Which practice is the best option for desktop security? A. Make a unique user ID and password for each account. B. Change the password of your account daily. C. Use a common user ID and password for all accounts. D. Only give access to the desktop to the system administrator.

Answers

Answer 1
A. Make a unique user ID and password for each account
Answer 2

A few of these are very good ideas

D could be a good idea

B and A are good ideas



Related Questions

in the Microsoft publisher application, words underlined in red are ____.

Answers

In the Microsoft publisher application (as well as many other websites such as Brainly, Google docs, etc), words underlined in red are spelled incorrectly.

Whether you spelled it incorrectly or did not complete the words, as long as the word is not found in the dictionary, the word would be underlined with a red squiggly line.

~

Answer:

improperly formatted

follow me on insta dee.fsf

 HURRY!!!!     what is the purpose of inserting smart art in a microsoft office program?

Answers

Final answer:

The purpose of using SmartArt in Microsoft Office is to visually convey information, add aesthetic appeal, and clarify complex data. It offers a wide range of graphics that enhance the presentation of ideas in a professional and easy-to-understand manner.

Explanation:

The purpose of inserting SmartArt in a Microsoft Office program is to visually communicate information. SmartArt graphics can help you create designer-quality illustrations with only a few clicks of your mouse. By using different types of SmartArt graphics, such as lists, processes, cycles, hierarchies, relationships, matrices, and pyramids, you can effectively enhance your message and assist your audience in understanding your point more quickly. For example, a SmartArt hierarchy is useful in creating an organizational chart, and a process type SmartArt can illustrate the steps in a workflow.

SmartArt is not just about aesthetics; it can also help to clarify and simplify complex information. As a result, SmartArt is a powerful tool in creating presentations, reports, documents, and many other types of visual content within Microsoft Office programs like Word, Excel, PowerPoint, and Outlook.

Evidence left behind by participants or observers is an example of what kind of resource?

A. Secondary
B. Primary
C. Hearsay
D. Hieroglyphics

Answers

Answer:

Option (B)

Explanation:

Primary sources are usually defined as those initial pieces of evidence that are left behind by any observer or participant. This may be letters, diaries, documents, biological as well as audio or visual recordings. These are made in the past.

These sources are highly useful and help in carrying out an investigation and reach the conclusion or to find the criminal. These are most useful in solving crime scenes.

Thus, the correct answer is option (B).

How do you measure the influence of ICT (information and Communication Technology) in a country?

Is like how much people use social media or how much people own Overwatch in a certain country?

and do you divide this number by the population to get the influence?

Answers

ICT is a very powerful media, if it can be used with proper caution. ICT doesnot depicts only the modern medias but the traditional as well. I believe, that enhancement of knowledge and education will lead to development in rural areas. And through ICT it can be achieved, as it can cover huge mass in lesser time.

Measuring the influence of Information and Communication Technology (ICT) in a country encompasses more than just the usage of social media or ownership of a particular game like Overwatch. It involves assessing various indicators of technology use and integration into society, including broadband access, mobile device penetration, e-commerce activity, and digital literacy among citizens. The influence of ICT can be categorized as heavy, medium, light, or none, depending on these comprehensive metrics rather than a single aspect such as social media usage. While per capita measures (i.e., dividing by the population) can provide insights into how widespread technology use is, a multifaceted approach offers a more detailed understanding of ICT's role within a nation.

ICT influence can be determined through numerous qualitative and quantitative factors. Surveys that describe engagement with technology like frequency, duration, location, and purpose are pivotal in gauging the extent of ICT adoption. Moreover, considering the questions related to excessive internet use and its impact on well-being and relationships provides an understanding of the societal implications of ICT. Assessing how individuals utilize technology — the devices owned, applications used, functions served, and connections made — gives a nuanced view of technology's integration into daily life. This measurement can be validated with empirical evidence such as the number of internet subscriptions, percentage of the population using the internet, education and training programs in ICT, and more. All these aspects contribute to an in-depth understanding of ICT influence in society, going far beyond basic penetration rates and individual product usage.

Aspiring graphic designers can earn a(n) certification for graphic design software, such as Photoshop and Acrobat.

Answers

Aspiring graphic designers can earn certifications in software like Adobe Photoshop and Adobe Acrobat, which demonstrate proficiency in creating professional visual materials. Certifications are not mandatory like in some other design professions, but they do enhance a designer's qualifications and marketability.

Certification for Graphic Design Software

Aspiring graphic designers can earn a certification for graphic design software, such as Adobe Photoshop and Adobe Acrobat. Certifications in these programs can demonstrate a designer's proficiency and may help in career advancement. Software like Adobe Creative Suite, which includes Adobe InDesign CS6 and CC Adobe Acrobat 11 Pro, is industry-standard for creating various visual communication materials.

Professionally licensed designers, like those in architecture, are mandated to protect public welfare and must adhere to strict educational and professional requirements. However, graphic designers often do not require formal licensing but can benefit from certifications to showcase their skills in widely used programs. Learning to use these tools effectively allows designers to produce professional-looking visual aids and graphics, enhancing their marketability.

Computer-based media requires not only the technical ability to use software but also an understanding of good design principles to create compelling visual content. With the universal principles of good design, graphic designers can apply their software knowledge to create effective graphics that communicate their intended message.

I'm stuck on this Java exercise problem and don't know how to organize my code with proper formatting and it's not helping that I'm pretty terrible at logic. I can't figure out how to return the number of spaces to be displayed in the main method.

Answers

In your "count spaces method" before the for loop, you want to declare an int variable (let's call it spc)

then, each time you find that charat, spc++.


also, the string must be declared in the main method, not the spaces count method.


The actual code:


public class CountSpaces{

public static void main(String[] args){

String instring = "(your quote here)";

int spaces = calculateSpaces(instring);

System.out.println("The number of spaces is " + spaces);

}

public static int calculateSpaces(String in){

int spc = 0;

for(int i= 0; i<in.length; i++){

if(in.charAt(i)== ' '){

spc++;

}

}

return spc;

}

}


that should be it.  If you have any questions, feel free to reach out.

Design a circuit that has a 3-bit binary input B2, B1, B0 (where B2 is most significant bit and B0 is least significant bit) and a single output (Z) specified as follows :
Z = 0, even numbers
Z = 1, odd numbers

Answers

Isn't this circuit just a wire, where Z=B0?

What are interpersonal skills?
 a. Individual preferences for team projects
 b. One's competence with tasks requiring solitude
 c. The ability to work alone on a project
 d. The ability to communicate or interact well with other people

Answers

The answer should be D

The correct answer is D. The ability to communicate or interact well with other people

Explanation:

The word "interpersonal" refers to the relationship between two or more individuals. In this way, interpersonal skills are the skills necessary to interact or relate well with other people. This concept includes communicative skills, collaborative skills, leading skills, and similar that allow a person to interact, communicate and work with other people to achieve a common purpose, solve a problem or develop projects. This is the opposite of working on your own or working on tasks and projects that require solitude. According to this, "interpersonal skills" is "the ability to communicate or interact well with other people".

A derived class is a class that inherits data members and functions from a ____ class.

Answers

The answer is superclass

Answer: ‘Base’ class.

Explanation: I did the mastery test and got it correct.

The hazards associated with GMAW equipment include all of the following, EXCEPT:
A) Back injuries
B) Electrical "arcing"
C) Eye injuries
D) Sparks and spatter

Answers

Back Injuries

Welding mostly has Arcing, Eye injuries, and sparks and spatter

Be careful out there

Answer

The hazard not associated with GMAW equipment is; A. Back injuries

Explanation

Welders face hazards that can potentially be dangerous which include; electric shocks, fumes and gases, fires and explosions and injuries from improper PPE. Safety hazards associated with use of GMAW equipment are burns, eye damage, electrical shocks, injuries and cuts. Please review the Health Hazards of Welding to understand the risks involved in the procedure.


What function does a security certificate perform?
A. Creates user accounts
B. Scrambled data
C. Identifies users
D. Creates password policies
E. Provides file access

Answers

Answer:

B. Scrambled data  

C. Identifies users

Explanation:

The first mission of a security certificate is to encrypt/scramble data so if someone intercepts it, they won't be able to read it.

The second mission is to reassure the Website visitors that the company behind the Website you're dealing with is really who they are. It identifies the user of the security certificate, not the user of the Website.

The other functions described in A, D and E are local configurations done by the Website administrator, while the security certificate is managed by an external authority.

Which company made the Saturn, Game Gear, and pico consoles?

•Atari
•Sega
•Nintendo
•Mattel

Answers

The answer is Sega, the Pico is also known as the Sega Pico.

I think it is Sega. Sega is the biggest company and have this in the list of their creations.

Technician a says that impact sockets have thicker walls than conventional sockets. Technician b says that impact sockets have a black oxide finish. Which technician is correct

Answers

Impact sockets are sockets used to cope with the vibration caused by the impact of the hammer on the anvil. Both technicians are right. It is true that impact sockets have thicker walls than conventional sockets, so technician A is right. But it is also true that impact sockets have a black oxide finish, so the technician B is also right.

List 5 items you should keep in mind when developing an app:

Answers

Answer:

Agree on aims concerning the application.Read your end users.Take your IT partners toward the conversations in the beginning.Program for various announcements.Choose the technology which you know and will be able to continue.

Explanation:

You should always keep the above five points while developing an app. You should keep your goals in mind that what kind of app you are going to develop and you are taking surveys from end users that what they want after some time in different cycles. Your team should discuss your project time by time about the progress of an app. Your project should be a long term and should almost cover all kind of users.



what is the first thing you should do when troubleshooting a computer problem

Answers

Final answer:

The first step in troubleshooting a computer problem is to identify the issue clearly by noting symptoms, contexts, and error messages. This forms the basis for applying problem-solving strategies to address the problem effectively.

Explanation:

The first thing you should do when troubleshooting a computer problem is to identify the issue. This involves observing the symptoms of the problem, understanding the context in which it occurs, and gathering any error messages that might be displayed. Once you have a clear understanding of the issue, you can then proceed to apply different problem-solving strategies. In some cases, a simple restart might be the solution, but for more complex problems, you might need to research the issue, consult technical forums, or seek professional help.

Steps for problem-solving include:


 Identify the "given" information that you have about the problem, such as error messages or what you were doing when the problem occurred.
 Determine what the problem is asking you to "find" or resolve.
 Apply a suitable troubleshooting strategy based on the information collected.

Final answer:

The first step in troubleshooting a computer problem is to clearly identify the issue by gathering information on symptoms, error messages, and system behavior. The next steps involve determining the 'given' information and what is needed to find a solution. Documenting all actions taken during the process is important for efficiency and future reference.

Explanation:

Initial Steps in Troubleshooting a Computer Problem

When troubleshooting a computer problem, the first strategy is to clearly identify the issue at hand. This involves gathering information about the symptoms of the problem, any error messages, and understanding what the computer was doing when the problem occurred. Once the issue is identified, you can move forward with appropriate troubleshooting steps, comparing your problem to known issues, or using specialized tools for diagnosis.

During the troubleshooting process, it is essential to identify the 'given' information, such as any error messages, system behavior, and recent changes to the computer system. You should then determine what the problem is asking you to 'find', which may include restoring functionality, determining the cause of an error, or rectifying a performance issue. By clearly outlining the problem and gathering all the necessary information, you can systematically approach the troubleshooting process and apply various problem-solving strategies to find a solution.

It is crucial to approach the problem systematically and remain organized throughout the process. Documenting each step taken can help avoid repeating actions and create a record for future reference, fostering efficient and effective troubleshooting.

Based on your understanding of Moore’s Law, what do you predict will be the next trend in the evolution of computers?

(A) Computers have nearly stopped changing.

(B) Computers will continue to become smaller in size and become faster.

(C) Computers will continue to become faster but stay the same size.

(D) Computers will continue to increase in size and become faster.

Answers

Actually, the answer is (B) Computers will continue to become smaller in size and become faster.  For example, google  i9-9900k mini itx pc build. You can have an insanely powerful pc and it be very small.

(B): Computers will continue to become smaller in size and become faster.

John wants to access specific programs from the start menu in his laptop. How after he is unable to view them when he clicks the start button. What should he do next to view the program he is looking for?

Answers

He can try to search for what he is looking for. If not he can google or go to Microsoft store to see if he can find what he is looking for.

John should try the search option that appears at the bottom of the start menu.

Explanation:

There are multiple programs installed on a computer. Each and every program have their own importance and significance. In order to access a program, the user has to launch the program.

Installed programs often create shortcuts on the desktop and can also be found in the start menu. Since John is unable to access specific programs from the Start menu, he should try the search option that appears at the bottom of the start menu.

Wireless attacks avoid the access points to limit detection.
a. True
b. False

Answers

Answer:

Option B i.e., False.

Explanation:

The weakness, KRACK tricks a wifi access points to reuse an in-use encryption, enabling the intruder to decode and interpret data intended to remain encrypted. Wireless communication encrypts, that decrypt unencrypted wireless network activity and expose sensitive data.

So, the following scenario is false about the wireless attack.

Which practice is the best option for desktop security?
A.
Make a unique user ID and password for each account.
B.
Change the password of your account daily.
C.
Use a common user ID and password for all accounts.
D.
Only give access to the desktop to the system administrator.

Answers

You should make a unique password and change it daily

Answer:

A.Make a unique user ID and password for each account.

Explanation:

If you make a unique used ID and password for each account you will have the desktop personal and no one but the owner of that account and user Id will be able to access to it, that makes it more private and you can storage there important information. That would be the best option.

"re-type the celsius_to_kelvin function. Change the name to kelvin_to_celsius, and modify the function accordingly."

Answers

You didn't include the original function, but the new function will contain something like:

function kelvin_to_celsius(k)

{

  return k - 273.15;

}

Depending of course on your programming language.

The outcome for negative Kelvin is undefined, you could test for that.


For converting the temperature from Celsius to kelvin, 273.15 is added to the Celsius temperature and for converting the temperature from kelvin to Celsius, 273.15 is subtracted from the kelvin temperature. The function celcius_to_kelvin() is for converting from Celsius to kelvin temperature and the function kelvin_to_celcius() is for converting from kelvin to Celsius temperature.

Further Explanation:

Code: Following is the python that converts the temperature from celcius to kelvin and kelvin to celcius.

# Celcius to Kelvin conversion

def celsius_to_kelvin(value_celsius):

value_of_kelvin = 0.0

value_of_kelvin = value_of_celsius + 273.15

return value_of_kelvin

# Kelvin to Celcius conversion

def kelvin_to_celcius(value_of_kelvin):

value_of_celcius=0.0

value_of_celcius=value_of_kelvin-273.15

return value_celcius

value_c = 0.0

value_k = 0.0

value_c = 10.0

print(value_c, 'C is', celsius_to_kelvin(value_c), 'K')

value_k = 283.15

print(value_k, 'is', kelvin_to_celsius(value_k), 'C')

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623

Answer details:

Grade: Senior Secondary School

Subject: Computer Science and Engineering

Chapter: Python Programming

Keyword:

Python, programming, C, C++, Java, Kelvin, Fahrenheit, Celsius, temperature, value, kelvin_to_celcius, celcius_to_kelvin, variable, def, definition, return, modify, function, accordingly, re-type

Why was the term personal computer created? A. because the computers finally fit in the owner’s hand B. because they were designed for individuals to use C. because you had to enter a personal password to access the computer D. because the computer was developed by a person

Answers

B. because they were designed for individuals to use

pretty sure the answer is B

Other Questions
Charlotte has invited 75 people to her party. The buffet menu below is for 25 people. Work out how many of the following she will need: What are the first four terms of the sequence shown below?an = 5n 1A.1, 4, 9, 14B.4, 9, 14, 19C.5, 6, 7, 8D.6, 11, 16, 21 2 3 of the children at a school are scared of snakes, 1 3 are scared of spiders, and 1 6 are scared of snakes and spiders. What fraction of those who are scared of spiders are also scared of snakes? 1. -7/9 3/5 A. 18/35 B. 7/15 C. -18/35D. -7/15 2. 1/3 divided by 5/6A. 2/5B. 5/2C. 2/15 D. 5/18 3. 2 and 1/8 divided by 34 A. 51/32 B. 1/16 C. 2 and 1/3 D. 2 and 5/6 4. -4/5 divided by 8/9 A. -9/10B. 1/20 C. 9/10 D. -1/20 5. 3/5 Divided by 9/10 A. 2/3 B. 2/5 C. 3/10 D.27/50 6. 4/7 divided by 9/14 A. 3/7 B. 2/3 C. 6/7 D. 8/9 What is the square root of this problem?- Historically, which of these is considered a secondary source? A) a diary B) a birth certificate C) The Autobiography of Malcolm X D) The History of the World, by J.K. Spivey PLEASE ANSWER FAST WILL MAKE BRAINLIST...1.David has a collection of computer games. Last year, he had 400 CDs in his collection and this year he has 125% as many CDs as he had last year. How many CDs does he have now?Select one:a. 400b. 500c. 425d. 4502.David has a collection of computer games. Last year, he had 400 CDs in his collection and this year he has 120% as many CDs as he had last year. What is the size of his CD collection this year?Select one:a. 480 CDsb. 500 CDsc. 400 CDsd. 440 CDs3.Eric used to practice football for 60 minutes every day. Now, he practices for 150% as many minutes as he used to. How many minutes does he currently practice every day?Select one:a. 110b. 180c. 90d. 2004.Eric used to practice football for 90 minutes every day. Now, he practices 200% as many minutes as he used to. How many minutes does he currently practice every day?Select one:a. 180b. 90c. 200d. 100Jane drives at a constant rate of 45 miles per hour for 4 hours. How far will she have traveled in that time?Select one:a. 110 milesb. 220 milesc. 180 milesd. 160 miles If you are involved in a collision and your vehicle is blocking the flow of traffic, you should leave the vehicle where it is until the police arrive leave the scene of the accident to call a tow truck move the car out of the flow of traffic if possible move the traffic flow around the car Why does the flower girl tell the taxi driver to take her to bucknam pellis What is the volume of a cube if it is 25cm long 6cm wide and 4cm high Different ______ of an element have different numbers of electrons Why does Jimmy get nervous when he moves his cursor over the "buy now" button? Solve for x. 5x2(x+1)=1/4 Enter your answer in the box. x = "Is we gathered data" a phrase or a clause Please rewrite this sentence correctly-- elephant's are born without tusks get baby tusks and replace those with adult tusks Identify each of the listed organs as male or female and describe the function of each. falloapian tubesTesticlesUterusScrotumOvariesVas deferens Taxi A charges $0.20 per mile and an initial fee of $4. Taxi B charges $0.40 per mile and an initial fee of $2. Write an inequality that can determine when the cost of Taxi B will be greater than Taxi A. A) 0.20x + 4 > 0.40x + 2 B) 0.20x + 4 < 0.40x + 2 C) 0.20x + 0.40x > 4 + 2 D) 0.20x + 0.40x < 4 + 2 Where does the sea-floor spreading take place? A. Convergent boundaries B. Transform boundaries C. Oceanic volcanoes D. Mid-ocean ridges The most significant development of hunter-gathering societies during the Stone Age was art true or false ? Laura's family is going on a vacation.They will drive 4,180 miles over the next two weeks.About how many miles will they drive on average each week.