1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bija089 [108]
3 years ago
8

What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records

?
Computers and Technology
1 answer:
Gnom [1K]3 years ago
3 0

Answer:

Your user ID and password.

Explanation:

The user Id and password must be protected because when it is exposed to a third party then they can get access to information, data, to things they are not supposed to.

The user Id and password is provided as an authentication measure for one to be able to gain access to a computer system, network or files. It is what grants access to online files and record as it is the case here. It has to be protected for the sake of privacy.

You might be interested in
Drag each tile to the correct box.
My name is Ann [436]

Click Accept or Reject steps involved in accepting all the changes in a document

Click Accept or Reject.

<u>Explanation:</u>

When end user drags and drop title in correct box in an open document. He has accept changes to all. Normally   end user is prompted for accept and reject based on his or her selection documents changes are happened.

End user has to by click on review menu in the open document and he or she has to click on go to first tracked change. Once clicked end user is prompter for to accept the changes. Once changes is accepted next tracked changes is prompted for open document.

4 0
3 years ago
Implement a recursive method named power that takes 2 integer parameters named base and expo. The method will return the base ra
nika2105 [10]

Answer:

def power(base, expo):

   if expo == 0:

       return 1

   else:

       return base * power(base, expo-1)

Explanation:

*The code is in Python.

Create a method called power that takes base and expo as parameters

Check if the expo is equal to 0. If it is return 1 (This is our base case for the method, where it stops. This way our method will call itself "expo" times). If expo is not 0, return base * power(base, expo-1). (Call the method itself, decrease the expo by 1 in each call and multiply the base)

3 0
3 years ago
What type of function is being performed when a router screens packets based on information in the packet header
Helga [31]

Answer:

"Router screening" is the correct option.

Explanation:

  • A router that philters packets like a firewall. For certain instances, the whole firewall system is such a single scanning router.
  • Often connected to a network stage as well as a container-filter firewall has been the scanning router firewall. This rather firewall operates by filtering protocol characteristics from received packets.

So that the above seems to be the correct approach.

3 0
3 years ago
Libby wrote an email to her friend. She pressed Shift and the number key 2 together to enter the email address. Which symbol did
exis [7]

When Libby wrote the email to her friend, she typed the '@' symbol. When pressing SHIFT and 2 together, it pastes this aforementioned symbol. However, there isn't any specific name for the symbol. As a matter as fact, there are several names that this symbol goes by.

The most famous name this symbol is called is the "at symbol" or the "at sign". In terms of a formal name, "commercial at" would be a good one.

Here's an example with the symbol:

[email protected]

This is essentially telling the email server where to send your email. From this, they'll know it's located at brainly.com! It's pretty neat.

4 0
3 years ago
Read 2 more answers
Question # 4
Softa [21]

answer is

o

that's so easy

4 0
3 years ago
Read 2 more answers
Other questions:
  • An array name and index are separated using ____.
    13·1 answer
  • A blank is a link on a web page that leads to another web page.
    14·1 answer
  • Give one advantage and two disadvantages of using a wireless network
    8·1 answer
  • Blank determines the overall brightness or darkness of an entire image
    5·1 answer
  • Write a program that will find the smallest, largest, and average values in a collection of N numbers. Get the value of N before
    13·1 answer
  • I need help under standing an assignment, I've contacted my teacher but I want to finish this class already. Here's the directio
    11·1 answer
  • Software que busca, detecta y elimina malware tipo espía; puede instalarse en la computadora de manera aislada o en conjunto con
    11·1 answer
  • What is abbreviation of the computer​
    15·2 answers
  • What steps will add content to a report header section?
    5·2 answers
  • Sharl downloads images from an online library and uses them in her work. The images are shared under the Creative Commons Attrib
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!