1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kherson [118]
3 years ago
7

If we follow the guidelines for creating a good, strong password, should we ever be worried about our information being stolen?

Computers and Technology
2 answers:
faust18 [17]3 years ago
8 0

no we should not unless you give your password away

nevsk [136]3 years ago
6 0
No because people will still find a way to hack into it
You might be interested in
1. Ce este o baza de date? (1p)
lesya [120]

Answer:

would you mind telling me what this says im still learning my spanish

Explanation:

6 0
3 years ago
Read 2 more answers
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
In 1964 in London, Ontario one could buy a chili-dog and a root beer for $1.25, today the same chili dog and root beer cost $5.0
Marta_Voda [28]

Answer:

3% inflation rise. No correct cpi option

Explanation:

Consumer Price Index(CPI) is calculated by the Bureau of Economic Analysis and Statistics of a country monthly and annually.

Consumer Price Index(CPI) is used for measuring the changes in the price level of consumer goods and services purchased by households.

Calculating the consumer price index; price in 1964= $1.25, today price= $5.0.

Therefore, consumer price index= Price in today- price in 1964÷ price in 1964,.

Consumer Price index(CPI)= $(5-1.25)/1.25 = 3.75/1.25 = 3 Percent price inflation rise.

For the first cpi; 112-80/80= 0.4 percent( not equal to the 3 Percent inflation rise).

For the second cpi: 141.6-60/60= 1.36 Percent inflation rise(not equal to the 3 Percent inflation rise).

For the third CPI: 126.4-75/75 =0.68 percent inflation rise[not equal to the 3 Percent inflation rise].

For the third CPI: 108.5-90/90=0.21 percent inflation rise(not equal to 3 Percent inflation rise)

Therefore, none of the options are right.

5 0
3 years ago
What is a type of local network that people can use to access the Internet?
ExtremeBDS [4]

Id say Router is the answer based on your Question.

Router - is a device used to host a network signal which people will require the SSID(network-name) to connect to.

It is a bit confusing because the correct answer is SSID  which leads me to belive Public Wi-Fi is also correct..

4 0
3 years ago
Read 2 more answers
Should you have a chance to participate in the design and implementation of a new Operating System, what course of action would
elena-s [515]

Answer:

Provide various open source services for users of the operating system.

Explanation:

Operating systems are applications that manages the computer hardware system. It creates a suitable platform for other user and system applications to run with access to the hardware features through a kernel.

The open source applications and services are user software applications that are free for users to customise and share with other users.

6 0
3 years ago
Other questions:
  • Variables make it easier to do what?
    10·1 answer
  • To illustrate a point in a Word document with a simple chart, what commands should you select?
    8·2 answers
  • What to do when the tool bar for paint tool sai dissapears?
    12·1 answer
  • A python keyword______.
    6·1 answer
  • Similarly, the Windows server OS can run regular workstation applications such as MS Office or Adobe Photoshop. Why is this a ba
    5·1 answer
  • Which network component blocks status?
    9·1 answer
  • Can a idler gear increase or decrease torque?
    7·1 answer
  • Henry has created a software product that manages a database of company clients. He wants to install the software on a client's
    13·1 answer
  • When is 1600 plus 25 and 1700 minus 35 the same thing?​
    10·1 answer
  • What is the second step when designing an algorithm?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!