1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
3 years ago
12

A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what shoul

d the IT security department implement to prevent this type of mishandling of confidential information
Computers and Technology
1 answer:
melisa1 [442]3 years ago
4 0
Save the passwords to an encrypted database, saving the passwords as hash values to keep confidentiality.
You might be interested in
How to beat level 50 in give up robot 2
LiRa [457]

Answer:

just follow the steps and and become tough calm but tough

3 0
3 years ago
The two key elements of any computer system are the____and the _____.
Virty [35]
Easy.
Hardware and software!
Did you ever try to use a computer with only mouse and monitor?
8 0
3 years ago
The ____ contains buttons that provide different views of the document window, and some common operations related to viewing and
alexandr402 [8]
I think it is called a document tool bar
8 0
3 years ago
The term BIOS stands for
marissa [1.9K]
BIOS stands for basic input and output system. It is a program used during the start-up (or booting process) of a computer or device. Hope this helps! :)
3 0
3 years ago
Read 2 more answers
There are several categories of utility programs that were discussed in this unit. For this item, list one. In one to three sent
Zolol [24]

Answer:

Antivirus

Explanation:

The antivirus software is a utility program and what it basically does include: (1) detecting of virus on the computer system (2) bring to the notice of the computer user, the presence of virus on the system.

An example is Avast Antivirus.

6 0
3 years ago
Other questions:
  • Physical parts of components of a computer system is called
    9·1 answer
  • What should a system administrator use to disable access to a custom application for a group of users?
    5·1 answer
  • An Internet connection problem for customers is found to be outside a carrier's regional office. As a result, which area needs t
    9·1 answer
  • A polyalphabetic cipher uses many ___
    6·1 answer
  • Name at least two primary forms of identification needed to obtain a learner’s license.
    10·2 answers
  • Universal Containers has a requirement to integrate Salesforce with an external system to control record access. What option sho
    11·1 answer
  • Which Windows 7 feature allows a user to open multiple programs at the same time?
    7·1 answer
  • What happens when you apply a theme to a form?
    14·1 answer
  • The rhythmic note that three beats is called a____half note.
    15·2 answers
  • What are the four components of security documentation?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!