1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
3 years ago
8

Which practice is the best option for desktop security?

Computers and Technology
2 answers:
ziro4ka [17]3 years ago
6 0
You should make a unique password and change it daily
Virty [35]3 years ago
5 0

Answer:

A.Make a unique user ID and password for each account.

Explanation:

If you make a unique used ID and password for each account you will have the desktop personal and no one but the owner of that account and user Id will be able to access to it, that makes it more private and you can storage there important information. That would be the best option.

You might be interested in
Which statement describes a characteristic of SRAM in a PC?
svlad2 [7]

It is used for cache memory.

Further Explanation:

Cache memory is the memory that stores the instructions and data that is used repeatedly. If the processor wants some data it first looks into cache memory then the processor doesn't has to look into the main memory for the data or instructions which is more time consuming. As the SRAM uses small but a constant source of power, it is usually used for making cache memories. Moreover it is benficial to keep the previously used data in SRAM(Which is faster) than acessing DRAM (Which is way more slow than SRAM.

  • Learn more about RAM in brainly.com/question/10602589
  • brainly.com/question/5159824
  • brainly.com/question/6062548

#LearnwithBrainly

8 0
3 years ago
During the troubleshooting of a pc that will not boot, it is suspected that the problem is with the ram modules. The ram modules
SOVA2 [1]

The RAM modules were not well placed or fitted firmly in the motherboard DIMM slots of the PC during toubleshooting.

What are RAM Modules?

RAM Modules have narrowly printed circuit boards that hold RAM chips (memory chips).

In order to function properly, RAM is expected to be placed or fitted firmly in the motherboard DIMM slots.

DIMM (Dual In-line Memory Module) is a module that contains one or several random access memory (RAM) chips on a small circuit board with pins that connect it to the computer motherboard.

Learn more on RAM Module here:

brainly.com/question/13308897?referrer=searchResults

#SPJ4

8 0
1 year ago
Which language should you use to add functionality to web pages?
Ede4ka [16]
The anwser is either javascript or HTML
3 0
3 years ago
Read 2 more answers
Internet service providers​ (isp) need to resolve customer problems as quickly as possible. for one​ isp, past data indicates th
I am Lyosha [343]
I think that the likelihood will still be 0.8 as that means that 8 out of 10 calls will be resolved within one hour so the 7 out of 10 falls within that likelihood so therefore the callers can go by that assumption and be fairly confident that they have quite a high likelihood of having their problems resolved within one hour.
3 0
3 years ago
Read 2 more answers
Which option can be used to automatically scan a document to prepare it for publishing, identifying personal information that sh
lubasha [3.4K]

Answer:

Document Inspector  option can be used to automatically scan a document to prepare it for publishing, identifying personal information that should be removed

Explanation:

Document scanner: This converts the text written in the paper in to a digital form. Most probably it will convert the text in paper in to image only.

Document Inspector is the tool which removes the personal information while sharing the document. The personal information can be name, mail id, phone number etc. This personal information though hidden will get reflected while publishing and this document inspector allow us to protect these data from sharing.

Privacy manager: This is a software reducing the risk of unauthorized access of data

Security manager: This once again protect the document.

4 0
4 years ago
Other questions:
  • The domain name is passed to a domain name server, which maps it to the correct IP address, and then the code behind the page is
    12·1 answer
  • How to transfer photos from iphone to iphone?
    14·2 answers
  • Under what circumstance should you always let Windows manage the paging file size when running Windows Server 2012 and newer?
    15·1 answer
  • Before a computer can store a real number in memory, it must be encoded in __________.
    14·1 answer
  • Which device can be installed on the edge of your network to allow multiple remote users to connect securely to your internal en
    9·1 answer
  • When choosing a new computer to buy, you need to be aware of what operating ____a0 it uses.
    13·1 answer
  • 3. Under which of the following categories does the artwork fall? ( 1 point )
    11·2 answers
  • IoT is the interconnection of what?<br> Hardware<br> Networks<br> Everyday devices<br> Cables
    10·1 answer
  • It is important to extract the Eclipse executable file from the .zip file in the Programs folder of your C:\ drive.
    6·1 answer
  • Join my among us <br><br> code GNLMJF
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!