Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authentication.

Answers

Answer 1

Answer:

is a security that needs two types of identification to access what your trying to enter.

Explanation:

Ex= to enter email, you first need to put in password, then verify by phone call that u need to enter.


Related Questions

In cell a10 enter a formula using or to display true if net profit before tax in 2019 (cell b5) are greater than 750000(seven hundred, fifty thousand) or net profit before tax in 2020 (cell c5) are greater than 750000 (seven hundred, fifty thousand). use cell references where appropriate and enter the arguments exactly as described in this question.

Answers

The OR Excel function is a function that is used to test several conditions in one statement.

The Excel formula to display true based on the conditions in cell A10 is =OR(B5>750000,C5>750000)

From the question, we have:

Cell B5 represents the net profit before tax in 2019Cell C5 represents the net profit before tax in 2020

The syntax of the OR logical function is: =OR([conditions])

So, the Excel formula to display true based on the conditions in cell A10 is =OR(B5>750000,C5>750000)

Read more about Excel formulas at:

https://brainly.com/question/14820723

to find detailed information about the origin of an email message, look at the ________________.

Answers

Email header. The email header is a code snippet in an HTML email, that contains information about the sender, recipient, email's route to get to the inbox and various authentication details

hiiiiiiiiihwdawdfgthnythgrfergthyjuhgfd

Answers

Answer:

Your answer would be gas.

Explanation:

Steam is just water just evaporated.

no i will not marry u

On the following page, write a static method print Short Words that accepts two parameters:_____.
a. a String str containing a list of words (separated by spaces), and an integer maxLength .
b. This method should print out the words in str whose lengths are at most maxLength.
c. You can assume there will always be a space after the last word in the string.

Answers

Methods in Java are collections of program statements that are named, and executed when called/invoked

The printShortWords method in Java where comments are used to explain each line is as follows:

//This defines the static method

public static void printShortWords(String str, int maxLength){

    //This iterates through each word in the string

    for(String word: str.split(" ")){

        //The compares the length of each word to maxLength

        if(word.length()<=maxLength){

            //If the length of the current word is atleast maxLength, the word is printed

        System.out.print(word+" ");

        }

    }

}

Read more about static methods at:

https://brainly.com/question/19360941

what information about a cisco router can be verified using the show version command?

Answers

- the routing protocol version that is enabled.
- the value of the configuration register.
- the operational status of serial interfaces.
- the administrative distance used to reach networks.

To gain access to the functions and variables of a library module, use a(n) _________ statement. A. import B. export C. global D. library

Answers

Answer: import

Explanation:

A _____ is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.

Answers

Answer:

A cellular network is a network...

You can protect yourself from identity theft by using ____ when transmitting information over network connections. a. cookies b. port-scanning c. biometrics d. encryption

Answers

Answer:

D

Explanation:

Encryption secures transmissions on the internet to or from your PC

What happened to China and India after they modernized their workforces by providing more training and education?

A.
Their economies collapsed as they were unable to pay for their public services.

B.
They experienced civil wars between the haves and have-nots.

C.
People refused to take advantage of these programs due to anti-Western biases.

D.
Millions of people were lifted out of poverty.

Answers

The correct answer is D.

The condition for China and India after they modernized their workforces by providing more training and education is;

''Millions of people were lifted out of poverty.'' So, option D is true.

Given that;

China and India modernized their workforces by providing more training and education.

After modernizing their workforces by providing more training and education, both China and India experienced a significant improvement in their economies.

As a result, millions of people were lifted out of poverty.

This positive change was driven by increased job opportunities, higher productivity, and improved skills among the workforce.

Therefore, Option D is true.

To learn more about education visit:

https://brainly.com/question/19959157

#SPJ3

One of the best ways to code effective programs is to write so-called _______ programs, using the sequential, selection, or repetition logic structures.

Answers

One of the best ways to code effective programs is to write so-called structured programs, using the sequential, selection, or repetition logic structures.

Structured programs are program types that aim to improve the clarity of program codes to make them readable and reusable.

Structural codes such as the if/then/else for selection and while/for repetition are used to achieve these goals.

So, structured programs are used to write programs that follow the sequential, selection, and repetition logic structures.

Learn more about structured programs here:

https://brainly.com/question/25770844

A small network that consists of devices connected by Bluetooth, such as a smartphone and a computer, is referred to as a ________.

Answers

Answer:

I think is technologies

susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct statements are correct her error

Answers

The recursive formula of the explicit formula [tex]A_n = 3 + 2n[/tex] is [tex]A_n = A_{n-1} + 2[/tex]

The explicit formula is given as:

[tex]A_n = 3 + 2n[/tex]

When n = 1, we have:

[tex]A_1 = 3 + 2(1)[/tex]

[tex]A_1 = 5[/tex]

When n = 2, we have:

[tex]A_2 = 3 + 2(2)[/tex]

[tex]A_2 = 7[/tex]

When n = 3, we have:

[tex]A_3 = 3 + 2(3)[/tex]

[tex]A_3 = 9[/tex]

So, we have:

[tex]A_1 = 5[/tex]

[tex]A_2 = 7[/tex]

[tex]A_3 = 9[/tex]

Rewrite the functions as follows:

[tex]A_1 = 5[/tex]

[tex]A_2 = 5 + 2[/tex]

[tex]A_3 = 7 + 2[/tex]

So, we have:

[tex]A_1 = 5[/tex]

[tex]A_2 = A_1 + 2[/tex]

[tex]A_3 = A_2 + 2[/tex]

Express 2 as 3 - 1

[tex]A_3 = A_{3-1} + 2\\[/tex]

Substitute n for 3

[tex]A_n = A_{n-1} + 2[/tex]

Hence, the recursive formula is [tex]A_n = A_{n-1} + 2[/tex]

Read more about recursive and explicit formulas at:

https://brainly.com/question/11235928

What is precipitation ????

Answers

Answer:

Precipitation has 2 meanings

In chemistry it is the action or process of precipitating a substance from a solution

But in general it is the common term for rain, snow, sleet or hail that falls to the ground

Explanation:

Just look the definition up

Answer:

weather

Explanation:


HELP IMPORTANT!!

i need help with Java basics

Answers

Answer:

C

Explanation:

Strings should be concatenated with +.

Which of these would make text on a slide difficult to read?
Ohigh contrast between text and background
Olow contrast between text and background
O a sans serif font
O a large font when the presentation is in a large room

Answers

Low contrast between your text and the background

Not all ________ access is malicious, but it should still be prevented; for example, a user may poke around a network share and see sensitive information.

Answers

Answer:

System access.

Explanation:

System access aka admin privileges are not meant for any user in a network.It should be handled by professionals

which of the following is a true statement?

A. in the customary system measurements are often expressed as decimals.

B. in the metric system measurements are often expressed as fractions.

C. in the customary system measurements are often expressed as fractions.

D. fractions are equally common in both the metric and customary systems.​

Answers

Answer:

C

Explanation:

yeah-ya........ right?

what computer is designed for particular application​

Answers

Answer: Applications for desktop or laptop computers are sometimes called desktop applications, while those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it

Explanation:

List three (3) features of first generation computer
PLEASE HELP!!!!!

Answers


Features of first generation computers:

Technology used: vacuum tube.

Machines languages were used to instruct the computer.

Magnetic core memory was used as primary memory.

Electrostatic tubes, Parer tape, punch card, magnetic tape.

Can someone please help

Answers

Answer:

Explanation:

la reponse est le premier et le 3 eme pointcar en effet le premier point c est logiqye e le 2 e aussi  

NO links!!! please, In this task, you will prepare the necessary documents required to apply for the job. Conduct research and find out what documents are necessary, such as a résumé, cover letter, and so on. Then, prepare these documents using your information and tailor the documents to the career you have chosen.
the job I chose was a software architect
It's from PLATO

Answers

To apply for a job, you must provide a resume, cover letter, reference list, letters of recommendation, portfolio, and employment certificate.

About these documents we can inform you that:

The Resume presents the most generalized information about the candidate's educational and professional background.The cover letter must be made to show more in-depth information, where the candidate reinforces their most positive points and relevant to the job vacancy.The reference list presents the opinion of other professionals about your professional abilities.The portfolio must be submitted by candidates related to artistic or visual areas and presents the works already created by that professional.The employment certificate must show your professional history in more detail.

Thus, we can state that the application for a job vacancy requires that many documents and information be provided.

More information on writing a resume at the link:

https://brainly.com/question/862477

A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryptio

Answers

Answer:

A) virus signature

Explanation:

Antivirus databases contain what are called signatures, a virus signature is a continuous sequence of bytes that is common for a certain malware sample.

--

Encryption is a way of scrambling data so that only authorized parties can understand the information.

A restaurant recorded the ages of customers on two separate days. You are going to write a program to compare the number of customers in their forties (ages 40 to 49).

What is the missing line of code?

customerAges = [33, 23, 11, 44, 35, 25, 35, 68, 51]

count40s = 0
for item in customerAges:
_____;
count40s = count40s + 1
print("Forties:", count40s)


if 40 > item > 49

if 40 < item < 49

if 40 <= item <= 49:

if 40 >= item >= 49

Answers

Answer:

if 40>= item >=49

Explanation:

can some one make me a pandora account and give me the email and the password to it please

Answers

Answer:

Ill do it but you do know someone can see the information right?

Explanation:

Write true or false:-
1. The start attribute always accept an integer value.
2. Description list is used to create a bulleted list.
3. The <DT> tag is used to create a table in HTML.
4. The <TR> tag is used to create cells in the table.
5. The VALIGN in attitude of the <TD> tag is used to Align the position of text in the cell vertically.

And please don't give only one answer, if you are giving, then please give all the answers. ​

Answers

Answer:

false

true

false

true

false

Explanation:

.

predict what the world would be like if no one tried to think critically. explain your predictions

Answers

The world would be in chaos and we would all be dead duh.

write an algorithm to print circumference of a circle​

Answers

Answer:

1 Start

2 Read the value of radius r of Circle

3. Give Pi = 3.14

4 Calculate area of Circle = Pi x r x r

5. Calculate Circumference of circle

( You can use either C= 2 X Pi X r Or Area (A) = Pi X r X r Circumference (C) = 2 X Pi X r A/r = Pi X r A/r = C/2 So C = 2 x ( A/r ) 5. Print area and Circumference

6. End.

Aliaa and Zhang Li are tennis-playing robots. Aliaa is 715\,\text{cm}715cm715, start text, c, m, end text from Zhang Li and 2{,}200\,\text{cm}2,200cm2, comma, 200, start text, c, m, end text from the far corner. Zhang Li measures an 91\degree91°91, degree angle between Aliaa and the far corner, as shown.


From Aliaa's viewpoint, what is the angle between Zhang Li and the far corner?

Do not round during your calculations. Round your final answer to the nearest degree.

Answers

Answer:

70

Explanation:

Law of Sines.

sin(91)/12 = sin(x)/715

x=19

180-91-19=70

in python:
The mode of a list of numbers is the number listed most often. The median of a list of numbers is the value in the middle of the list if the list is arranged in order. For this software solution you will do the following:

Take 10 numbers as input from the user and display the number with the highest mode. If there is a tie, you will need to show all of those numbers.
Your program must create a user-defined function that takes an array of numbers as a parameter and returns the value that appears the most often in the array.
For those same 10 numbers your program must create a user-defined function that takes an array of numbers as a parameter and returns the value which is the median for those numbers.

please help!

Answers

Python can be used to implement central of tendencies such as mean, median and mode using the statistic module

The program in Python, where comments are used to explain each line is as follows:

#This imports the statistics module

import statistics

#This defines the function that calculates the mode

def calcMode(myList):

   #This prints the mode

   print(statistics.multimode(myList))

#This defines the function that calculates the median

def calcMedian(myList):

   #This prints the median

   print(statistics.median(myList))

#The main method begins here

#This initializes the list

myList = []

#The following iteration gets input for the list

for i in range(10):

   myList.append(int(input()))

#This calls the calcMode method

calcMode(myList)

#This calls the calcMedian method

calcMedian(myList)

Read more about similar programs at:

https://brainly.com/question/25026386

With the goal of keeping your hardware safe, explain the physical hazards you should avoid.

Answers

Based on health safety procedures, the physical hazards you should avoid include "eyestrain."

What are Physical Hazards in Computing?

Physical hazards are computing are hazards that affect the physical body of the users due to operating the Computer system.

Different Physical Hazards in Computing

Back pain Neck and shoulder painsHeadacheEyestrainInjuries of the arms, hands, and thumbs, etc.

Hence, in this case, it is concluded that there are various physical hazards computer users need to avoid.

Learn more about Physical hazards in Computing here: https://brainly.com/question/5622984

Other Questions
A solid, uniform sphere with a mass of 2.5 kg rolls without slipping down an incline plane starting from rest at a vertical height of 19 m. If the sphere has a radius of 0.60 m, what is the angular speed of the sphere at the bottom of the incline plane An angle measures 152 more than the measure of its supplementary angle. What is the measure of each angle? and Estimate the product of 54 X 68. 7(2.3y 2) simplified we need more raw materials with recycling true or false. how much water should be added to 5 gallons of 50% acid solution to get a 20% solution? Apply Concepts6. Describe the ecosystem in the picture. Answer all of them plzz Explain how urban industrial areas can help encourage development. Solve for x : 3x - 24 = 81 At the end of chapter 39, Tom writes a "nonnamous" letter to the Phelps family. His letter is full of slang and colloquialisms. Write an essay of at least 150 words (in standard English) based on this letter, explaining what Tom wants the family to believe and clarifying any language that needs to be explained. Answer the question below Should the focus be on treatment or punishment when responding to juveniles who are involved in criminal misbehavior, and why? Megan observes four cells under a microscope and makes sketches of them as shown. Identify whether the cells are prokaryotic or eukaryotic. If f(x) = 3 ^ x - 7 and g(x) = x ^ 2 + 11 , the value of f(2) - g(7) is: How tall is MT Everest? (no point stealers!) Two parents are having a child The father has freckles which are a dominant trait The mother does not have trecktes Find the possibility of the chad having tracks. At the bakery shop, each baker works at his or her own speed, making the samenumber of cakes each day. Marissa makes 28 cakes in 2 weeks, Carlos makes 60cakes in 20 days, and Shelby makes 5 cakes in 2 days.When the shop owner graphs the relationship between the number of cakesmade and days, who has the steepest graph? Explain. Drag each tile to indicate the order in which the events occurred.a. Wilson's Declaration of Neutrality to Congressb. the assassination of Archduke Ferdinand of Austriac. Wilson's request to Congress for a declaration of war against Germanyd. the Zimmerman Telegrame. the rise of the Preparedness Movement ActivityResearch the history of the Immigration Service in the United States.Read about the following laws: 1986 Immigration Reform and Control Act (IRCA) 1990 Immigration Act 1996 Illegal Immigrant Reform and Immigrant Responsibility Act (IIRIRA)Identify three issues that these laws were designed to address. Using current news sources identify one issue the country is still working to solve.