1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
telo118 [61]
3 years ago
7

Which statement best describes network security?

Computers and Technology
1 answer:
Papessa [141]3 years ago
6 0

Answer:

B.network security means all personal information is kept safe the network is not compromised and only authorized users had access Im pretty sure they

Explanation:

network security means all personal information is kept safe the network is not compromised and only authorized users had access Im pretty sure they

You might be interested in
Why do you think there is a difference between good, clean designs compared to the bad, cluttered designs below?.
Lemur [1.5K]

Answer:

Good, clean designs depicts the logic link of the company and easy to remember as compared to the bad, cluttered designs

Explanation:

The major difference between the good, clean designs and the bad, cluttered designs is that the good, clean designs depicts the logic link of the company and it is easy to remember such symbols but in case of bad, cluttered designs it is not that easy to find the logic link and also it is difficult to remember the logo.

7 0
3 years ago
A form of artificial intelligence that can perform many complex, _______ tasks. Select one: a. serialized b. repetitive c. non-r
Tanya [424]

Answer:

The correct answer is letter "C": non-repetitive.

Explanation:

Artificial Intelligence (AI) refers to all efforts mankind has made to program computer systems in a way they can interact as humans and imitate their actions. There are different types of AI based on their likeness to humankind. In such a scenario, AI can be reactive (respond to stimuli), self-aware (awareness capabilities), limited memory (learns to improve) or theory of mind (understands other intelligencies).

<em />

<em>All those types of AI are based on non-repetitive tasks that can perform different complex processes.</em>

6 0
4 years ago
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54Mbps. In a
mariarad [96]

Answer:

The best choice is 802.11a.

Explanation:

The most common option, that is widely used in home internet is 802.11b, however, this only supports a max speed of 11Mbps.

802.11a supports up to 54Mbps and it has regulated frequencies that prevent interference from other devices, such as the wireless system that your client already has. This option is more expensive, and its signal has issues going through walls and rooms but still, it is the one that fits him the most.

4 0
3 years ago
TRUE/FALSE<br><br> The Interrupt Flag (IF) controls the way the CPU responds to all interrupts.
Nastasia [14]

Answer: True.

Explanation:

The value of the IF is very important to respond to the interrupts in the OS. It is a system flag bit. All the hardware interrupts will be handled if the flag value is set to 1 else all interrupts will be ignored. It takes two values either 1 or 0.

3 0
4 years ago
So my computer has be clicking random things and opening things. It’s been happening for a few days and I want to know if it’s a
soldi70 [24.7K]

Viruses and malware are common and can have drastically negative results on your computer and life.

You can often tell that your computer is infected because it acts weird or slow.

Active antivirus software is a good way to prevent these problems.

4 0
3 years ago
Other questions:
  • Sara is writing a program to input her monthly phone bills and output the month name and amount for the month with maximum amoun
    7·1 answer
  • To indent the first line of a paragraph which key should you use
    13·2 answers
  • Which acronym describes technology in which all or most of a deviceâs electronic circuitry is on a single microchip?
    12·1 answer
  • Suppose a program is running on a distributed-memory multiprocessor. There are 1,000 instructions in the program and 80% of inst
    13·1 answer
  • Which of the following is defined in terms of their activities related to denial-of-service attacks? Cracker Script kiddie White
    6·1 answer
  • Harry is creating a PowerPoint presentation and wants all the slides to have a uniform look.
    8·1 answer
  • A friend was just promoted to a new job that requires part-time travel, and he has also been promised a new laptop after his fir
    10·1 answer
  • A Windows user right-clicks on his desktop. What is he planning to do?
    10·1 answer
  • Given a Scanner reference variable named input that has been associated with an input source consisting of a sequence of lines,
    13·1 answer
  • An actual printout of computer data always satisfies the best evidence rule?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!