1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
4 years ago
14

You have been asked to create an authentication security plan for your company. Which of the following components would you inco

rporate to ensure your company is secured?
a. Use a password manager to create unique strong passwords.b. Have the computer identify blood type and oxygen levels.c. Use biometric security that uses characteristics of your face, hands, or eyes.d. Use two factor authentication where the user enters the password and a code sent his or her cell phone.
Computers and Technology
1 answer:
Stolb23 [73]4 years ago
5 0

Answer:

a. Use a password manager to create unique strong passwords.

c. Use bio metric security that uses characteristics of your face, hands, or eyes.

d. Use two factor authentication where the user enters the password and a code sent his or her cell phone.

Explanation:

You might be interested in
A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is
Vinil7 [7]

Answer:

The correct option is 1 as the overflow error has occurred

Explanation:

As the program uses 3 bits to represent integers thus the range of the maximum value that the program can store is given as

2^2+2^1+2^0=4+2+1=7

So when the two numbers in decimal base 10 are added as 3 and 5 the resultant is given as

3=(011)_2\\5=(101)_2\\\_\_\_\_\_\_\_\_\_\_\_\_\\8=(1000)_2

This is more than what the 3 bit integer can store thus the overflow error has occurred.

3 0
4 years ago
6. Which of the following options is used to view a computer's memory properties?
pentagon [3]
There is an option used to vew a computer's memory properties by just simply opening your My computer directory. There you can see different names of your hard drive, there you choose what hard drive you want to view by just right clicking it and choosing properties. There you will see it's memory space.
3 0
4 years ago
SOMEONE PLEASE HELP!! i’ll give brainliest
miv72 [106K]

Display is 2.

Printer is 3.

Keyboard is 4.

Mouse is 1.

Hope this helps :D

7 0
3 years ago
Read 2 more answers
What was the name of the system developed by Frederick Winslow Taylor, in which mass production is tied to the cultivation of ma
katen-ka-za [31]

Answer: scientific management

Explanation:

scientific management

8 0
4 years ago
All presentations should have this. A. a clear central message. B. a design template. C. at least seven slides. D. special effec
Oksi-84 [34.3K]

Answer:

A. a clear central message.

When creating a presentation on basically anything, there should always be a clear central message. The purpose of most presentations are to give information on what the presenter would like to convey to the audience members. Without a clear central message, the audience members would be lost and the presentations purpose will not be fulfilled.

4 0
3 years ago
Read 2 more answers
Other questions:
  • You're trying to decide which disk technology to use on your new server. the server will be in heavy use around the clock every
    10·1 answer
  • Declare an array reference variable, week, and initialize it to an array containing the strings "mon", "tue", "wed", "thu", "fri
    15·1 answer
  • What feature would be used to collect how many times users downloaded a product catalog?
    11·1 answer
  • What are some ways in which reading and writing have changed in our newly networked world
    10·1 answer
  • #include
    11·1 answer
  • The methodology used by web project teams is usually:
    9·1 answer
  • I have a variable and set it equal to 5. 1 then send it as an argument to a function that adds 5 to the variable passed in. Outs
    9·1 answer
  • 1.Two robots start out at 426c cm. apart and drive towards each other. The first robot drives at 5 cm per second and the second
    15·1 answer
  • How do I get the bot token for discord? (scripting etc)
    5·1 answer
  • TensorFlow and Pytorch are examples of which type of machine learning platform?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!