1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilia_Sergeevich [38]
3 years ago
8

You live "out in the middle of nowhere" and feel there is no need to protect your internet connection because there is no one th

at lives near you. one day you are unable to connect to the internet. after calling tech support you find that someone has hacked into your router and has changed all the settings. fortunately the hacker only wanted to use your internet connection and did not view any information on your computer. your decision to leave your router unprotected risked the integrity of the information on your computer. select yes or no.
Computers and Technology
1 answer:
dlinn [17]3 years ago
4 0
Yes, it put you at risk, and could have actually gotten you killed.
You might be interested in
What is the output of the following code segment?
Aliun [14]

Answer:

o

Explanation:

8 0
2 years ago
How do you create a table in an existing database on Microsoft Access?
earnstyle [38]
Hello! In order to make a table in an existing database, first, you need to open the database you want to open, and then on the create tab, go on the tables group and click table. A table will be inserted into the database and you will be able to see it in datasheet view. That will help you make the table and be able to edit as needed.

8 0
3 years ago
Read 2 more answers
You can set a ________, which is automatically displayed in a field unless the user enters something different.
Wittaler [7]

Answer:

Place holder

Explanation:

In computer programming, placeholder is a word, character or series of characters that is used to take up the space until the time when the space is actually needed. It is widely used in the sign up or login forms for web and mobile applications. For example, First Name, Last Name etc.

A programmer might have an idea that he will require this number of characters or values but he don't knows what the input will be, that’s why he uses the place holder.

Hope it helps!

6 0
3 years ago
What does NVRAM stand for
Julli [10]
Non-Volatile Random Access Memory
7 0
3 years ago
Read 2 more answers
A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log
klemol [59]

Answer:

Install recommended updates.

Explanation:

To resolve this exploit the company has to install recommended updates. Since their encryption is prone or unsecured so to have better encryption or more secured encryption they have to install recommended updates.Since log files getting transferred over this channel so the company would not want to someone mess with their log files.

3 0
3 years ago
Other questions:
  • The base class Pet has private fields petName, and petAge. The derived class Dog extends the Pet class and includes a private fi
    6·1 answer
  • On an open book test, Anna was asked to predict how American laws may affect the Mexican way of life if the US Constitution was
    15·1 answer
  • Given the function definition below, what is the effect of thecall:
    7·2 answers
  • A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing e
    5·1 answer
  • Complete the procedure for adding a contact by selecting the correct term from each drop-down menu.
    10·1 answer
  • In saving a Visual Basic project properly , which of the following: two components part are involved ?
    6·1 answer
  • If you wanted to make the system sequentially consistent, what are the key constrains you need to impose
    6·1 answer
  • Explain how the organ systems work together to warm up the body on a cold day
    12·2 answers
  • Your friends are having difficulties with their computer setups. Can you suggest a way to help each friend?
    5·1 answer
  • How can I master networking my home/business computer(s) - Tv's - iot devices and make the whole system as secure as possible?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!