1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
3 years ago
8

Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only

with trusted resources?A. Email addressB. Phone numberC. Mother’s maiden nameD. Last name
Computers and Technology
1 answer:
Margarita [4]3 years ago
4 0

Answer:

C. Mother’s maiden name

Explanation:

Although all of the options are sensitive information for a person, your mother's maiden name is something that has more privacy. Your <u>email</u> and <u>phone number</u> can be found on a site that you shared your resume, your <u>last name</u> can be found in your social media account, but it is unlikely that your <u>mother's maiden name</u> can be found on any sites. That is why it is the most sensitive one.

You might be interested in
Identify 5 internal and external hardware components of a server
UNO [17]

Answer:

Internal:

#CPU; That retrieves &execute instructions.

#Modem; Modulates& demodulates electric signals.

#RAM;Gives application a place to store &access data on a short time periods.

External:

#Mouse; Transmits commands and controlling movements.

#Moniter; Device used to display video output from computer.

#Printer; Accepts text, graphics to the paper.

Explanation:

Hope this will help you.

5 0
3 years ago
Using the C language, write a function that accepts two parameters: a string of characters and a single character. The function
Sav [38]

Answer:

#include <stdio.h>

void interchangeCase(char phrase[],char c){

  for(int i=0;phrase[i]!='\0';i++){

      if(phrase[i]==c){

          if(phrase[i]>='A' && phrase[i]<='Z')

              phrase[i]+=32;

          else

              phrase[i]-=32;      

      }

  }

}

int main(){

  char c1[]="Eevee";

  interchangeCase(c1,'e');

  printf("%s\n",c1);

  char c2[]="Eevee";

  interchangeCase(c2,'E');

  printf("%s\n",c2);    

}

Explanation:

  • Create a function called interchangeCase that takes the phrase and c as parameters.
  • Run a for loop that runs until the end of phrase and check whether the selected character is found or not using an if statement.
  • If the character is upper-case alphabet, change it to lower-case alphabet and otherwise do the vice versa.
  • Inside the main function, test the program and display the results.
8 0
3 years ago
What do the 100 or so atoms of the periodic table, in different combinations, make up
Nikolay [14]

Answer:

100 or so atoms of the periodic table, in different combinations, make up <u>Compounds</u>.

Explanation:

Atoms from different element in the periodic table combined together with the help of  bond and make a new product that is called compound.

<u>For example</u>

Hydrogen and oxygen are the elements of the periodic table. When one atom of oxygen and two atoms of hydrogen are combined together, a compound will be formed named as water (H20).

In another example, two atoms of oxygen and one atom of carbon combines toghther through chemical reaction and make compund named as Carbon dioxide (CO2).

6 0
3 years ago
Windows Hello supports multiple biometric authentication methods, including facial recognition. What is the failsafe method to a
Orlov [11]

Answer:

The failsafe method when facial recognition method is unavailable is the Personal Identification Number (PIN) method.

Explanation:

The Personal Identification Number (PIN) option is available for setup for cases when other biometric authentication methods fail due to several reasons.

6 0
3 years ago
Describe types of hardware used for output​
sashaice [31]
A computer output device is used to extract information from a computer. There are visual, audio, print and data output devices. Different types of specific hardware include monitors, speakers and headphones, printers and external hard drives.
3 0
3 years ago
Other questions:
  • How are clustering and Network Load Balancing similar?
    13·1 answer
  • In python,_______ are used to define the conditions necessary for a while loop to run.
    7·2 answers
  • Which of the following statements are true about quick sort
    12·1 answer
  • What kind of server connects a remote system through the internet to local serial ports using tcp/ip?
    9·1 answer
  • Which of the following statements is true?
    13·1 answer
  • A snapshot is most similar to which type of backup scheme
    8·1 answer
  • Interactive sites where users write about personal topic and comment to threaded discussion are called?
    10·2 answers
  • How to deactivate the brainly account?​
    13·1 answer
  • Q.No.3 b. (Marks 3)
    5·1 answer
  • The most effective technique of malware propagation among the following list
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!