1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
3 years ago
11

You may have come across websites that not only ask you for a username and password, but then ask you to answer pre-selected per

sonal questions about yourself. What can you conclude about this procedure and how it may increase your security?
Computers and Technology
1 answer:
raketka [301]3 years ago
5 0

Answer:

The questions are used to secure and identify you furthermore. Answering personal questions that only you can answer will deter someone from hacking into your account that easily.

Explanation:

You might be interested in
The following program is run. Then the user clicks the "bottomButton" TWO TIMES. What will be displayed in the console?
IrinaK [193]

Answer:

A. aaa

bbb

ccc

ccc

ddd

B. bbb

ddd

ccc

ccc

C. bbb

ddd

aaa

aaa

D. bbb

ccc

ccc

ddd

8 0
3 years ago
Read 2 more answers
Which word best completes the comparison of Beowulf and Grendel?
Hatshy [7]

Answer:

sympathetic

Explanation:

If you will have a go at Beowulf, you will find that Grendel is a dangerous demon for whom humanity means nothing, and people for him are just like something that is to be eaten. However, when you will have a go at Grendel, you will find that he is not just a beast without the brain, as he does have affection and conception.

4 0
3 years ago
Read 2 more answers
An attacker on the network intends to overwhelm another computer with icmp packets as follows:
Blizzard [7]
And, the simple answer is to disable ICMP echo requests on either the router or Workstation.
4 0
3 years ago
Aperture is the length of time that light is let into the camera in order to expose the film.
vichka [17]
I believe the answer is true.
8 0
3 years ago
Read 2 more answers
To remove any hidden data from your document before sharing it you should:
NikAS [45]
Not have to delete hidden data
3 0
3 years ago
Read 2 more answers
Other questions:
  • Given that ∠XQR = 180° and ∠LQM = 180°, which equation could be used to solve problems involving the relationships between ∠XQM
    6·1 answer
  • The picture that graphically represents the items you use in windows is called a/an
    5·1 answer
  • What three things in the third generation of computing helped get programming enthusiasts more involved with computers? Select 3
    12·2 answers
  • Which library research databases include information about articles published in magazines, journals, and newspapers? question 1
    7·1 answer
  • The term that refers to the standard computer language for creating web pages is called:
    6·1 answer
  • If I write too much for an exam answer, do I get downgraded?
    7·1 answer
  • You can insert video by clicking video drop-down menu on the ______ tab.
    15·1 answer
  • How does Shakespeare immediately introduce Tybalt as a menacing character?
    9·1 answer
  • By limiting the number of times a person can use a type of software before registering as the authorized owner of that software,
    15·1 answer
  • PLEASE HELP. Nobody has been helping me, i need to resolve this code issue for game design
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!