Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authentication.

Answers

Answer 1

Answer:

is a security that needs two types of identification to access what your trying to enter.

Explanation:

Ex= to enter email, you first need to put in password, then verify by phone call that u need to enter.


Related Questions

How does a cell phone change the
incoming signals from a caller into sound that
you can hear

Answers

Answer:

they send electrical signals to the buzzer. The buzzer changes those electrical signals into sound. You hear the buzzer sound and know that someone is calling you.

Explanation:

Answer: Cell phone or any electric device you can say changes the electric signal to radio waves at transmitting end which is converted back to electric signal and perceived as sound waves at receiving end

Explanation:

Which type of relationship is responsible for teaching you values and how to communicate?
a.
online
b.
friend
c.
colleague
d.
family


Please select the best answer from the choices provided

A
B
C
D

Answers

answer:

its either b or d

explanation:

Is this statement true or false? While in slide show mode, if you are not careful you can close the application by clicking the x on the menu bar. True false.

Answers

Considering the Microsoft PowerPoint application, it is False that while in slide show mode, if you are not careful, you can close the application by clicking the X on the menu bar.

Why is it False?

During the slide show of documents whereby the pages of documents are being passed or moved automatically, or by itself, when a user mistakenly or intentionally presses the X on the Menu Bar, the window will ask the user if he wants to save the document before closing.

Slide show in Microsoft PowerPoint is one of the techniques in which a user or Speaker can make a presentation to the audience.

Hence, in this case, it is concluded that the correct answer is False.

Learn more about Microsoft PowerPoint here: https://brainly.com/question/14388120

Answer:

"False"

Explanation:

I took the test!

Is this statement true or false? Title text boxes on every slide must be the same format. True false.

Answers

false as you can adjust the boxes to your liking even add more if needed

what is font tag? write the name of attribute which is used in font tag​

Answers

Answer:

The font tag is used to change the color, size, and style of a text.The font tag is having three attributes called size, color, and face to customize your fonts. To change any of the font attributes at any time within your webpage, simply use the <font> tag.


HELP IMPORTANT!!

i need help with Java basics

Answers

Answer:

C

Explanation:

Strings should be concatenated with +.

I need help fixing “Love Nikki” game on my phone. I had it on my phone and it worked just fine but then igot a new phone and tried theDownload it but when I opened up the app it kept saying update the game so I clicked update but then after that it wouldn’t even update and it just said update feel rule out mistake. I thought it was just my new phone so I went back to my other phone but it was doing the same thing. I have 5G on my new phone so internets not the problem.

does anybody know how to fix it so I can play the game again?

Answers

Answer:

Try resetting your phone multiple times or uninstall and add the game again. If not, check settings and see whats wrong. Or just sign out of your phone and sign in again. Hope this helps :D

I need an If else statement that sorts three numbers from a file from least to greatest

Answers

void sort3(int& a, int& b, int& c)
{
if (a > b)
{
std::swap(a, b);
}
if (b > c)
{
std::swap(b, c);
}
if (a > b)
{
std::swap(a, b);
}
}

Tom is not sure how to code contents such as title and meta elements. These are coded as ____ elements.

Answers

Answer:

Tom is not sure how to code contents such as title and meta elements. These are coded as head elements.

Hope that helps. x

Answer:

head elements

Explanation:

answer is above

List three (3) features of first generation computer
PLEASE HELP!!!!!

Answers


Features of first generation computers:

Technology used: vacuum tube.

Machines languages were used to instruct the computer.

Magnetic core memory was used as primary memory.

Electrostatic tubes, Parer tape, punch card, magnetic tape.

which route would be used to forward a packet with a source ip address of 192.168.10.1 and a destination ip address of 10.1.1.1?

Answers

Considering the available options, the route that would be used to forward a packet with a source IP address of 192.168.10.1 and a destination IP address of 10.1.1.1 is "O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0"

What is Route in IP address?

IP routing generally transmits packets from one network to another host on another remote network.

The process of IP routing involves evaluating routing tables to specify the following hop address of the packet that should be sent.

IP Routing in this case

Considering the IP address in the question, the best match is the route in the routing table that contains the highest number of far-left matching bits.

Hence, in this case, it is concluded that the correct answer is "O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0"

The available options are:

C 192.168.10.0/30 is directly connected, GigabitEthernet0/1

S 10.1.0.0/16 is directly connected, GigabitEthernet0/0

O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0

S* 0.0.0.0/0 [1/0] via 172.16.1.1

Learn more about IP Routing here: https://brainly.com/question/6991121

You can protect yourself from identity theft by using ____ when transmitting information over network connections. a. cookies b. port-scanning c. biometrics d. encryption

Answers

Answer:

D

Explanation:

Encryption secures transmissions on the internet to or from your PC

python Better Password Prompt
Write a program that uses a loop and a half to prompt a user for a password. You should prompt the user for the password. If they get it correct, break out of the loop. If they don’t get it correct, you should give them an error message and ask again.

Sample Run:

Enter password: 123123
Sorry, that did not match. Please try again.
Enter password: password
Sorry, that did not match. Please try again.
Enter password: CODEHS
Sorry, that did not match. Please try again.
Enter password: abc123
You got it!
Note: You need to set SECRET to abc123 to run the tests

Answers

We use an indefinite while loop to keep the user entering the password. In the loop, we use if-else structure to check the password. If it is "abc123", the password is found and stop the loop using a break. Otherwise, the password is not correct. Note that since we do not use any break statement in the else part, the loop will continue asking for the input

Comments are used to explain each line of the code.

You may see the output in the attachment.

#set the SECRET

SECRET = "abc123"

#create a loop

while True:

   

   #ask the user to enter a password

   password = input("Enter password: ")

   

   #check if the password is equal to SECRET

   # if it is, state that password is correct and stop the loop using a break

   # otherwise, state that password is not correct

   if password == SECRET:

       print("You got it!")

       break

   else:

       print("Sorry, that did not match. Please try again.")

Here is another question related to the loops:

https://brainly.com/question/25694810

Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after tax and tip, for a passed in price, assuming tip is always 15% and tax is always 8%?

a. public double getFinalPricel double tips, double tax).
b. public double getFinal Price double tax)
c. public double getFinalPrice/double basePrice, double tips)
d. public double getFinalPrice double basePrice, double tips, double tax)

Answers


D. I hope it helped

The ________ font is applied to titles and the ________ font is applied to all other text in slides.

Answers

Answer:

cursive on tile and original micky fount in the storybook

Explanation:

An animation of a person standing with their arms extended out to their sides. There are 3 dimensional boxes around the torso of the person showing how to create a shirt. What animation process does the photo above help you visualize? a. Morphing c. Motion capture b. Building 3 dimensional models d. Animation rendering Please select the best answer from the choices provided A B C D

Answers

Answer:

c

Explanation:

A PIN of four digits has 10,000 (or 104) combinations. This could theoretically be guessed by a computer in milliseconds. The most popular PIN numbers are 1111, 1234 and 0000 making up around 20% of PIN numbers. Anything beginning with 19XX is also very common, as is 2580. Why?

Answers

Answer:

19xx could be a birth year, easy to remember

2580 is easy to remember because on a keypad the numbers are aligned vertically.

Note that from the statement above, one can say that 19xx is common as it is linked with birth year and thus easy to recur and also 2580 is very easy to recur because on a keypad the numbers are soften matched vertically.

What is pin about?

Pin or digit code are often used in our debit cards, credit cards and in a lot of mobile phones for security purposes.

Note that Note that from the statement above, one can say that 19xx is common as it is linked with birth year and thus easy to recur and also 2580 is very easy to recur because on a keypad the numbers are said to be aligned vertically.

Learn more about digits code from

https://brainly.com/question/3118454

#SPJ9

Vivo critique 6 sentences

Answers

Answer:

im sorry i cant understad

On the following page, write a static method print Short Words that accepts two parameters:_____.
a. a String str containing a list of words (separated by spaces), and an integer maxLength .
b. This method should print out the words in str whose lengths are at most maxLength.
c. You can assume there will always be a space after the last word in the string.

Answers

Methods in Java are collections of program statements that are named, and executed when called/invoked

The printShortWords method in Java where comments are used to explain each line is as follows:

//This defines the static method

public static void printShortWords(String str, int maxLength){

    //This iterates through each word in the string

    for(String word: str.split(" ")){

        //The compares the length of each word to maxLength

        if(word.length()<=maxLength){

            //If the length of the current word is atleast maxLength, the word is printed

        System.out.print(word+" ");

        }

    }

}

Read more about static methods at:

https://brainly.com/question/19360941

PA theme is a major message that a writer convoys through a text. you have explored many themes in the hobbit one theme in the novel is that good has the ability to triumph over evil. using specific examples from the text, explain how this theme develops over the course of the novel

Answers

Answer:

The Hobbit’s main theme is Bilbo’s development into a hero, which more broadly represents the development of a common person into a hero. At the beginning of the story, Bilbo is timid, comfortable, and complacent in his secure little hole at Bag End. When Gandalf talks him into embarking on the quest with Thorin’s dwarves, Bilbo becomes so frightened that he faints. But as the novel progresses, Bilbo prevails in the face of danger and adversity, justifying Gandalf’s early claim that there is more to the little hobbit than meets the eye.??????

Explanation:

I need some questions and answers in spreadsheet​

Answers

Answer:

you need to show what you need help with

Explanation:

a network consisting of nodes covering a small geographic area is a

Answers

Answer:

that is a Local Area Network (LAN)

Your grandmother tells you a dollar doesn't go as far as it used to. She says the "purchasing power" of a dollar is much less than it used to be. Explain what she means. Try to use and explain terms like inflation and deflation in your answer. ​

Answers

Answer:

The obtaining influence of a dollar is substantially less on the grounds that more cash is made and causes the value of the dollar greenback to diminish, making things increasingly costly. This is called swelling. In any case, when less cash is made, the value of a dollar greenback increments and things turn out to be more affordable. This is called flattening. As the years go on, the purchasing power of a dollar decreases and decreases.

Hope that helps. x

In the earliest stages of human history, what was the only medium?
ink
books
the human body
magazines

Answers

The only medium that was used for the dissemination of information during the earliest stages of human history is: C. the human body.

Information sharing is an integral part of human life because no human is able to live comfortably in isolation without the need to share or receive messages from others through a particular medium, especially for awareness, growth, development and proper decision making.

Prior to the medieval period, which is the earliest stage of human history, the human body serve extensively as the only medium that was used for the dissemination of information from one person to another.

This ultimately implies that, various symbols, signs and objects that were  mutually understandable to the people were drawn or written on human body, so as to serve as a medium during the process of communication.

Read more: https://brainly.com/question/14810228

Can someone please help

Answers

Answer:

Explanation:

la reponse est le premier et le 3 eme pointcar en effet le premier point c est logiqye e le 2 e aussi  

hiiiiiiiiihwdawdfgthnythgrfergthyjuhgfd

Answers

Answer:

Your answer would be gas.

Explanation:

Steam is just water just evaporated.

no i will not marry u

Which devices are managed through device management?
Device management is the process of managing devices.
NEED ANSWER ASAP PLS HELP

Answers

Answer:
computers and Mobile phones ( including game consoles and tablets) are managed through device management
Explanation:
Device management includes a type of security software used to monitor,secure and manage systems such as mobile phones computer laptops and desktops, Tablets and smart televisions as well as Game consoles. It as well involves the management,operation and maintenance of the physical aspect of the systems from external threats/intruders
Anti virus software is an example of a device management software used to protect systems from malware, by detecting and removing them and also by preventing them.
Firewall is a complete device management tool because it detects and prevents intruders and virus from penetrating the system software

Question 11
Methods that return a decimal value must be declared using what type?


a. int

b. void

c. double

d. String

e. null


Question 12

Which of the following is true when x = 15?


a. (x >= 15) && (x < 13)

b. !(x > 13) || (x > 16)

c. (x > 13) && (x < 17)

d. (x < 15) || (x > 15)

e. (x <= 13) || (x >= 17)

Answers

Answer:

11. a, 12.c

Explanation:

bc numbers must be declared as ints and 15 is greater than 13 but lesser than 17

what actions can be performed via voice commands using 2022 versa’s siri® eyes free?

Answers

The actions that can be performed via voice commands using 2022 versa's siri® eyes free are;

- Send and receive text messages

- Make and receive calls

- Select and play music

2022 versa's siri® eyes free is a media feature that can be connected to your iPhone in the latest car by Nissan called Nissan 2022 versa.

Now Siri® Eyes Free Available functions include:

Making and receiving callsSending and reading text messagesSelecting and playing musicReading notificationsRequesting directions or other

This Siri® Eyes Free is usually located on the steering wheel and the way to operate it is by;

Press THIS button on the steering wheelSpeak a command.Wait for Siri® Eyes Free to reply. Within 5 seconds, press THIS button on the steering wheel to reply or give another command.

Read more on cars at; https://brainly.com/question/25981194

What security setting can cause a mobile device to erase installed apps and data if the passcode is incorrectly entered a number of times

Answers

Answer:

A Hard Reset. Aka a data wipe

Explanation:

a hard reset will allow you to completely clear all information on a device without having to log into it. It will set the phone back to factory defaults.

Other Questions
What does it mean workshop? What is a primary source?an account that comes directly from people who were present during an eventa report on a time period or event that happens long after the factan outside view of a time period or eventan account from someone who did not experience a time period or event directly 8. Ten countries participated in the discussion A. took part B. hold C. told D. spoke 9. Theyre offering a 10% .. on all sofas this month. A. reward B. discount C. reduce D. cut 10. Whats the wrong with Loan ? - She cut .... A. himself B. her C. myself D. herself Independent reading has a direct effect on standardized test scores.True or false ? Evaluate the function h(x) = 13 x when x= -3,0, and 8. What is the length of leg y of the right triangle? (1 point)A right triangle with hypotenuse 37 and legs 35 and yA)2B)8C)12D)35 If DEF and MNO are two triangles such that DE=MN and EF=NO, which of the following would be sufficient to prove that triangles are congruent Activity 1: Complete the sentence using the modals: can, could, may, might, must, and should 1. Don't eat this fruit. It_________ be poisonous 2. This__________ prove harmful for your health . 3. Perhaps,__________ lead to death. Therefore, you not eat this fruit. 4. It__________ not be eaten raw. 5. Before eating, its skin_________ be removed. Describe how to find your x-intercepts ? HELP THIS IS DUE TODAY!!!!!!!! Choose the sentence with correct comma placement.I never met him but, I heard he was great.I never met him but I heard, he was great.I never, met him, but I heard he was great.I never met him, but I heard he was great. see attached photo for question Classify the triangle shown by its angles and sides. Select all that apply. Josh drives 504 miles in 8 hours. At the same rate, how many miles would he drive in 5 hours? A person uses a screwdriver to turn a screw and insert it into a piece of wood. The person applies a force of 20 newtons to the screwdriver and turns the handle of the screwdriver a total distance of 0.5 meter. How would these numbers be different if the person inserted a nail with a hammer instead of the screw with the screwdriver?A. The force applied would be greater, but the distance would be shorter.B. The force applied would be less, but the distance would be greater.C. The force applied would be the same, but the distance would be shorter.D. The force applied would be the same, but the distance would be greater. Which revisions clarify the sentence?My book was in Sarah's car, but now it's gone.Select the two correct answers.A. Her book was in the car, but it is now gone.B. My book was in Sarah's car, but now her car is gone.C. My book was in Sarah's car, but now the book is gone.D. My book was in her car, but now they're gone. The difference between social services and welfare services Answer my question plzzzzz!!What is the theme? I want the answer to be at least 2 sentences! Provide your own examples of the following using Python lists. Create your own examples. Do not copy them from another source. Nested lists The * operator List slices The += operator A list filter A list operation that is legal but does the "wrong" thing, not what the programmer expects Provide the Python code and output for your program and all your examples. Which of these is an example of an ideological interest group? Animal Defense League Save the Children Action Network Americans for Limited Government American Civil Liberties Union.