1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
3 years ago
8

Please help with attached file

Computers and Technology
2 answers:
Paul [167]3 years ago
8 0
Where is the attached file?
sergeinik [125]3 years ago
6 0
Where's the attached file
You might be interested in
Ronald attended a seminar about the best practices to use when browsing the Internet. The presenter used the following statement
Salsk061 [2.6K]

Answer:

Ronald missed the words: One-time password, Secure  

Explanation:

Whenever we use public computer, there are possibilities to steal the user data by hackers. It might not be safe to use as like we have protection in personal or Office computers. But when a situation arises to use a public system, it is always recommended to use one-time password so that the logins are not misused thereafter.

Even if the hackers try to misuse, the user will get a message / authentication reply to use the login and thus we are safe. Also, always browse only secured website ie. “https”.

8 0
3 years ago
Read 2 more answers
Jen's house contains the following devices:
poizon [28]

Answer:

Jen's laptop and her daughter's phone, because they are both connected to the router and turned on.

Explanation:

A network comprises of two or more interconnected devices such as computers, routers, switches, smartphones, tablets, etc. These interconnected devices avail users the ability to communicate and share documents with one another over the network.

Additionally, in order for a network to exist or be established, the devices must be turned (powered) on and interconnected either wirelessly or through a cable (wired) connection.

Hence, the computers which are currently networked are Jen's laptop and her daughter's phone, because they are both connected to the router and turned on. A smartphone is considered to be a computer because it receives data as an input and processes the input data into an output (information) that is useful to the end user.

6 0
2 years ago
Software, consisting of programs and data, that runs on computers, manages computer hardware resources, and provides common serv
Anit [1.1K]
Probably an Operating System like Mac, Linux, or Windows. There may be a type of downloadable software to do this, but may be debatably safe.
5 0
3 years ago
The Windows security feature called User Account Control requires you to login as a user that is a member of Server Operators be
Galina-37 [17]

Answer:

false

Explanation:

Is a good practice and recommends not to enable the built-in Administrator account on the client computer, we must use the standard user account and User Account Control (UAC).

If we want to enable the built-in Administrator, in this case, for security reasons you should also enable Admin Approval Mode.

6 0
3 years ago
PLS ANSWER ASAP I WILL GIVE BRAINLIEST
vladimir1956 [14]

Answer: 'Scope' Is <u>NOT</u> a basic programming sturtcure

Explanation: Surprisingly, it can often be broken down into <u>three simple programming structures called sequences, selections, and loops</u>. ... These come together to form the most basic instructions and algorithms for all types of software.

5 0
3 years ago
Other questions:
  • A(n) ________ event is an alert that is generated when the gossip traffic enables a platform to conclude that an attack is under
    8·1 answer
  • Points!!!!!!!! pls help
    13·2 answers
  • video-sharing sotes such as youtube and vimeo provide a place to post short videos called clips true or false?
    5·1 answer
  • If a database required regular additions of new records which of these following would likely be a good tool to use
    7·2 answers
  • Which of the following are points that can demonstrate the accuracy of a website?
    6·1 answer
  • How can an Excel table be added to a Word document? Check all that apply.
    15·1 answer
  • Which of the following is constantly changing and advancing?
    11·1 answer
  • Expectation on Information Technology Fundamental​
    12·1 answer
  • Plz help Complete the sentence.
    11·2 answers
  • How to check the at&amp;t internet speed on my computer
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!