1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
2 years ago
6

Which best explains a password attached to a document?

Computers and Technology
2 answers:
Bess [88]2 years ago
6 0

Answer:

Explanation:

Going through the options:

O Passwords typically are not case-sensitive.

Passwords are typically case-sensitive.

O Using a document to store the password is not allowed.

It is not recommended but definitely allowed to store passwords in document.

O If a user forgets the password, it cannot be recovered.

Lost password cannot be recovered easily but not impossible.

The only choice left is

O There is a private password for the user and a public one for the viewer.

It describes a set of public and private key password used to allow sharing of encrypted files between user and viewers.

So the only answer left which is correct:

O If a user forgets the password, it cannot be recovered.

AleksAgata [21]2 years ago
4 0

Answer:

Explanation:

ans is B.O If a user forgets the password, it cannot be recovered.

You might be interested in
How do you see the recent IT evolution (e.g. platforms, big data, Internet of Things, etc.) affect Internet security and privacy
torisob [31]

Answer:

Answered below

Explanation:

With the evolution and growth of technology, and as we are increasingly having our everyday lives dependent on technology, there arise problems that shouldn't be ignored.

Security of people's personal data and information is of paramount importance. Access to personal information and the sale of these information to companies without the owner's permission is a breach of privacy and one of the challenges we face today.

With the growth of data, there are newer threats and attacks on software security systems to steal these data and therefore there's a need for everyday assessment and improvement in security of data.

3 0
3 years ago
At some point in your driving career, you will most likely be faced with an oncoming vehicle swerving into your travel lane. tru
aleksley [76]

I believe the answer is True.

7 0
4 years ago
QUESTION 3 Which sequence of events illustrates the most helpful problem-solving plan? o Think of a solution, execute it, and ev
gtnhenbr [62]
Clearly state the problem, analyze its cause and effects, brainstorm possible solutions, evaluate the pros and cons of each potential choice, pick an option, try it out, and evaluate its success.
4 0
3 years ago
All of the following are interpreted languages
cricket20 [7]

Answer:

True

Explanation: Python is mostly interpreted and python code is written in . py file is first compiled to what is called bytecode which is stored with a . pyc

5 0
3 years ago
Given the 32-bit binary number:
Aliun [14]

Answer:

b. an unsigned integer? (convert it to decimal)

Explanation:

Computer systems represent data and instructions in bits to be stored and processed by the processor. The buses in the computer system transfer data and instructions to various locations. Some buses can be 32 or 64 bits wide, transporting data like the 32-bit number above which covert to an unsigned integer of 2,903,506,944.

3 0
3 years ago
Other questions:
  • What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f
    7·1 answer
  • Suppose you want to delete an existing file from within Word. What would you do? A. Click on the File button, choose Recent, ope
    9·1 answer
  • True or false An electronic form uses input fields in which the user can enter data from their own computer and then transmit t
    10·1 answer
  • A_____refers to the entire Excel file
    14·1 answer
  • 22 If you are involved in a violation and you do not have insurance to comply with the __________________, your driver license a
    9·2 answers
  • If Count = 1 and X = 3, what will be displayed when code corresponding to the following pseudocode is run? Do Set Y = Count + X
    13·1 answer
  • Hulu suggestions? I just got it and I wanna know what's good :)
    5·2 answers
  • What is displayed on the console when running the following program?
    5·1 answer
  • Special computers, called __________, keep databases of IP addresses and their corresponding names
    11·1 answer
  • Explain the major innavotions made from the establishment of abacus​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!