1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
3 years ago
8

Which practice is the best option for desktop security?

Computers and Technology
2 answers:
ziro4ka [17]3 years ago
6 0
You should make a unique password and change it daily
Virty [35]3 years ago
5 0

Answer:

A.Make a unique user ID and password for each account.

Explanation:

If you make a unique used ID and password for each account you will have the desktop personal and no one but the owner of that account and user Id will be able to access to it, that makes it more private and you can storage there important information. That would be the best option.

You might be interested in
Hi question
lapo4ka [179]

Answer:

I believe it's 20% I could be wrong just thinking of it many teenagers don't really come out and say anything and are too afraid to tell anyone by possibly being wrong or putting themselves into more danger

6 0
3 years ago
Write a Python function LetterGame() that repeatedly asks the user to input a letter. The function is to count the number of vow
kotegsom [21]

Answer:

def LetterGame():

   vowels = ["a", "e", "i", "o", "u", "A", "E", "I", "O", "U"]

   count1 = count2 = 0

   while True:

       choice = input("Enter a letter / digit to stop: ")

       if choice.isdigit():

           break

       elif choice.isalpha():

           count1 += 1

           if choice in vowels:

               count2 += 1

   print("You entered " + str(count1) + " letters, " + str(count2) + " of which weere vowels.")

   print("The percentage of vowels was " + str(count2 / count1 * 100) + "%")

LetterGame()

Explanation:

Create a function called LetterGame

Inside the function:

Create a list of vowels

Initialize count1, counts the total letters, and count2, counts the vowels

Initialize a while loop that iterates until the specified condition is met in the loop

Get the input from the user. If it is a digit, stop the loop. If it is an alphabet, increase the count1 by 1, and also check if it is a vowel. If it is a vowel, increment the count2 by 1

When the loop is done, print the required information

Finally, call the function

4 0
3 years ago
An animal shelter recently held an adoption event and found homes for 48 of their shelter animals. If they found home for 80% of
vredina [299]

Answer:

9.6

Explanation:

4 0
3 years ago
Read 2 more answers
Give the appropriate term for each of the following.1. An easy-to-remember address for calling a web page (like www.code.org). 2
Nimfa-mama [501]

Answer:

1. URL (Universal Resource Locator)

2. DNS (Domain Name System)

3. Network

4. Packets

5. The Internet Engineering Task Force (IETF)

6. Bit

7. HTTP (Hypertext Transfer Protocol)

8. Protocol

Explanation:

1. "URL is the address of a World Wide Web page."

2. "DNS: The service that translates URLs to IP addresses. IP Address: A number assigned to any item that is connected to the Internet."

3. "A network is defined as a group of two or more computer systems linked together."

4. "In Information technology, a packet is collection of data that can be used by computers which need to communicate with each other, usually as part of a network."

5. "The Internet Engineering Task Force is an open standards organization, which develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite."

6. "A bit (short for binary digit) is the smallest unit of data in a computer. A bit has a single binary value, either 0 or 1"

7. "Hypertext Transfer Protocol provides a network protocol standard that web browsers and servers use to communicate."

8. "A network protocol defines rules and conventions for communication between network devices. Network protocols include mechanisms for devices to identify and make connections with each other, as well as formatting rules that specify how data is packaged into sent and received messages."

Hope this helps! <3

4 0
3 years ago
what are Include the data on usage you gather from your interactions with friends or by listening to people on the radio or on T
borishaifa [10]

Answer:

This has happened many times. I am quite close to my friends. I once asked for making a wood baked Pizza at one of my friends’ houses. Unfortunately. He didn’t have the setup. I was feeling bad as well. However, to add to my relief, he didn’t say he will not make. He also didn’t say he didn’t have the oven. And those double negatives made me happy as I didn’t wanted my friend to take this pain as he had to give an exam after 2 days. However, he even didn’t said he will not order for it. And that double negative confirmed for us a pack of two wood baked pizzas with fountain Pepsi, an hour later. And I was very happy as my friend was able to fulfill the promise.

On TV as well, I have heard a lot of double negatives during NBA matches, and especially on the radio. However, I must say double negatives sometimes happen as certain people are very sensitive, they do not ever want to say no.

Explanation:

Please check the answer.

7 0
3 years ago
Other questions:
  • Who is known as the father of computer? ​
    6·2 answers
  • To track conversions in an app, you can add the firebase sdk to your app. sdk stands for:
    5·1 answer
  • DJ Davon is making a playlist for an internet radio show; he is trying to decide what 1212 songs to play and in what order they
    12·1 answer
  • Which term is used to describe a public-key, cryptography-based mechanism for proving the source (and possibly integrity) of a d
    12·2 answers
  • Write a simple hello world program in python 3
    8·2 answers
  • Design the program that reads two files and compares their contents. The program calls a method that reads the file one line at
    10·1 answer
  • What is computer system<br>explain the role of bank in computer<br>​
    15·2 answers
  • What are titles that i should talk about in my ppt about history of computer science???????
    13·1 answer
  • If you answer these questions correctly I will mark you BRAINLIST.
    7·1 answer
  • Does anyone know how to by pass this pls help?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!