1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilia_Sergeevich [38]
2 years ago
8

You live "out in the middle of nowhere" and feel there is no need to protect your internet connection because there is no one th

at lives near you. one day you are unable to connect to the internet. after calling tech support you find that someone has hacked into your router and has changed all the settings. fortunately the hacker only wanted to use your internet connection and did not view any information on your computer. your decision to leave your router unprotected risked the integrity of the information on your computer. select yes or no.
Computers and Technology
1 answer:
dlinn [17]2 years ago
4 0
Yes, it put you at risk, and could have actually gotten you killed.
You might be interested in
Create a datafile called superheroes.dat using any text-based editor, and enter at least three records storing superheroes’ name
vitfil [10]

Answer:

Open a text-based editor like Microsoft word, notepad, libraoffice, etc, type the name of the super hero on the first field and the main power on the second field. Then click on the file menu or press ctrl-s and save file as superheroes.dat.

Explanation:

The file extension 'dat' is used to hold data for programs, for easy access. The file above holds data in fields separated by a space and has multiple records.

7 0
3 years ago
Encapsulation is the process of “packaging” information prior to transmitting it from one location to another. true or false
GenaCL600 [577]

The statement that encapsulation is the process of “packaging” information prior to transmitting it from one location to another is true.

This method augments the data with successive layers of control information before transmission across a network. Each OSI (Open System Interconnection) layer  is part of the encapsulation by adding a header to the data packet in the transmission network.

3 0
3 years ago
What is the cpu used for
Dahasolnce [82]

Answer:

A central processing unit (CPU), also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program. The CPU performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions in the program.

4 0
3 years ago
Systematically tackling the threats and vulnerabilities in the seven individual domains of a typical IT infrastructure helps you
Lorico [155]

Answer:

<u>Organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. </u>

Explanation:

The seven domains in an IT structure can be identified as:

  1. User Domain,
  2. Workstation Domain,
  3. LAN Domain,
  4. WAN LAN Domain,
  5. Remote Access Domain,
  6. WAN Domain,
  7. and System / Application Domain

They can be configured as portals for countermeasure failure and intruders, so it is crucial for organizations to look for ways to protect these domains to prevent unauthorized access to private data.

Therefore the relevance of the systematic approach to threats and vulnerabilities, which will assist in organizing the roles, responsibilities and responsibilities for risk management and mitigation.

7 0
3 years ago
Which of the following is an antivirus software?
kotegsom [21]

Answer:

McAfee

Explanation:

An antivirus is a standalone software that protects other software. On the other hand, a Firewall is capable of preserving both software and hardware on the network.

4 0
1 year ago
Other questions:
  • An ___ is any person who spends times using technology at home
    10·1 answer
  • It can be useful to have a mentor because they will help you
    7·2 answers
  • [Submit on zyLabs] Please write a function with one input, a matrix, and one output, a matrix of the same size. The output matri
    10·1 answer
  • Name that red flag asigment
    15·2 answers
  • Olivia creates a personal budget. She enters her current savings account balance in cell D3. In cell A3, she calculates her inco
    8·1 answer
  • Your boss is very skeptical about the idea of storing his files up in the cloud rather
    8·1 answer
  • Presentation graphics programs contain an assortment of tools and operations for creating and editing slides, including preforma
    8·2 answers
  • Accessing a computer system by using several words is known as​
    13·2 answers
  • Means storing,accessing information over the internet other than hard drive and your system
    15·1 answer
  • can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!