1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scorpion4ik [409]
3 years ago
10

Why do we create user accounts to customize our preferences​

Computers and Technology
1 answer:
defon3 years ago
4 0

I feel like we should create our own account for

  • <u><em>security purpuoses  </em></u>
  • <u><em> it's a good idea for each user to have their own account. Everyone having their own account is better for security reasons. For instance no one can access anyone else's account without their password.</em></u>
You might be interested in
Unscramble the risks of sharing files on the Intern
Zinaida [17]

Answer:

Broken Firewall, Piracy, Malware, Virus, adware

Explanation:

Please give brainliest if this helps

4 0
3 years ago
The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to a
Aleks04 [339]

The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a lock on the shared file.

<h3>What does a lock on a file mean?</h3>

The lock icon can be seen in Windows and it shows that the file or folder is one that can only be accessed by the person who lock it.

Note that The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a lock on the shared file.

Learn more about synchronization from

brainly.com/question/25541016

#SPJ1

5 0
2 years ago
A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
AnnyKZ [126]
You have a raspberry pi connected to all the sensors and a code running to  trigger if the sensors are triggered. Each sensor and keypad would run to a different input on the pi. They should al be able to be powered with a single cell lipo. Is that what you are asking?
5 0
3 years ago
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client.
Anika [276]

Answer:

B. Top listeners

Explanation:

Top listeners gives a detailed information about the user who received the most data, downloads the largest size of data or user streaming from the internet.

Hence, when you run your network monitor, your coworker's computer will likely show up on top listeners list.

3 0
4 years ago
In the context of a database management system (DBMS), a(n) _____ interacts with other programs or applications and only indirec
astra-53 [7]

Answer:

back- end application

Explanation:

In the context of a database management system (DBMS), a <u>back end application</u> interacts with other programs or applications and only indirectly interacts with people or users.

6 0
3 years ago
Other questions:
  • How can you tell which of the policies in the security options folder have changed settings?
    10·1 answer
  • Diane wants to maintain a record of percent change in sales from the year 2000 to the present year. She enters the values of per
    10·1 answer
  • Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit
    13·1 answer
  • Mention two hardware groups​
    7·1 answer
  • what is invention and inovation do more responsible think for making computer a succsessful product?explain​
    15·1 answer
  • True or False: Nanomemory applies to computers.
    13·1 answer
  • Discuss your favorite video games and why you like them. What types of features make a game fun to play? Why are they features e
    11·2 answers
  • You wrote a program to find the factorial of a number. In mathematics, the factorial operation is used for positive integers and
    14·2 answers
  • How does the dns solve the problem of translating domain names like example.com into ip addresses?
    10·1 answer
  • Answer this pls ASAP
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!