1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GuDViN [60]
3 years ago
15

Company ABC has always used passwords to protect the highly confidential information in their company. Recently, someone who was

unauthorized accessed the company's confidential information. In one to two sentences, describe what Company ABC should do.
Computers and Technology
1 answer:
Leno4ka [110]3 years ago
3 0
Company ABC should use passwords but also have them use a code so that not just anyone can get in. Kinda like facebook.
You might be interested in
Pda bkhhksejc pnwjoynelp dwo xaaj ajykzaz ywj ukq zaykza ep???<br><br><br> The Key Value is 22
Sindrei [870]

Answer:

The following transcript has been encoded can you decode it???

Explanation:

It is a ceasar cipher. Shift every letter in the alphabet by 22 positions.

3 0
3 years ago
Which activity represents a violation of the licensing agreement?
Lena [83]
A) <span>unauthorized duplication of software </span>
6 0
3 years ago
Read 2 more answers
Match the term with the appropriate definitions : Edge Computer Applications ANSWERED
WARRIOR [948]
It’s right, good luck.
7 0
2 years ago
Fill in the blank with the correct response.<br> A submenu in a text editor is indicated by a <br> .
igomit [66]

Answer:

triangle

Explanation:

7 0
3 years ago
In the SDLC's third phase, the way in which a proposed information system will deliver the general abilities described in the pr
kifflom [539]

Answer: Detailed

Explanation:

SDLC consist of 7 phases. They are:

1. Planning.

2. System analysis and requirement

3. Design:

4. Coding:

5. Testing:

6. Installation

7. Maintenance

Here we are talking of the third phase. In this phase it is the design phase which consist of high and low level design. Here the preliminary design is included in high level design where it describes the required hardware, software, network capabilities and the modelling of the interface. However the detailed design in low level design will implement the coding and will finding of any errors in the implemented design as described by the preliminary design.

3 0
3 years ago
Other questions:
  • In addition to the ping command, what other command is useful in displaying network delay and breaks in the path to the destinat
    5·2 answers
  • To connect multiple usb devices to a single usb port, a ____ can be used.
    12·1 answer
  • How does computer network work in a paragraph
    12·1 answer
  • The countryside presents
    11·1 answer
  • Which of the following is NOT a component of a DFD?
    8·1 answer
  • Compare the graphs. Find the value of h, k, or a.
    7·1 answer
  • How to change the microsoft word pages to black background
    8·1 answer
  • ____________ are designed to delete temporary files (such as deleted files still in the Recycle Bin, temporary Internet files, t
    10·2 answers
  • How does abstraction make programming languages easier to use
    15·1 answer
  • Which data type is the correct choice to store the names of all the hockey players who have scored 3 or more goals in a single g
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!