1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
2 years ago
13

What do you think that private information like passwords, PIN numbers, will be guarded or shared with the public? Why?​

Computers and Technology
1 answer:
Salsk061 [2.6K]2 years ago
6 0

Answer:

Explanation:

These will be shared with the public because websites like haveibeenpwned share what data leaks that your password has appeared on. It is inevitable that these hacks will continue to occur as long as security can be breached.

You might be interested in
Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics
Stels [109]

Answer:

they trusted each other

Explanation:

thses were scientists with one goal in mind: making it work.  No cheating.

6 0
3 years ago
Anil needs to show the overlap of people who live in a certain neighborhood in his city and who support a specific political can
pantera1 [17]

Since Anil needs to show the overlap of people who live in a certain neighborhood in his city that supports a specific political candidate, the type of conceptual diagram which he should use is a: B: Venn diagram.

<h3>What is a Venn diagram?</h3>

A Venn diagram can be defined as a circular graphical (visual) tool that is typically used for representing, logically comparing and contrasting two (2) or more finite sets of data such as objects, students, events, voters, concepts, people, etc.

In this context, we can reasonably infer and logically deduce that a Venn diagram is a type of conceptual diagram which can be used by Anil in illustrating the overlap of people who are living in a certain neighborhood in his city and supports a specific political candidate in an election.

Read more on Venn diagram here: brainly.com/question/24581814

#SPJ1

8 0
1 year ago
A company is deploying a file-sharing protocol across a network and needs to select a protocol for authenticating clients. Manag
VARVARA [1.3K]

Answer:

The answer is "Option C".

Explanation:

Among all four of the above, the application of Kerberos is securer. The consumer not just to validates the provider but also verifies the product to the clients with secure authentication.  

  • It offers a common interface between windows as well as other operating systems.  
  • The user login Smart Card gives much higher protection as it allows security with two factors, that's why except Option C other choices were wrong.
6 0
3 years ago
How to see where files get ripped to windows?
Artist 52 [7]
File Explorer

AKA: Where to find files
6 0
4 years ago
Manipulating graphic images to perform a command has replaced the ____ user interface.
Alekssandra [29.7K]

Answer:

The answer is "Command-based".

Explanation:

CLI stands for the command-line interface, it is also known as the command-based user interface. CLI is a text interface that allows the user to react to visual prompts by typing individual commands in the interface and receiving the same response.

  • It is available on Microsoft windows.
  • CLI is the way that is used by users to interact with computer programs.

3 0
3 years ago
Other questions:
  • Harry wants to change the background of all of his presentation slides. Which slide will enable him to make this change to all t
    14·1 answer
  • 2. What's the keyboard command that will allow you to "copy" text?
    8·2 answers
  • To add a pattern to a page, navigate to the _____ feature.
    7·1 answer
  • Which folders are commonly used in the navigation pane of outlook
    5·1 answer
  • In a typical e-mail address, the \"host\"is
    5·1 answer
  • What command can be used to export an nps backup file named npsconfig.xml that can be used to restore nps configuration on anoth
    12·1 answer
  • Which of these best represents a call to action?
    7·2 answers
  • For (int j- 4; j &gt; 0; j--)
    9·1 answer
  • What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
    15·1 answer
  • What is the main coding language for netflix?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!