1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
15

How do you handle sensitive data?

Computers and Technology
1 answer:
arlik [135]3 years ago
7 0

  1. <em>Take stock. Know what personal information you have in your files and on your computers.</em>
  2. <em>Scale down. Keep only what you need for your business.</em>
  3. <em>Lock it. Protect the information that you keep.</em>
  4. <em>Pitch it. Properly dispose of what you no longer need.</em>
  5. <em>plan </em><em>ahead</em>

<em>hope </em><em>it</em><em> helps</em>

You might be interested in
Jack wants to save his PowerPoint file electronically. He should store his file in:
Vikentia [17]

Answer:

C. USB

Explanation:

A USB Disk allows for a Backup of the PowerPoint file in case Jack needs it in the future.

3 0
3 years ago
Read 2 more answers
I need help with humans need not apply for codeing
vampirchik [111]

Answer:

huge\color{blue}\boxed{The}\huge\color{pink}\boxed{Points

3 0
2 years ago
Read 2 more answers
In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac
NemiM [27]

Answer : The securtiy of the password can be maitained by the shadow files such as:-

  • max is for the days that represent that the same password can be used without the need for changing it  
  • min is for the days that represent waiting days before the changing of password after he/she gets a new password
  • warn are the days that come with Waring sign that the password is going to expire soon.

For a certain period of time , the user can access the log in when the password has expired . If that period is timed out then there will be no log in option and the account gets disabled.

4 0
3 years ago
Why does the IPv6 format use letters and numbers?
Iteru [2.4K]

Answer:

c is the response hope it helps

7 0
3 years ago
What is the value of creating recurring tasks?
scoundrel [369]

Answer:

✔️saves time spent manually creating multiple tasks

Explanation:

I did it on edge

4 0
2 years ago
Read 2 more answers
Other questions:
  • A ____ is a prewritten formula that is built into excel.
    6·1 answer
  • Which view In a presentation program displays you’re slides in full screen modes ?
    8·2 answers
  • A web page created expressly in hopes of ranking well for a term in a search engine's organic/non-paid listings and which itself
    7·1 answer
  • Visual imagery encoding relates to _____ encoding, in that a person is connecting the new information to previously existing inf
    11·1 answer
  • What element is not a selection in the Interface preferences? UI Character Presets UI Font Size UI Language UI Scaling
    9·1 answer
  • What is the mass of a cookbook
    7·1 answer
  • CAN SOMEONE PLEASE DO THESE FOR ME I WILL GIVE BRAINLIESR AND 20 POINTS PLEASE ITS ONLY 5 QUESTIONS PLEASEEEE
    12·1 answer
  • PLS I NEED HELP Question 6<br> 1 pts<br> What is NOT a built-in function in python?
    5·1 answer
  • Please Help, Thank you!
    5·1 answer
  • The memory capacity in bits for performing the operation y = f (x) using the table lookup method, where x is an 8-bit number and
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!