1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GuDViN [60]
3 years ago
15

Company ABC has always used passwords to protect the highly confidential information in their company. Recently, someone who was

unauthorized accessed the company's confidential information. In one to two sentences, describe what Company ABC should do.
Computers and Technology
1 answer:
Leno4ka [110]3 years ago
3 0
Company ABC should use passwords but also have them use a code so that not just anyone can get in. Kinda like facebook.
You might be interested in
Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793?
Shkiper50 [21]

Answer:NULL Scan

Explanation:RFC 793(Request for comments) is a type of RFC command labeled with the number 793 which can operate with the TCP protocol.They are sort of document form which is from IETF( Internet Engineering Task Force ).

The null scan is scanning protocol used by legal as well as illegal hackers for working in the transfer control protocol architecture. It is used for the identification of the the ports and holes in TCP servers.they can also have the negative impact if used by the illegal hackers.

5 0
2 years ago
Order the steps needed to design a relational database.
tia_tia [17]

Answer:

1. List the fields needed to gain information

2. Break down the date into smaller parts

3. identify the fields holding stored data

4.distribute the fields into tables by subject

5. identify the common fields for linking tables

Explanation:

edge 2021

5 0
3 years ago
A binary search function is searching for a value that is stored in the middle element of an array. How many times will the func
Ganezh [65]

Answer: 1 time.

Explanation:

  • A binary function is also known as a half-interval search is a search algorithm to find the position of a given element x within a well-sorted array [].
  • Binary search compares the target value to the middle element of the array.
  • It ignores half of the elements just after one comparison.
  • it compares x with the middle element.

So, the function read an element <u>one time</u> in the array before finding the value.

3 0
3 years ago
Technician A says that Teflon sealing rings require special tools for proper installation. Technician B says that warming a Tefl
bezimeni [28]

Answer:Both Technicians A and B are correct.

Explanation:Teflon is a florinated polymer it is polytetrafluroethylene (PTFE). It is widely used in different fields and the making of materials for both home and industrial use. Teflon rings does requires special tools for proper installation which is called TEFLON RING INSTALLER.

Warming the a Teflon ring in water or oil at 130-140°F for about 5 minutes will help to soften the material for easier installation. cover wear ring grooves with plastic tape.

8 0
3 years ago
Someone help me
valkas [14]

The program is an illustration of loops.

Loops are used to perform repetitive and iterative operations.

The program in C++ where comments are used to explain each line is as follows:

#include <iostream>

using namespace std;

int main(){

   //This declares and initializes all variables

   string star = "*", blank = " ", temp;

   //The following iteration is repeated 8 times

   for (int i = 1; i <= 8; i++) {

       //The following iteration is repeated 8 times

       for (int j = 1; j <= 8; j++) {

           //This prints stars

           if (j % 2 != 0) {

               cout << star;

           }

           //This prints blanks

           else if (j % 2 == 0) {

               cout << blank;

           }

       }

       //This swaps the stars and the blanks

       temp = star;

       star = blank;

       blank = temp;

       //This prints a new line

       cout << endl;

   }

}

Read more about similar programs at:

brainly.com/question/16240864

5 0
2 years ago
Other questions:
  • If you define CSS rules on a parent control, the rules will be inherited by all of the children widgets.
    12·1 answer
  • If you are interested in joining the military, you can attend college _____. a. before serving b. during service c. after servic
    11·1 answer
  • Craig's annual take-home pay is $75,000. What is the maximum amount that he can spend per month paying off credit cards and loan
    7·2 answers
  • What are smart mobile devices
    11·1 answer
  • Entering the formula =SUM(C5:C18) in cell C19 will result in which of the following?
    10·1 answer
  • Why would Network Systems employees be employed by the government?
    12·2 answers
  • Who is the father of computer?​
    6·1 answer
  • a machine needs a minimum of 100 sec to sort 1000 names by quicksort what is the approximate worst case time needed to sort 100
    13·1 answer
  • Whats an MAR? lolz better not take my points #bonkers
    12·2 answers
  • Define a function below, posodd_number_filter, which takes a single numerical argument. Complete the function to return accepted
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!