answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anuta_ua [19.1K]
1 year ago
15

Henry is working from a USDA office. He has several tasks to perform today: 1) he logs onto his USDA computer to get started; 2)

he faxes a sensitive document to his supervisor using a fax machine with the appropriate clearance; 3) he confirms some appointments and project due dates and enters them into his PDA; and 4) he calls his supervisor on his cell phone to review the document he just faxed over. Which of Henrys actions was a mistake? A. Using a cell phone to discuss sensitive information.B. Using a complex password to log onto the computer.C. Downloading data to his PDA.D. Using a fax machine with the appropriate level of clearance to send the sensitive fax.
Computers and Technology
1 answer:
Ksivusya [100]1 year ago
3 0

Answer:

  A. Using a cell phone to discuss sensitive information

Explanation:

In general, cell phone signals are not secure. Cell phones without appropriate encryption should never be used to discuss sensitive information.

You might be interested in
A BCD code is being transmitted to a remote receiver. The bits are A3, A2, A1, and A0, with A3as the MSB. The receiver circuitry
NARA [144]
<span>BCD only goes from digit 0 (0000) to digit 9 (1001), because for 10 you need two digits, so all you've got to do is make a function that produces high for numbers from 10 (1010) to 15 (1111) as follows:
A3 A2 A1 A0   F
 0    0    0    0    0
 0    0    0    1    0
 0    0    1    0    0
 ...........................
 1    0    0    0    0
 1    0    1    0    1
 1    0    1    1    1
 1    1    0    0    1
 1    1    0    1    1
 1    1    1    0    1
 1    1    1    1    1
 
Then simplify the function: F = A3*A2 + A3*A1 Finally just draw or connect the circuit using NAND</span>
3 0
2 years ago
HELP PLEASE ASAP brainliest to accurate
Svet_ta [14]
A patent law

Patent laws deal with new inventions and relays to the owner’s exclusive right to the claimed invention. It is a right that should be granted by the government to an inventor, to exclude others from using, making, importing, or selling an invention. In this case, Jenna's secret, unique recipe is her patent.


3 0
2 years ago
Read 2 more answers
What elements of SANS 20 you could leverage to reduce the TCP/IP vulnerabilities of your workstation
Vlada [557]

Answer:

- limitation and control of network ports, protocols and services.

- Continuous vulnerability assessment and remediation.

Explanation:

The TCP or transmission control protocol is a layer 4 protocol (transport), that reliably transports packets in sequential segments to an application in the destination computer, using the ip address and the port number of the application.

The ICMP sent during the TCP/ip activities, can render the network vulnerable to attacks. limitation and control of the network ports, protocols and services and continuous assessment would mitigate the vulnerability of the TCP/ip model.

5 0
2 years ago
Which type of styles can be applied to a word, phrase, or sentence?
Anna [14]

Answer:

I think the answer is going to be paragraph

6 0
2 years ago
A restaurant manager wants to advertise that his lunch special offers enough choices to eat different meals every day of the yea
riadik2000 [5.3K]
2 to 12 options for each customer
6 0
2 years ago
Other questions:
  • Which statements describe the advantages of using XML?
    12·2 answers
  • Edward has started up a new company with his friend, Matthew. Currently, he has only two people working with him. Which type of
    8·1 answer
  • In response to a recent outbreak of computer viruses, Babbage Industries, a large technology company, installs computer virus pr
    7·2 answers
  • Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environmen
    7·1 answer
  • When an author produce an index for his or her book, the first step in this process is to decide which words should go into the
    8·1 answer
  • Suppose a host has a 1-MB file that is to be sent to another host. The file takes 1 second of CPU time to compress 50%, or 2 sec
    12·1 answer
  • A company requires an Ethernet connection from the north end of its office building to the south end. The distance between conne
    8·1 answer
  • Budget Analysis (use while loop) Write a program that asks the user to enter the amount that he or she has budgeted for a month.
    5·1 answer
  • 4.9 Code Practice: Question 4
    5·2 answers
  • Put the steps in order to produce the output shown below. Assume the indenting will be correct in the program.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!