1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bija089 [108]
3 years ago
8

What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records

?
Computers and Technology
1 answer:
Gnom [1K]3 years ago
3 0

Answer:

Your user ID and password.

Explanation:

The user Id and password must be protected because when it is exposed to a third party then they can get access to information, data, to things they are not supposed to.

The user Id and password is provided as an authentication measure for one to be able to gain access to a computer system, network or files. It is what grants access to online files and record as it is the case here. It has to be protected for the sake of privacy.

You might be interested in
Why don’t the ads on Brainly load anymore
vovikov84 [41]
Umm I really have no idea
7 0
2 years ago
Read 2 more answers
What is one way for an entrepreneur to decrease risk?
marysya [2.9K]

Answer

we can  decrease risk for an entrepreneur by creating a team of trusted advisors to rely on.

there are some points that we can take in mind know how  to position our company as a safe position.

revenue streams and additional technology, paving the way for future growth.

Entrepreneurs can use all these  unique strategies to decrease those risk

8 0
3 years ago
A Java programmer has developed a GUI with several different fields for inputting values and indicating choices via buttons, all
stiks02 [169]

Answer:

EventHandler

Explanation:

In order to do this the programmer needs to use the EventHandler class. This class allows the computer to listen for certain user actions such as pressing a button. Using this on a button would then allow the programmer to specify what they want to happen when the user clicks the button or performs a certain action. For example, in this scenario, the programmer would program an EventHandler so that when the button is clicked it saves the input to a variable and changes the input field to the next option.

3 0
3 years ago
When designing a suitable and safe flexibility training program, you should set reasonable and appropriate goals depending on wh
GalinKa [24]

Answer:

The following steps will help you design a safe and effective stretching program.

Explanation:

1. You will have to follow the ACSM's guidelines used for flexibility training.

2. evaluate your flexibility rate with the "sit-and-reach" test.

3. you have to also apply the basic principles of FITT in designing your own program.

4. have a "range-of-motion" tests performance.

5. make use of SMART guidelines when setting explicit flexibility goals.

7 0
3 years ago
What gaming PC should I get
zhuklara [117]

Answer:

ps5

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create
    5·1 answer
  • Spreadsheet software creates a ____, composed of a grid of columns and rows
    6·1 answer
  • Please help
    5·2 answers
  • After you set a pin for a domain account on your laptop, that pin can be used only on your laptop. question 17 options:
    7·1 answer
  • The architecture in which the database resides on a back-end machine and users access data through their workstations is
    5·2 answers
  • Match each word to its correct meaning.
    11·1 answer
  • Which of these lines of code will increment a variable?
    11·1 answer
  • What aspect should you consider before adding pictures to a document?
    6·1 answer
  • The diagram shows the positions of the Sun, Earth, and Moon during each moon phase. When viewed from Earth, at what point does t
    15·1 answer
  • Array bounds checking should be directly coded into a system rather than assumed.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!