1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
3 years ago
8

Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only

with trusted resources?A. Email addressB. Phone numberC. Mother’s maiden nameD. Last name
Computers and Technology
1 answer:
Margarita [4]3 years ago
4 0

Answer:

C. Mother’s maiden name

Explanation:

Although all of the options are sensitive information for a person, your mother's maiden name is something that has more privacy. Your <u>email</u> and <u>phone number</u> can be found on a site that you shared your resume, your <u>last name</u> can be found in your social media account, but it is unlikely that your <u>mother's maiden name</u> can be found on any sites. That is why it is the most sensitive one.

You might be interested in
Company Wizzy is having trouble with network security. Issues with authentication, viruses, malware/spyware, and other network i
Darya [45]

Answer:

B) security as a service I'm just doing the work

4 0
3 years ago
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
When entering numbers that start with a zero, apply the _____ number format.
yuradex [85]

Answer:

The Answer is gonna be D. Zero decimal

3 0
3 years ago
(Q003) The difference between a parameter and an exogenous variable is that Group of answer choices a parameter is allowed to ch
ozzi

Answer:

a parameter is fixed over time, while an exogenous variable is allowed to change over time.

Explanation:

A parameter can be defined as a value that can be passed to a function. Thus, a parameter refers to a value that must be passed into a function, subroutine or procedure when it is called.

This value can be passed to a function either by reference or by value.

Basically, parameters can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.

A variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited. Thus, a variable stores information which is passed from the location of the method call directly to the method that is called by the program.

An exogenous variable can be defined as a that's independent of other variables in a system i.e it's not affected by other variables.

This ultimately implies that, the difference between a parameter and an exogenous variable is that a parameter is fixed over time, while an exogenous variable is allowed to change over time and as such it has a relationship with other variables in a system.

3 0
3 years ago
Write an algorithm to find the area of a parallelogram​
xeze [42]

Answer:

a = bh

Explanation:

a = Area
b = Base

h = Height

8 0
3 years ago
Other questions:
  • Given the integer variables x and y, write a fragment of code that assigns the larger of x and y to another integer variable max
    5·1 answer
  • Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
    12·2 answers
  • Suppose that class OrderList has a private attribute double cost[100] which hold the cost of all ordered items, and a private at
    14·1 answer
  • Taylor and Rory are hosting a party. They sent out invitations, and each one collected responses into dictionaries, with names o
    9·1 answer
  • Website designers work on the code and programming of a website, not the style or layout of the site.
    9·1 answer
  • How are 1gls different from 2gls​
    10·1 answer
  • What is the bandwidth for asymmetric digital subscriber line<br> (ADSL)?
    10·2 answers
  • How to call a variable as a tag in react native.
    12·1 answer
  • Maria is conducting a security investigation and has identified a suspect. The suspect is an employee of the organization who ha
    15·1 answer
  • What does data warehousing allow organizations to achieve?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!