1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
4 years ago
14

Ronald attended a seminar about the best practices to use when browsing the Internet. The presenter used the following statement

in his discussion. However, Ronald missed a couple of words. Help him find them.
“When using a public computer for browsing the Internet, try to use [one-time password, single sign on, multiple accounts, different computers, or repeated sign-ins] for transactions. Also, use [public, open, secure, restricted, or shared] browsing whenever you can.”
Computers and Technology
2 answers:
Salsk061 [2.6K]4 years ago
8 0

Answer:

Ronald missed the words: One-time password, Secure  

Explanation:

Whenever we use public computer, there are possibilities to steal the user data by hackers. It might not be safe to use as like we have protection in personal or Office computers. But when a situation arises to use a public system, it is always recommended to use one-time password so that the logins are not misused thereafter.

Even if the hackers try to misuse, the user will get a message / authentication reply to use the login and thus we are safe. Also, always browse only secured website ie. “https”.

Leona [35]4 years ago
7 0

Answer:

When using a public computer for browsing the Internet, try to use ONE-TIME PASSWORD for transactions. Also, use SECURE browsing whenever you can.

Explanation:

You might be interested in
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
navik [9.2K]

Answer:

False

Explanation:

The Security Development Life Cycle (SDLC), is a software development which involves traditional approach towards its design such as, waterfall model, Agile, etc.

It can either be referred to as a generic secure development life cycle or a specific one, such as the Microsoft SDL or the Cisco SDL.

Its phases includes,

A1 - Security Assessment

A2 - Architecture

A3 - Design and Development 1

A4 - Design and Development 2

A5 - Ship

PRSA - Post Release

Each phase talks about how a secured software is developed.

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. This statement is false because by definition and attributes Security Development Life Cycle is a traditional approach towards software development and not a general method.

6 0
3 years ago
Which of the following is an HTTP response status type?
andrey2020 [161]

Answer: All of the above

Explanation:

200 OK, 301 permanently moved and 400 bad request all are the Hyper text transfer protocol (HTTP) response status type. The HTTP response status types basically indicated the complete request in the HTTP.

All these given types are the responses and request that are involved in the HTTP status type.

200 OK is one of the request which basically depends upon the HTTP status type success.

301 permanently moved is the response in the URL which are used for permanently change the resources of request.

And 400 bad request is not properly understand by server due to the invalid syntax in the HTTP.

6 0
4 years ago
Why should information technology NOT be taught in school?​
tatiyna

Explanation:

Technology should not be used to teach in school as it can lead to distractions. With kids wanting to explore other sights, cheating, and communicating with others. Also, it can be expensive to purchase the technology for everyone as it can be a major investment with hundreds or thousands going into it. Technology also requires a lot of training by having to adapt lessons compatible with the systems and making sure the software is secure.

5 0
3 years ago
Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool
rosijanka [135]

Answer:

Set up audit trail

Explanation:

The administrator should set up an audit trail in order to get this information.

An audit trail would give him the record of all the configuration changes that have been made in a file or a database in the last 6 months.

Audit trails can be manual or electronic. It provides history and also documentation support. It can authenticate security and also help to mitigate challenges.

4 0
3 years ago
tiny electrical paths to connect everything together is called ? A. graphic card B. audio card C. CPU D. Motherboard
k0ka [10]

Answer:

Option C, or the CPU.

Explanation:

The audio card simply translate code into sound, the graphic card turns code into graphics, CPU runs electric through tons of little electric pathways, and the motherboard is the object of which all of the above are rested on and connects them together.

8 0
2 years ago
Other questions:
  • How can you best utilize CSS for Web Development?
    6·1 answer
  • A ____ appears at the bottom of your e-mail messages and contains standard information about yourself that the recipient can use
    5·1 answer
  • Linux would be a good example of?
    6·1 answer
  • doubleIt is a function that takes one argument and returns no value . The argument is a pointer to int . The function doubles th
    9·1 answer
  • Write a program that reads a person's first and last names separated by a space, assuming the first and last names are both sing
    10·1 answer
  • Ohanians “great big secret” is that:
    8·1 answer
  • hey guys just dropped some hot beats so go and follow me my user is the beats and comment if you would do that that would be gra
    11·1 answer
  • <img src="https://tex.z-dn.net/?f=%20%5Cfrac%7Bx%7D%7B1%20%2B%20x%7D%20%20%2B%20%20%5Cfrac%7Bx%20%2B%201%7D%7Bx%7D%20%20%3D%20%2
    15·2 answers
  • A occurs when you reset a mobile device but retain your installed applications and personal settings
    10·2 answers
  • A company is acquiring a smaller firm and is setting up a new IT system in order to consolidate the data and assets of the acqui
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!