1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
3 years ago
8

Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only

with trusted resources?A. Email addressB. Phone numberC. Mother’s maiden nameD. Last name
Computers and Technology
1 answer:
Margarita [4]3 years ago
4 0

Answer:

C. Mother’s maiden name

Explanation:

Although all of the options are sensitive information for a person, your mother's maiden name is something that has more privacy. Your <u>email</u> and <u>phone number</u> can be found on a site that you shared your resume, your <u>last name</u> can be found in your social media account, but it is unlikely that your <u>mother's maiden name</u> can be found on any sites. That is why it is the most sensitive one.

You might be interested in
Which statement opens a file in such a way that information will only be written to its end?
Elenna [48]
OutputFile = open( "/path/to/file", "wa" ) # DOS probably needs 'b' too
3 0
3 years ago
Drag each label to the correct location. Each label can be used more than once. Match the device to the port through which it co
son4ous [18]

Answer:

Mouse - USB

Monitor - display port, HDMI, and thunderbolt port

External hard drive - USB and thunderbolt port

Flash drive - USB

Explanation:

A computer mouse is an input device used to interact with a computer system. It connects with the computer through the USB port.

A Monitor is an output device that is used to display information on a computer system. It can be connected to the system through the display ports, HDMI, and the thunder port.

The External hard drive is a storage device that holds data for a long period of time. It has adapters to connect to the computer through the USB ports or thunderbolt ports. The flash drive is similar in function to the hard drive but small in size and storage space. It only connects with the computer through USB ports.

5 0
3 years ago
Which of the following is not a key component of a structure?
valentina_108 [34]
D. Enumerations! Because I know that is NOT a leg compentent of a structure
5 0
3 years ago
Which of the following best describes the purpose of an Egyptian pyramid?
Flura [38]

Answer:

C

Explanation:

Had this on edgnuity

Please give a brainliest

7 0
3 years ago
Read 2 more answers
The purpose of the ________ protocol is to ensure the integrity of the communication.
Vladimir [108]

The purpose of the transmission control protocol is to ensure the integrity of the communication.

The TCP/IP network architecture also refers to the Internet architecture. The Transmission Control Protocol (TCP) is a transport layer protocol, and the Internet Protocol (IP) is a network layer protocol.

<h3>What is Transmission control protocol ?</h3>

Transmission Control Protocol, or TCP, is a communications standard that enables computer hardware and software to exchange messages over a network. It is intended to send packets over the internet and make sure that data and messages are successfully delivered through networks.

  • TCP's (Transmission Control Protocol) purpose is to regulate data transport so that it is dependable. Connection management, dependability, flow control, and congestion control are the four fundamental TCP functions. Connection initialization (a three-way handshake) and termination are included in connection management.

Learn more about Transmission control protocol here:

brainly.com/question/14280351

#SPJ4

3 0
2 years ago
Other questions:
  • The image uses a school of fish to symbolize leadership.
    10·2 answers
  • A(n) _______ allows an attacker to use a network structure to send large volumes of packets to a victim.
    5·1 answer
  • Ms. Rogers wants to see the names of all the students who scored below 25 on the test. Which of these custom options will help h
    5·1 answer
  • Assume you have written a method with the header num mymethod(string name, string code). the method's type is
    5·1 answer
  • After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​
    6·1 answer
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual. wh
    5·2 answers
  • Two groups of simple machines and list the simple machines that belong in each group
    7·1 answer
  • A ____ object is used to hold data that is retrieved from a database via the OleDbDataAdapter connection. a. DataRecord b. DataS
    12·2 answers
  • Select all the ways in which business professionals might use a spreadsheet in their jobs.
    15·1 answer
  • which of the following is a scenario in which an it support technician would most likely be required to implement the alternate
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!