1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
14

You have been asked to create an authentication security plan for your company. Which of the following components would you inco

rporate to ensure your company is secured?
a. Use a password manager to create unique strong passwords.b. Have the computer identify blood type and oxygen levels.c. Use biometric security that uses characteristics of your face, hands, or eyes.d. Use two factor authentication where the user enters the password and a code sent his or her cell phone.
Computers and Technology
1 answer:
Stolb23 [73]3 years ago
5 0

Answer:

a. Use a password manager to create unique strong passwords.

c. Use bio metric security that uses characteristics of your face, hands, or eyes.

d. Use two factor authentication where the user enters the password and a code sent his or her cell phone.

Explanation:

You might be interested in
Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
kumpel [21]

Explanation:

hope this help here is the answer

3 0
3 years ago
Which top-level domain can be used by anyone, regardless of their affiliation?
Firdavs [7]

Answer:

C. org

Explanation:

org is an open domain so anyone is allowed to register a .org domain

7 0
2 years ago
You have just finished entering field names for your database . You need to choose the primary key or key field but none of your
Luden [163]

C. Let the database assign a unique number in a new field

3 0
3 years ago
Read 2 more answers
Assume that the classes listed in the Java Quick Reference have been imported where appropriate. Unless otherwise noted in the q
mash [69]

Answer:

See explaination

Explanation:

import java.util.*;

class UserName{

ArrayList<String> possibleNames;

UserName(String firstName, String lastName){

if(this.isValidName(firstName) && this.isValidName(lastName)){

possibleNames = new ArrayList<String>();

for(int i=1;i<firstName.length()+1;i++){

possibleNames.add(lastName+firstName.substring(0,i));

}

}else{

System.out.println("firstName and lastName must contain letters only.");

}

}

public boolean isUsed(String name, String[] arr){

for(int i=0;i<arr.length;i++){

if(name.equals(arr[i]))

return true;

}

return false;

}

public void setAvailableUserNames(String[] usedNames){

String[] names = new String[this.possibleNames.size()];

names = this.possibleNames.toArray(names);

for(int i=0;i<usedNames.length;i++){

if(isUsed(usedNames[i],names)){

int index = this.possibleNames.indexOf(usedNames[i]);

this.possibleNames.remove(index);

names = new String[this.possibleNames.size()];

names = this.possibleNames.toArray(names);

}

}

}

public boolean isValidName(String str){

if(str.length()==0) return false;

for(int i=0;i<str.length();i++){

if(str.charAt(i)<'a'||str.charAt(i)>'z' && (str.charAt(i)<'A' || str.charAt(i)>'Z'))

return false;

}

return true;

}

public static void main(String[] args) {

UserName person1 = new UserName("john","smith");

System.out.println(person1.possibleNames);

String[] used = {"harta","hartm","harty"};

UserName person2 = new UserName("mary","hart");

System.out.println("possibleNames before removing: "+person2.possibleNames);

person2.setAvailableUserNames(used);

System.out.println("possibleNames after removing: "+person2.possibleNames);

}

}

4 0
2 years ago
Virus infections often disable antivirus programs and prevent them from being enabled
SCORPION-xisa [38]
Some of the advanced viruses do this. So it would be true.
3 0
2 years ago
Other questions:
  • 3. If B3=6 and D5=8, what would the following function return? IF(B3&gt;D5, "Closed", D5-B3) *
    10·2 answers
  • What technology allows data to be stored in one place and be retrieved by many systems?
    7·1 answer
  • Date criteria are automatically enclosed in ____ when entered in a query design.
    11·1 answer
  • You can change the transparency of a picture used as a slide’s background with the ____.
    10·1 answer
  • Write the definition of a method, oddsMatchEvens, whose two parameters are arrays of integers of equal size. The size of each ar
    10·1 answer
  • Design and implement a class dayType that implements the day of the week in a program. The class dayType should store the day, s
    11·1 answer
  • What is the forging of the return address on an email so that the email message appears to come from someone other than the actu
    11·1 answer
  • D State Six Impact of ICT the society​
    7·1 answer
  • Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
    15·1 answer
  • What dog breed is this
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!