Which practice is the best option for desktop security?
A.
Make a unique user ID and password for each account.
B.
Change the password of your account daily.
C.
Use a common user ID and password for all accounts.
D.
Only give access to the desktop to the system administrator.

Answers

Answer 1
You should make a unique password and change it daily
Answer 2

Answer:

A.Make a unique user ID and password for each account.

Explanation:

If you make a unique used ID and password for each account you will have the desktop personal and no one but the owner of that account and user Id will be able to access to it, that makes it more private and you can storage there important information. That would be the best option.


Related Questions

Evidence left behind by participants or observers is an example of what kind of resource?

A. Secondary
B. Primary
C. Hearsay
D. Hieroglyphics

Answers

Answer:

Option (B)

Explanation:

Primary sources are usually defined as those initial pieces of evidence that are left behind by any observer or participant. This may be letters, diaries, documents, biological as well as audio or visual recordings. These are made in the past.

These sources are highly useful and help in carrying out an investigation and reach the conclusion or to find the criminal. These are most useful in solving crime scenes.

Thus, the correct answer is option (B).

List 5 items you should keep in mind when developing an app:

Answers

Answer:

Agree on aims concerning the application.Read your end users.Take your IT partners toward the conversations in the beginning.Program for various announcements.Choose the technology which you know and will be able to continue.

Explanation:

You should always keep the above five points while developing an app. You should keep your goals in mind that what kind of app you are going to develop and you are taking surveys from end users that what they want after some time in different cycles. Your team should discuss your project time by time about the progress of an app. Your project should be a long term and should almost cover all kind of users.



in the Microsoft publisher application, words underlined in red are ____.

Answers

In the Microsoft publisher application (as well as many other websites such as Brainly, Google docs, etc), words underlined in red are spelled incorrectly.

Whether you spelled it incorrectly or did not complete the words, as long as the word is not found in the dictionary, the word would be underlined with a red squiggly line.

~

Answer:

improperly formatted

follow me on insta dee.fsf

Design a circuit that has a 3-bit binary input B2, B1, B0 (where B2 is most significant bit and B0 is least significant bit) and a single output (Z) specified as follows :
Z = 0, even numbers
Z = 1, odd numbers

Answers

Isn't this circuit just a wire, where Z=B0?

Aspiring graphic designers can earn a(n) certification for graphic design software, such as Photoshop and Acrobat.

Answers

Aspiring graphic designers can earn certifications in software like Adobe Photoshop and Adobe Acrobat, which demonstrate proficiency in creating professional visual materials. Certifications are not mandatory like in some other design professions, but they do enhance a designer's qualifications and marketability.

Certification for Graphic Design Software

Aspiring graphic designers can earn a certification for graphic design software, such as Adobe Photoshop and Adobe Acrobat. Certifications in these programs can demonstrate a designer's proficiency and may help in career advancement. Software like Adobe Creative Suite, which includes Adobe InDesign CS6 and CC Adobe Acrobat 11 Pro, is industry-standard for creating various visual communication materials.

Professionally licensed designers, like those in architecture, are mandated to protect public welfare and must adhere to strict educational and professional requirements. However, graphic designers often do not require formal licensing but can benefit from certifications to showcase their skills in widely used programs. Learning to use these tools effectively allows designers to produce professional-looking visual aids and graphics, enhancing their marketability.

Computer-based media requires not only the technical ability to use software but also an understanding of good design principles to create compelling visual content. With the universal principles of good design, graphic designers can apply their software knowledge to create effective graphics that communicate their intended message.

John wants to access specific programs from the start menu in his laptop. How after he is unable to view them when he clicks the start button. What should he do next to view the program he is looking for?

Answers

He can try to search for what he is looking for. If not he can google or go to Microsoft store to see if he can find what he is looking for.

John should try the search option that appears at the bottom of the start menu.

Explanation:

There are multiple programs installed on a computer. Each and every program have their own importance and significance. In order to access a program, the user has to launch the program.

Installed programs often create shortcuts on the desktop and can also be found in the start menu. Since John is unable to access specific programs from the Start menu, he should try the search option that appears at the bottom of the start menu.

 HURRY!!!!     what is the purpose of inserting smart art in a microsoft office program?

Answers

Final answer:

The purpose of using SmartArt in Microsoft Office is to visually convey information, add aesthetic appeal, and clarify complex data. It offers a wide range of graphics that enhance the presentation of ideas in a professional and easy-to-understand manner.

Explanation:

The purpose of inserting SmartArt in a Microsoft Office program is to visually communicate information. SmartArt graphics can help you create designer-quality illustrations with only a few clicks of your mouse. By using different types of SmartArt graphics, such as lists, processes, cycles, hierarchies, relationships, matrices, and pyramids, you can effectively enhance your message and assist your audience in understanding your point more quickly. For example, a SmartArt hierarchy is useful in creating an organizational chart, and a process type SmartArt can illustrate the steps in a workflow.

SmartArt is not just about aesthetics; it can also help to clarify and simplify complex information. As a result, SmartArt is a powerful tool in creating presentations, reports, documents, and many other types of visual content within Microsoft Office programs like Word, Excel, PowerPoint, and Outlook.

How do you measure the influence of ICT (information and Communication Technology) in a country?

Is like how much people use social media or how much people own Overwatch in a certain country?

and do you divide this number by the population to get the influence?

Answers

ICT is a very powerful media, if it can be used with proper caution. ICT doesnot depicts only the modern medias but the traditional as well. I believe, that enhancement of knowledge and education will lead to development in rural areas. And through ICT it can be achieved, as it can cover huge mass in lesser time.

Measuring the influence of Information and Communication Technology (ICT) in a country encompasses more than just the usage of social media or ownership of a particular game like Overwatch. It involves assessing various indicators of technology use and integration into society, including broadband access, mobile device penetration, e-commerce activity, and digital literacy among citizens. The influence of ICT can be categorized as heavy, medium, light, or none, depending on these comprehensive metrics rather than a single aspect such as social media usage. While per capita measures (i.e., dividing by the population) can provide insights into how widespread technology use is, a multifaceted approach offers a more detailed understanding of ICT's role within a nation.

ICT influence can be determined through numerous qualitative and quantitative factors. Surveys that describe engagement with technology like frequency, duration, location, and purpose are pivotal in gauging the extent of ICT adoption. Moreover, considering the questions related to excessive internet use and its impact on well-being and relationships provides an understanding of the societal implications of ICT. Assessing how individuals utilize technology — the devices owned, applications used, functions served, and connections made — gives a nuanced view of technology's integration into daily life. This measurement can be validated with empirical evidence such as the number of internet subscriptions, percentage of the population using the internet, education and training programs in ICT, and more. All these aspects contribute to an in-depth understanding of ICT influence in society, going far beyond basic penetration rates and individual product usage.

The hazards associated with GMAW equipment include all of the following, EXCEPT:
A) Back injuries
B) Electrical "arcing"
C) Eye injuries
D) Sparks and spatter

Answers

Back Injuries

Welding mostly has Arcing, Eye injuries, and sparks and spatter

Be careful out there

Answer

The hazard not associated with GMAW equipment is; A. Back injuries

Explanation

Welders face hazards that can potentially be dangerous which include; electric shocks, fumes and gases, fires and explosions and injuries from improper PPE. Safety hazards associated with use of GMAW equipment are burns, eye damage, electrical shocks, injuries and cuts. Please review the Health Hazards of Welding to understand the risks involved in the procedure.


what is the first thing you should do when troubleshooting a computer problem

Answers

Final answer:

The first step in troubleshooting a computer problem is to identify the issue clearly by noting symptoms, contexts, and error messages. This forms the basis for applying problem-solving strategies to address the problem effectively.

Explanation:

The first thing you should do when troubleshooting a computer problem is to identify the issue. This involves observing the symptoms of the problem, understanding the context in which it occurs, and gathering any error messages that might be displayed. Once you have a clear understanding of the issue, you can then proceed to apply different problem-solving strategies. In some cases, a simple restart might be the solution, but for more complex problems, you might need to research the issue, consult technical forums, or seek professional help.

Steps for problem-solving include:


 Identify the "given" information that you have about the problem, such as error messages or what you were doing when the problem occurred.
 Determine what the problem is asking you to "find" or resolve.
 Apply a suitable troubleshooting strategy based on the information collected.

Final answer:

The first step in troubleshooting a computer problem is to clearly identify the issue by gathering information on symptoms, error messages, and system behavior. The next steps involve determining the 'given' information and what is needed to find a solution. Documenting all actions taken during the process is important for efficiency and future reference.

Explanation:

Initial Steps in Troubleshooting a Computer Problem

When troubleshooting a computer problem, the first strategy is to clearly identify the issue at hand. This involves gathering information about the symptoms of the problem, any error messages, and understanding what the computer was doing when the problem occurred. Once the issue is identified, you can move forward with appropriate troubleshooting steps, comparing your problem to known issues, or using specialized tools for diagnosis.

During the troubleshooting process, it is essential to identify the 'given' information, such as any error messages, system behavior, and recent changes to the computer system. You should then determine what the problem is asking you to 'find', which may include restoring functionality, determining the cause of an error, or rectifying a performance issue. By clearly outlining the problem and gathering all the necessary information, you can systematically approach the troubleshooting process and apply various problem-solving strategies to find a solution.

It is crucial to approach the problem systematically and remain organized throughout the process. Documenting each step taken can help avoid repeating actions and create a record for future reference, fostering efficient and effective troubleshooting.

What function does a security certificate perform?
A. Creates user accounts
B. Scrambled data
C. Identifies users
D. Creates password policies
E. Provides file access

Answers

Answer:

B. Scrambled data  

C. Identifies users

Explanation:

The first mission of a security certificate is to encrypt/scramble data so if someone intercepts it, they won't be able to read it.

The second mission is to reassure the Website visitors that the company behind the Website you're dealing with is really who they are. It identifies the user of the security certificate, not the user of the Website.

The other functions described in A, D and E are local configurations done by the Website administrator, while the security certificate is managed by an external authority.

Which company made the Saturn, Game Gear, and pico consoles?

•Atari
•Sega
•Nintendo
•Mattel

Answers

The answer is Sega, the Pico is also known as the Sega Pico.

I think it is Sega. Sega is the biggest company and have this in the list of their creations.

Based on your understanding of Moore’s Law, what do you predict will be the next trend in the evolution of computers?

(A) Computers have nearly stopped changing.

(B) Computers will continue to become smaller in size and become faster.

(C) Computers will continue to become faster but stay the same size.

(D) Computers will continue to increase in size and become faster.

Answers

Actually, the answer is (B) Computers will continue to become smaller in size and become faster.  For example, google  i9-9900k mini itx pc build. You can have an insanely powerful pc and it be very small.

(B): Computers will continue to become smaller in size and become faster.

A derived class is a class that inherits data members and functions from a ____ class.

Answers

The answer is superclass

Answer: ‘Base’ class.

Explanation: I did the mastery test and got it correct.

I'm stuck on this Java exercise problem and don't know how to organize my code with proper formatting and it's not helping that I'm pretty terrible at logic. I can't figure out how to return the number of spaces to be displayed in the main method.

Answers

In your "count spaces method" before the for loop, you want to declare an int variable (let's call it spc)

then, each time you find that charat, spc++.


also, the string must be declared in the main method, not the spaces count method.


The actual code:


public class CountSpaces{

public static void main(String[] args){

String instring = "(your quote here)";

int spaces = calculateSpaces(instring);

System.out.println("The number of spaces is " + spaces);

}

public static int calculateSpaces(String in){

int spc = 0;

for(int i= 0; i<in.length; i++){

if(in.charAt(i)== ' '){

spc++;

}

}

return spc;

}

}


that should be it.  If you have any questions, feel free to reach out.

Why was the term personal computer created? A. because the computers finally fit in the owner’s hand B. because they were designed for individuals to use C. because you had to enter a personal password to access the computer D. because the computer was developed by a person

Answers

B. because they were designed for individuals to use

pretty sure the answer is B

Wireless attacks avoid the access points to limit detection.
a. True
b. False

Answers

Answer:

Option B i.e., False.

Explanation:

The weakness, KRACK tricks a wifi access points to reuse an in-use encryption, enabling the intruder to decode and interpret data intended to remain encrypted. Wireless communication encrypts, that decrypt unencrypted wireless network activity and expose sensitive data.

So, the following scenario is false about the wireless attack.

Technician a says that impact sockets have thicker walls than conventional sockets. Technician b says that impact sockets have a black oxide finish. Which technician is correct

Answers

Impact sockets are sockets used to cope with the vibration caused by the impact of the hammer on the anvil. Both technicians are right. It is true that impact sockets have thicker walls than conventional sockets, so technician A is right. But it is also true that impact sockets have a black oxide finish, so the technician B is also right.

Other Questions
Refer to the figure below. If m Read the excerpt from Edgar Allan Poes the pit and the pendulum which two descriptions best fit the mods of the passage A fearful idea now suddenly drove the blood in torrents upon my heart, and for a brief period, I once more relapsed into insensibility. Upon recovering, I at once started to my feet, trembling convulsively in every fibre. I thrust my arms wildly above and around me in all directions. A. Suspense B. TerrorC. Mental confusionD. Loneliness E. Sadness(Pick more than one if necessary) Match the numbers to the correct number sentence 1. seven thousand, twenty-eight 1 7,828 2. seven thousand, two hundred eight 9,099 3. seven thousand, two hundred eighty-eight 9,900 4. seven thousand, eight hundred twenty-eight 3 7,288 5. seven thousand, eighty-eight 2,577 6. two thousand, five hundred seventy 5 7,088 7. two thousand, five hundred seven 2 7,208 8. two thousand, five hundred seventy-seven 2,570 9. two thousand, fifty-seven 9,999 10. two thousand, seventy-seven 9,090 11. nine thousand, nine 9,009 12. nine thousand, nine hundred 7,028 13. nine thousand, ninety 2,057 14. nine thousand, ninety-nine 2,077 15. nine thousand, nine hundred ninety-nine 2,507 NEXT QUESTION ASK FOR HELP If the earth rotates 15 each hour how long does it take to rotate 1? Show your work Review the document The Constitutionand define each of the six guiding principles of government found in the U.S. Constitution below:1. Popular Sovereignty: 2. Limited Government: 3. Separation of Powers: 4. Checks and Balances: 5. Judicial Review: 6. Federalism: By 1700, the most populous colony in English America was? What sentence BEST summarizes paragraph 133? 1. Science is the body of knowledge and methods produced by engineering.TrueFalse2. Technology changes society.TrueFalse3. Although engineers do not always complete the steps of design process in the same order which of the following is almost always first?Build a prototype Identify the problemChoose the best solution Complete background research 4. Why is the industrial revolution similar to the digital age?They both began in the late 1900s and ended about a century laterThey both created technology that changed many aspects of everyday lifeThey are the only two eras in which technology played a significant roleThey both are characterized by the use of stone and iron to advance technology 5. When conducting a test on what kind of music increases the growth of plants, all of the following would fail to meet to fair test standard except?using dif Help ASAP plsssssssssss It takes us of ribbon to make a hair bow. How much ribbon is needed to make 9 bows? Based on the sentence , what does plumb mean? what is the difference between sex-linked traits and autosomal traits in humans Maintaining peace is more important than going to war over rights we already have.What type of colonist most likely made the statement? A) A woman, because many colonial Woman feared war would result in loss of libertiesB) A loyalist because many loyalist believed that revolution was not worth the costC) A patriot because many patriots were property owners with a great deal to loseD) A southern slave because slaves had little hope of achieving personal freedom in war Which of these is the BEST example of cultural diffusion? A)a world film awards show B)an international film festival C)a blues music festival in New York D)a Disney movie dubbed over in Japanese A sidewalk is built 12 bricks wide by laying each brick side by side.How many inches wide is the sidewalk if each brick meaaures 3 3/8 inches wide? for what reasons did the united states forces enter mexico in the early 1900s Explain how to find the greatest common factor of three numbers. To this city also are brought articles of greater cost and rarity, and in greater abundance of all kinds, than to any other city in the world. For people of every description, and from every region . . . including all the costly wares of India, as well as the fine and precious goods of Cathay . . . some for the sovereign, some for the court, some for the city which is so great . . . between court and city the quantity brought in is endless. As a sample, I tell you, no day in the year passes that there do not enter the city 1,000 cartloads of silk alone. Which description summarizes Marco Polos description of Beijing? a small city that does not care for trade a large city untouched by foreign influence a large city with vibrant foreign trade an isolated city hostile to foreigners Which decimal is equivalent to 1 80/333 1. software that helps run the computer hardware 2 the main board in the body of the computer 3. instructions for the computer written in a programming language system software 4the central processing unit 5. a small mobile computer motherboardCPUsystem softwareprogramlaptop