1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
3 years ago
8

Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only

with trusted resources?A. Email addressB. Phone numberC. Mother’s maiden nameD. Last name
Computers and Technology
1 answer:
Margarita [4]3 years ago
4 0

Answer:

C. Mother’s maiden name

Explanation:

Although all of the options are sensitive information for a person, your mother's maiden name is something that has more privacy. Your <u>email</u> and <u>phone number</u> can be found on a site that you shared your resume, your <u>last name</u> can be found in your social media account, but it is unlikely that your <u>mother's maiden name</u> can be found on any sites. That is why it is the most sensitive one.

You might be interested in
type the correct answer in the Box spell the words correctly Caleb is working on a simple logic base program to stimulate the ga
ycow [4]

Answer:incomplete question

Explanation:

4 0
3 years ago
Read 2 more answers
A(n ____ is a named group of formatting characteristics.
Vsevolod [243]
I think the answer is style
7 0
3 years ago
Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation.
galben [10]

Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation.

a)retrieval. b)comparison. c)storage. d)exponentiation.  

Answer:

a)retrieval.

Explanation:

A retrieval operation simply means obtaining data or information that is stored in a system.

Therefore, getting the data of a video file from a flash drive is a retrieval operation because it brings the video file from the storage device.

3 0
3 years ago
you manage a network that has multiple internal subnets. you connect a workstation to the 192.168.1.0/24 subnet. this workstatio
nydimaria [60]

Based on the configuration written below, the most likely cause of the problem is Incorrect subnet mask.

<h3>What is an Incorrect Subnet Mask?</h3>

The issue of an Incorrect Subnet Mask will take place if a network uses a subnet mask that is not theirs for its address class, and a client is still said to be configured with the same default subnet mask for the address class, and thus communication tend to fail to some closeby networks.

Therefore, Based on the configuration written below, the most likely cause of the problem is Incorrect subnet mask.

Learn more about subnet mask from

brainly.com/question/27418272

#SPJ1

See full question below

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet.

This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following:

Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask. . . . . . . . : 255.255.0.0 Default Gateway . . . . . . : 192.168.1.1 DNS Servers . . . . . . . : 192.168.1.20 192.168.1.27

What is the most likely cause of the problem?

8 0
1 year ago
Write a program that reads a file called 'test.txt' and prints out the contents on the screen after removing all spaces and newl
svp [43]

Answer:

I don't know  you should figure that out good luck

Explanation:

good luck

8 0
2 years ago
Other questions:
  • Which of the following would be considered a strong password?
    5·2 answers
  • 1. How does inertia affect a person who is not wearing a seatbelt during a collision? 
    14·2 answers
  • Marys total out of pocket costbwere for the year​
    12·1 answer
  • Define the following BASIC terms:<br> 1. Keywords<br> 2. Constants<br> 3.Variables
    8·1 answer
  • What is a computer OPERATING SYSTEM?
    5·1 answer
  • 2. Used to drive in or remove screws that fasten electrical wires or other electrical accessories. A. Pliers C. Screwdrivers B.
    15·1 answer
  • Design the following webpage using suitable html code .
    11·2 answers
  • What videos do you think we should make next?
    9·1 answer
  • Will, there be any presents this year
    15·1 answer
  • What are three ways of verifying legitimate right of access to a computer system?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!