1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tino4ka555 [31]
3 years ago
11

ou use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose you

r iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do
Computers and Technology
1 answer:
SSSSS [86.1K]3 years ago
7 0

Answer:

  • <u>Enable the Erase data option</u>
  • <u>Disable the simple passcode option</u>

Explanation:

Most smartphone security experts agree that one way to prevent unauthorized access to one's iPad is to enable the erase data feature. Enabling this feature is believed to allow the possibility of all data on the device to be erased if a wrong passcode is entered after a specified number of times.

Of course, it is also possible to set a complex alphanumeric passcode, however, you'll need to first disable the simple passcode option.

You might be interested in
As defined by the National Institute of Standards and Technology​ (NIST), "________ is a model for enabling​ ubiquitous, conveni
hram777 [196]

Answer:

Cloud Computing

Explanation:

It is certainly a model for enabling ubiquitous, on-demand and convenient network access for using a shared pool of configurable computing resources, and that can rapidly be provisioned as well as released with the least managing effort or the interaction of the service provider. And such a facility is only being provided by the cloud computing currently. And hence the Cloud computing, the right answer.

5 0
2 years ago
A _____ is a network that uses multiple access points to link a series of devices that speak to each other to form a network con
morpeh [17]
I think the answer is WAN (wide area network)
6 0
2 years ago
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
kumpel [21]

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

8 0
3 years ago
What two features distinguished Windows 2.0 from Windows 1.0?
zysi [14]
This question is a bit ambiguous as there were a few features that were added and any could be perceived as distinguishing depending on what you look for in your OS. I do believe this is in reference to the Wikipedia article on Windows 2.0 though as the first two listed features make note of Windows 1.0 specifically, therefore:

Windows 2.0 allowed windows to overlap, Windows 1.0 could not do this.

Windows 2.0 introduced new and more complex keyboard shortcuts and terminology such as "Minimize" and "Maximize" vs. Window 1.0's "Iconize" and "Zoom"

Source: https://en.m.wikipedia.org/wiki/Windows_2.0
5 0
3 years ago
Will robots take people's jobs? <br> write in complete sentence.
lilavasa [31]

Answer:

yes

Explanation:

yes because they already have them for old gun ships (which they still use) and they have made cars with them and more including bombing situations IED detinators they used in Afghanistan and in Iraq in 2011.

6 0
3 years ago
Other questions:
  • Processing is handled by the computer’s central processing unit (cpu).​ <br> a. True <br> b. False
    6·1 answer
  • Part cost Calculator Modify the GUI in your program to look like the following GUI. To do that you need to add the following to
    13·1 answer
  • Fill in the blanks. The ________________ donut chart shows the distribution across your website’s pages by the number of clicks
    14·1 answer
  • Write a calculator program that keeps track of a subtotal like real calculators do. Start by asking the user for an initial numb
    12·1 answer
  • What is it called when two different files generate the same hashing result?
    15·1 answer
  • Sally has 4 quarters, 2 dimes, 6 nickels, and 10 pennies.
    13·2 answers
  • 3.5 code practice question 1
    5·2 answers
  • I need a solution for this problem asap.
    7·1 answer
  • Finish the format string to get the output shown below.<br> Day<br> &gt;&gt;&gt;{ v8'_format('Day)
    5·1 answer
  • Look at the code in the example below, and then answer the question.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!