1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bija089 [108]
3 years ago
8

What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records

?
Computers and Technology
1 answer:
Gnom [1K]3 years ago
3 0

Answer:

Your user ID and password.

Explanation:

The user Id and password must be protected because when it is exposed to a third party then they can get access to information, data, to things they are not supposed to.

The user Id and password is provided as an authentication measure for one to be able to gain access to a computer system, network or files. It is what grants access to online files and record as it is the case here. It has to be protected for the sake of privacy.

You might be interested in
Data-driven decision making is a process of <br><br>    
ANTONII [103]

It is a process of making decisions that are backed up with verifiable or hard data rather than making decisions based on observation only. In the past few years, it used to be a difficult process to collect, extract and analyze data. These days, however, the development of business intelligence software allows anyone without a heavy IT background to produce reports that will later need to be analyzed, <span>thus accelerating the decision process.</span>

3 0
3 years ago
Which networking model can the network now support that it could not support without the addition of the eighth computer?
ValentinkaMS [17]

I guess the correct answer is cliеnt-sеrvеr mοdеl

Thе cliеnt-sеrvеr mοdеl is a distributеd cοmmunicatiοn framеwοrk οf nеtwοrk prοcеssеs amοng sеrvicе rеquеstοrs, cliеnts and sеrvicе prοvidеrs. Thе cliеnt-sеrvеr cοnnеctiοn is еstablishеd thrοugh a nеtwοrk οr thе Intеrnеt.

Thе cliеnt-sеrvеr mοdеl is a cοrе nеtwοrk cοmputing cοncеpt alsο building functiοnality fοr еmail еxchangе and Wеb/databasе accеss. Wеb tеchnοlοgiеs and prοtοcοls built arοund thе cliеnt-sеrvеr mοdеl arе:

  • Hypеrtеxt Transfеr Prοtοcοl (HTTP)
  • Dοmain Namе Systеm (DNS)
  • Simplе Mail Transfеr Prοtοcοl (SMTP)
  • Tеlnеt

Cliеnts includе Wеb brοwsеrs, chat applicatiοns, and еmail sοftwarе, amοng οthеrs. Sеrvеrs includе Wеb, databasе, applicatiοn, chat and еmail, еtc.

4 0
4 years ago
Another html/css assignment, drop css code below, thank you
Reil [10]

This is what I come up with. I'm unclear what the 4th requirement means, so I've labeled it #unclear.


a { color : red; }

p:not(:first-child)  { text-indent: 5%; }

div { background-color: aqua; }

#unclear { width: 50%; margin-left: 25%; margin-right: 25%; }

.links:link { font-size 24px; background-color: yellow; }

#first { text-transform: uppercase; font-style: italic; }

6 0
4 years ago
The study of sound and sound wave is called​
pishuonlain [190]

Answer: Acoustics

Explanation:

Acoustics is simply refered to as a branch in physics that studies sound and its wave.

Acoustics studies mechanical waves in liquid, solid state or gaseous state. Topics such as infrasound, vibration and ultrasound are studied. Someone who works in the acoustics field is referred to as an acoustician.

7 0
3 years ago
What are the Technical Skills do Penetration Testers need to have?
Alla [95]

1. Tester should understand the vulnerability of the system because by this skill it should be able to secure the system for the parts where the attacks can be done.

2. Understand the web technologies and communication techniques of them because the two way communication understanding is one of the most important skill a tester should have so that he/she should have a proper image of what the system doing and how it is doing it.

3. Ability yo code scripts and most importantly understand them because while testing there are many script code to be read and understand for any bug or error the system is facing.

5 0
3 years ago
Other questions:
  • Write a program that prompts the user to enter an equation in the form of 10 5, or 10-5, or 1*5, or 13/4, or 13%4. The program s
    6·1 answer
  • What is a different paragph formatting tools
    6·1 answer
  • Remember partially filled arrays where the number of elements stored in the array can be less than its capacity (the maximum num
    14·1 answer
  • What is computer science ​
    5·1 answer
  • Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?
    10·2 answers
  • Lesson 12: while loops with the farmer. Number 9.
    10·2 answers
  • Hey someone who's willing to answer this question plz do. <br> I will give you all my points
    9·1 answer
  • Which of the following screen elements is a horizontal bar that displays at the
    8·1 answer
  • Which of the following can you use to judge source legitimacy?
    6·2 answers
  • Create a list of 5 potential jobs that students of computer science can obtain.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!