1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bija089 [108]
3 years ago
8

What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records

?
Computers and Technology
1 answer:
Gnom [1K]3 years ago
3 0

Answer:

Your user ID and password.

Explanation:

The user Id and password must be protected because when it is exposed to a third party then they can get access to information, data, to things they are not supposed to.

The user Id and password is provided as an authentication measure for one to be able to gain access to a computer system, network or files. It is what grants access to online files and record as it is the case here. It has to be protected for the sake of privacy.

You might be interested in
When an individual user works in _____, the workstation performs all the functions of a server by storing, accessing, and proces
anyanavicka [17]
When an individual user works in stand-alone mode, the workstation performs all the functions of a server by storing, accessing, and processing data as well as providing a user interface.​
4 0
3 years ago
What are the XML technologies used in SOA?
saw5 [17]

Answer:

There are three technologies used for implementing the SOA most commonly with Web services are UDDI (Universal Description, Discovery & Integration) , WSDL (Web Services Description Language) and  SOAP (Simple Object Access Protocol) .

Out of them XML technologies are Web Services Description Language (WSDL) and Simple Object Access Protocol (SOAP).

WSDL is an XML language that describes a Web service.

SOAP is an XML Protocol and it is used by client application to communicate with web services.

8 0
3 years ago
Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availabil
Mars2501 [29]
If I'm not mistaken firewalls should be enough as now the automatically  back up all data
4 0
3 years ago
When you have to make a long-distance call, dialing an unfamiliar area code plus a seven-digit number, you are likely to have tr
Mashutka [201]

Answer:

c. short-term

Explanation:

According to a different source, these are the options that come with this question:

a. long-term

b. implicit

c. short-term

d. explicit

This best illustrates the limited capacity of short-term memory. Short-term memory is the most recent information that a person holds in his head. Usually, this corresponds to events that occurred in the last 30 seconds to the last few days. This type of memory stores recent events, as well as sensory data such as sounds.

3 0
3 years ago
3. ___________ is the second most common drug found in the bodies of collision victims.
soldi70 [24.7K]
Marijuana is the answer because it just is and i have seen studies so just trust me 
6 0
3 years ago
Other questions:
  • In databases and database-related software, which choice is not a Boolean operator?
    7·2 answers
  • Bob's Assembly is a hardware manufacturer. It specializes in builders' hardware for doors, cabinets, windows, and bathrooms. Bob
    10·1 answer
  • Is a term used to define those providers or hospitals that have the capabilities and processes in place to be actively use certi
    15·1 answer
  • The accessibility of a website refers to which of
    6·1 answer
  • Write a program that replaces words in a sentence. The input begins with an integer indicating the number of word replacement pa
    13·1 answer
  • A basic program to find the area of a square​
    6·1 answer
  • Select the correct answer from each drop-down menu. Which two factors do ergonomic principles consider a part of a job? Ergonomi
    10·1 answer
  • Select the correct answer from each drop-down menu.
    7·1 answer
  • Why do you usually find domain names instead of IP addresses in a URL? Select one: a. An IP address would make your web page loa
    11·1 answer
  • Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!