1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
2 years ago
6

Which best explains a password attached to a document?

Computers and Technology
2 answers:
Bess [88]2 years ago
6 0

Answer:

Explanation:

Going through the options:

O Passwords typically are not case-sensitive.

Passwords are typically case-sensitive.

O Using a document to store the password is not allowed.

It is not recommended but definitely allowed to store passwords in document.

O If a user forgets the password, it cannot be recovered.

Lost password cannot be recovered easily but not impossible.

The only choice left is

O There is a private password for the user and a public one for the viewer.

It describes a set of public and private key password used to allow sharing of encrypted files between user and viewers.

So the only answer left which is correct:

O If a user forgets the password, it cannot be recovered.

AleksAgata [21]2 years ago
4 0

Answer:

Explanation:

ans is B.O If a user forgets the password, it cannot be recovered.

You might be interested in
You are looking for a backup that copies only the files that have changes since the last full backup. Which of the following wil
adelina 88 [10]

Answer: d. incremental backup

Explanation:

In incremental backup it copies only the files that have changed since the last full backup. It does not backup all the files just like the full backup. it however backup those copies into the  system which has changed since the last backup.

In doing  so it just increases the efficiency and performance of the backup procedure. This process is basically preferred when the amount of file to be backup is huge and there is not enough time to do a full backup.

Increment backup also use less disk space.

Cloud backup uses most increment backup for its application.

6 0
3 years ago
The algorithm ____ is used to find the elements in one range of elements that do not appear in another range of elements.
Musya8 [376]

Answer:

A. set_union

Explanation:

The algorithm set_union is used to find the elements in one range of elements that do not appear in another range of elements.

4 0
3 years ago
what would happen if a large number of computer users are attempting to access a web site at the same time that you are
jasenka [17]
It would slow down the whole network if your on the same one

6 0
3 years ago
Read 2 more answers
Taking an online class doesn't require any special skills.
mr_godi [17]

Answer:

F

Explanation:

It depends on whether the person has interest in it

5 0
3 years ago
Read 2 more answers
What is the software that manages and controls the activities and resources of the computer? O The CPU The OS The ALU The GUI D
Elodia [21]

Answer:

the software that manages and controls the activities and resources of the computer is OS

Explanation:

the software that manages and controls the activities and resources of the computer is OS

because here we know that CPU is hardware

and ALU is a digital circuit that is use to perform arithmetic and logic operations

and

GUI or Graphical User Interface controls the graphical interface of the applications

so here correct option is OS that is the software that manages and controls the activities and resources of the computer

7 0
3 years ago
Other questions:
  • Which of the following is something that scientists often seek by using computer models and simulations?
    8·2 answers
  • How do you activate the Formula AutoComplete function of Excel 2016?
    15·2 answers
  • What games do you play?<br><br><br> Be sure not to report any answers!
    5·1 answer
  • HELP ASAP !!! What should be a one-page document?
    7·1 answer
  • Explain the major innavotions made from the establishment of abacus​
    8·1 answer
  • Software que busca, detecta y elimina malware tipo espía; puede instalarse en la computadora de manera aislada o en conjunto con
    11·1 answer
  • What are two advantages of a pay-for-use online conferencing service compared to a free service? (Choose two)
    5·1 answer
  • What are the benefits of computer literacy?
    10·1 answer
  • How do you stop getting emails from brainly saying "sarah from brainly has answered your question"
    10·1 answer
  • Phoebe is a Counselor who is trying to schedule a meeting with one of her patients. Which best describes an inappropriate locati
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!