1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
14

You have been asked to create an authentication security plan for your company. Which of the following components would you inco

rporate to ensure your company is secured?
a. Use a password manager to create unique strong passwords.b. Have the computer identify blood type and oxygen levels.c. Use biometric security that uses characteristics of your face, hands, or eyes.d. Use two factor authentication where the user enters the password and a code sent his or her cell phone.
Computers and Technology
1 answer:
Stolb23 [73]3 years ago
5 0

Answer:

a. Use a password manager to create unique strong passwords.

c. Use bio metric security that uses characteristics of your face, hands, or eyes.

d. Use two factor authentication where the user enters the password and a code sent his or her cell phone.

Explanation:

You might be interested in
Does anyone know this ? this website is scratch btw.
Katarina [22]

Answer:

maybe select an instrument

7 0
3 years ago
What is Roko's Basilisk?
serious [3.7K]

Answer:

Roko’s basilisk is a thought experiment proposed in 2010 by the user Roko on the Less Wrong community blog. Roko used ideas in decision theory to argue that a sufficiently powerful AI agent would have an incentive to torture anyone who imagined the agent but didn't work to bring the agent into existence.

7 0
3 years ago
) Briefly describe the purpose of the DASH protocol in streaming videos.
Dennis_Churaev [7]

Answer:

The purpose of the DASH protocol in the streaming videos are that it provide the high quality for the streaming media content from the HTTP servers.

DASH stands for the dynamic streaming over HTTP and it is a standard for the steaming over the HTTP that has potential for replacing the various technology. It is basically produces various on demand resources file depending upon the processing power and the bandwidth of the delivery to the clients.

3 0
3 years ago
What are the pros and cons of MP3 audio archives?
UkoKoshka [18]
Was this in reference to literal audio archives? If so, I don't see any cons beside possible copyright infringement.

If you're talking about the codecs themselves, then I can do that.

<span>Pros:

</span>- Widespread acceptance. Supported in nearly all hardware devices, and continually adopted by newer ones.

- Faster decoding. Much more so than FLAC, Vorbis, etc.

- Relaxed licensing schedule.

<span>Cons:
</span><span>
</span>- Lower quality and efficiency than most modern codecs. (To be fair, never really noticed this one).

- Sometimes the maximum bitrate isn't enough.

- Pretty much void/unusable for high definition audio (higher than <span>48kHz).</span>

 
7 0
3 years ago
Explain how communication managerial efficiency​
kakasveta [241]

Answer:

The efficiency of manager depends upon his ability to communicate effectively with the members of his organisation. It is only through communication that management conveys its goals and desires, issues instructions and orders, allocates jobs and responsibility and evaluates performance of subordinates.

pls tag me brainliest

8 0
3 years ago
Other questions:
  • Here's something to stop you from getting repetitive when writing essays. Write a program that reads multiple lines of plain tex
    15·1 answer
  • The weird suspicious box that k12 sends the parents to put on the router. im getting strange privacy error messages on google an
    8·1 answer
  • Binary is a sequence of 0s and 1s such as 1001101 which can be used to code information. To break a code, you need to find how m
    14·1 answer
  • Microsoft's
    8·1 answer
  • ____________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities
    7·2 answers
  • to edit text boxes in a template, first A click on the text box you want to edit B begin typing C format the front D drag the te
    5·2 answers
  • In an oblique drawing, which lines can be measured accurately, if there is no foreshortening?
    10·1 answer
  • Ha Yoon sees funny quotes on top of images frequently in her social media feed. One day, she has an idea for one of her own. Whi
    11·1 answer
  • What type of databases is not limited by the data’s physical location?
    7·1 answer
  • A. A set of electronic program that makes of computer perform tasks
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!