subject

Which of the following scenarios describes an IT professional using good methods to protect
passwords and system access of users? Check all
of the boxes that apply.
When setting up the e-mail program for each
employee's computer, the IT professional has
the employee enter his or her e-mail
password to protect privacy.
The IT professional posts a list of employee
usernames and passwords on the wall.
The IT professional views an employee's
browsing history while the employee is on a
fifteen-minute break.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 05:00
Are special characters that allow you to search for multiple words at the same time.
Answers: 2
question
Computers and Technology, 24.06.2019 16:30
Which program can damage your computer?
Answers: 1
question
Computers and Technology, 24.06.2019 20:20
3. write assignment statements that perform the following operations with the variables a, b, and c: a. adds 2 to a and assigns the result to b b. multiplies b times 4 and assigns the result to a c. divides a by 3.14 and assigns the result to b
Answers: 2
question
Computers and Technology, 24.06.2019 20:30
Which key should you press to leave the cell as it originally was? a. delete b. cancel c. backspace d. enter
Answers: 1
You know the right answer?
Which of the following scenarios describes an IT professional using good methods to protect
p...
Questions
question
Mathematics, 13.07.2020 17:01
question
Mathematics, 13.07.2020 17:01
question
Mathematics, 13.07.2020 17:01
question
English, 13.07.2020 17:01
question
Mathematics, 13.07.2020 17:01
question
Physics, 13.07.2020 17:01
question
Mathematics, 13.07.2020 17:01
Questions on the website: 13722365