patient would be asleep under the anesthesia they would be able to perform amputations more often since the patient would not be able to feel the pain during the procedure. It could also be #3 because if the patient is asleep you could use a more direct approach instead of avoiding certain procedures that would put the patient in a lot of pain if it was performed while they were awake. In all I would say the answer is #2, please comment which is the right answer, thank you.
7 0
4 years ago
Which block is an example of sequencing
Zepler [3.9K]

Answer:

B. go to x: -100 y: -100

   glide 2 secs to x: 0 y: 0

   say Let the show begin! for 2 secs

   play sound snap until done

Explanation:

Algorithms in computer programming are step-by-step processes that show how problems can be solved. To accomplish this, Sequencing, Selection, and Iteration are methods applied. Sequencing specifies the correct order in which activities are to be performed to obtain the right results. Failure to adhere to that order or reverse the steps will cause a deviation from the true result.

In the example above, the steps to perform an operation are specified to the computer. When the steps are correctly followed, the right results will be obtained.

8 0
3 years ago
The McCumber Model is a cube with three faces; each face has three items. It is intended to cause us to think about three areas
bagirrra123 [75]

Answer:

The three faces are information states, security goals, countermeasures.

Explanation:

Each face has different subjects about Informatics security, we will start with:

Information States

Storage is how we save data, for example, USB or hard drive.

Transmission is how we transfer data.

Process is how we make operations with data.

Security goals

Confidentiality is not showing data to unauthorized people.

Integrity is not modified data accidentally.

Availability is access to data timely.

Countermeasures

Politics is saving data with rules.

Human factors is training people in Informatics security.

Technology is software or hardware for Informatics security.

8 0
4 years ago
Other questions:
  • Please help! I have no idea how to make a chart like this in Google Sheets, any help is appreciated! :)
    15·1 answer
  • Which of the following are possible ways to
    6·2 answers
  • 11. The golden rule of safe driving is: A. Always drive at the posted speed limit B. Never drive while physically or mentally im
    15·1 answer
  • To answer the research question "How am I going to find the information I need on the tople?" the best thing Georgia should
    15·1 answer
  • LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be
    9·1 answer
  • Explain the simliparities or difference between a workbook , worksheet and spread sheet​
    5·1 answer
  • 9. Differentiate between bolding and highlighting<br>text.<br>(2 marks)​
    15·2 answers
  • Worksheet-I • Make a list of 10 application software and 5 utility programs installed in your computer, along with their uses. U
    9·1 answer
  • A user may enter some text and the number of times (up to a maximum of 10) to repeat it. Display the text repeated that many tim
    12·1 answer
  • which two host names follow the guidelines for naming conventions on cisco ios devices? (choose two.)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!