1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
3 years ago
6

Which best explains a password attached to a document?

Computers and Technology
2 answers:
Bess [88]3 years ago
6 0

Answer:

Explanation:

Going through the options:

O Passwords typically are not case-sensitive.

Passwords are typically case-sensitive.

O Using a document to store the password is not allowed.

It is not recommended but definitely allowed to store passwords in document.

O If a user forgets the password, it cannot be recovered.

Lost password cannot be recovered easily but not impossible.

The only choice left is

O There is a private password for the user and a public one for the viewer.

It describes a set of public and private key password used to allow sharing of encrypted files between user and viewers.

So the only answer left which is correct:

O If a user forgets the password, it cannot be recovered.

AleksAgata [21]3 years ago
4 0

Answer:

Explanation:

ans is B.O If a user forgets the password, it cannot be recovered.

You might be interested in
_______ is defined as a state of periodic or chronic impairment detrimental to the individual and society.
aleksandrvk [35]
I believe the answer is addiction. 
8 0
4 years ago
Read 2 more answers
How does one decide which businesses to invest in.
GREYUIT [131]
As you consider your options, here are seven things you should know about a company before you decide to invest:
Earnings Growth. Check the net gain in income that a company has over time. ...
Stability. ...
Relative Strength in Industry. ...
Debt-to-Equity Ratio. ...
Price-to-Earnings Ratio. ...
Management. ...
Dividends.
3 0
3 years ago
The piece of hardware that contains the circuitry that processes the information coming into the computer and tells the other ha
Aleksandr-060686 [28]
The central processing unit
6 0
3 years ago
Use the Internet and other sources to research the two disadvantages of standard biometrics: cost and error rates. Select one st
lyudmila [28]

Answer:

Check the explanation

Explanation:

Selecting the bio-metric technique fingerprint, it requires a scanner to read the fingerprint The cost for a scanner is in between 1000 and 5000 Placing two scanners at two entrance of office win cost bellow 10,000 So the cost needed for this technique is medium as compared with other bio-metric techniques

Attacks on this technique can be in saner, channel from scanner to feature extractor, in feature extractor, way in between feature extractor and marcher, in marcher, in database etc this attacks can be protect by using security methods such as cryptography, hashing, watermarking, noses etc

By using watermarking, cryptography and stenography methods, fingerprint has less false detection rate I e it gives high accuracy

I recommend fingerprint technique. Because of it is a standard technique, it has good accuracy and cost is less, and easy to handle, and it is taking small storage space in database.

Kindly check the attached image below.

7 0
4 years ago
Your supervisor has asked you to help with the orientation of three new office employees. Topics you're asked to present include
Crazy boy [7]

Answer:

Policy manual

Explanation:

A written document that is designed by the company to decide the rules and regulations for the employee to guide them about attendance and evaluation to achieve the desired goals is called Policy manual.

A handbook is provided to the employee at the time of joining of Job. All the policies related to employee such as dress code, attendance policy and evaluation policy. All the rules and regulations related to office are also present in this document.

The purpose of this document is to inform the new employees about guidelines of the company.

7 0
4 years ago
Other questions:
  • An organization that operates a small web-based photo backup business is evaluating single points of failure. The organization h
    7·1 answer
  • What are the two types of computers
    15·2 answers
  • How to import any csv from internet in phyton 3 and R ?
    12·1 answer
  • Write a program segment that simulates flipping a coin 25 times by generating and displaying 25 random integers, each of which i
    5·1 answer
  • _____emphasizes on proper breathing and the mind-body-spirit connections.​
    6·2 answers
  • C source files natively compiled on a Linux system using an ARM processor produce an executable file only runnable on ARM machin
    10·1 answer
  • Write a program that will sort an array of data using the following guidelines - DO NOT USE VECTORS, COLLECTIONS, SETS or any ot
    10·1 answer
  • Question #8
    5·1 answer
  • The formula in cell C9 is B9*F10. On copying this formula to cell Z9, what will be the formula​
    5·1 answer
  • You find information that you know to be classified on the internet. What should you do.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!