answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anuta_ua [19.1K]
1 year ago
15

Henry is working from a USDA office. He has several tasks to perform today: 1) he logs onto his USDA computer to get started; 2)

he faxes a sensitive document to his supervisor using a fax machine with the appropriate clearance; 3) he confirms some appointments and project due dates and enters them into his PDA; and 4) he calls his supervisor on his cell phone to review the document he just faxed over. Which of Henrys actions was a mistake? A. Using a cell phone to discuss sensitive information.B. Using a complex password to log onto the computer.C. Downloading data to his PDA.D. Using a fax machine with the appropriate level of clearance to send the sensitive fax.
Computers and Technology
1 answer:
Ksivusya [100]1 year ago
3 0

Answer:

  A. Using a cell phone to discuss sensitive information

Explanation:

In general, cell phone signals are not secure. Cell phones without appropriate encryption should never be used to discuss sensitive information.

You might be interested in
Which one of the following is NOT true about energy conversion devices? Group of answer choices Total Energy Input = Energy Diss
ICE Princess25 [194]

Answer:

Total Energy Input = Total Energy Output / Efficiency

Explanation:

The expression written above is not true about the energy conversion devices.The energy conversion devices convert energy from one form to another for of energy for example :- take a light bulb it converts electric energy to heat and light.There is no efficiency involved in the energy conversion devices.

6 0
1 year ago
A(n) _____ can be used to reveal a competitor’s program code, which can then be used to develop a new program that either duplic
Luden [163]
<span>The answer to the above question is a decompiler would be used for that application. Decompilers use executable file as input. They then create a source code that can be recompiled and put back together fairly easily. Due to a decompilers ability to break down original code, that original code can then be used to either duplicate the program, or re-engineer a program that would work in concert with the original program.</span>
5 0
2 years ago
Evie clicks through her presentation slides and realizes they all have transition effects coming from the same location, from th
nalin [4]

Answer:

1) Choose Slide

2) Transition Tab

3) Transition To This Slide

4) Select New Transition

Explanation:

There are 4 main steps that Evie needs to take in order to accomplish this. First, she needs to choose the slide that she wants to apply the transition to. Secondly, she needs to click on the Transitions Tab at the top of the application. Thirdly, she needs to go to the "Transition to this Slide" section of the tab. Lastly, she needs to choose one of the available animation/transitions from the list of options. This will apply that transition effect to that slide, so that when she switches to that slide it performs the animation.

4 0
1 year ago
Two-dimensional array indexes are listed as
Luda [366]

Answer:

rows and columns, or matrix

Explanation:

Two-dimensional 2D arrays are being indexed with the help of two subscripts. The first one is for the row and the second one if for the column. And each of the elements of the 2D array must be of the one kind like they all can be an object type or they all can be of primitive type.

Like:

int A[3][3];

The above is the 2-dimensional array in C++, and elements are of type int, which is a primitive data type.

5 0
2 years ago
Why is it important to back up data on a computer before you burn-in test the cpu?
katen-ka-za [31]
A burn-in test is a test which is usually performed on a system or component by running it for a long time in order to bring out any errors or system failures etc. 
While doing it on CPU the data must be backed up as any kind of error or failure may result in the loss of data, at time systems can be repaired to retrieve data but still there is no guarantee, backing up is the best option.
5 0
2 years ago
Other questions:
  • Which port, along with a special card and cables, supports the connection of microcomputers, modems, and printers in a local are
    6·1 answer
  • What are the pros and cons of using unique closing reserved words on compound statements?
    15·1 answer
  • Because of the density of vehicle in urban areas, you should ____.
    8·2 answers
  • How would GIS, GPS, or remote sensing technology be used to evaluate the destruction caused by a tornado in Oklahoma?
    13·1 answer
  • Access-lists pose a logical problem which often has more than one solution. Can you think of a different set of rules or placeme
    8·1 answer
  • array of String objects, words, has been properly declared and initialized. Each element of words contains a String consisting o
    11·1 answer
  • Jen is trying to discover if a motor has failed windings. What sort of test can she do.
    6·1 answer
  • Put the steps in order to produce the output shown below. Assume the indenting will be correct in the program.
    6·1 answer
  • A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
    10·1 answer
  • What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!