1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Likurg_2 [28]
2 years ago
10

Identify measures to protect your computer against threats from human actions. You cannot access a file in a computer that belon

gs to your friend. What prevents you from accessing the file?
Computers and Technology
1 answer:
scZoUnD [109]2 years ago
5 0

Answer:

Firewalls

Explanation:

A firewall is simply a network security system whose main duty is. to prevent unwanted access to. private network.

Firewalls is measures to protect your computer against threats from human actions.

It is also the one singular thing that prevents you from accessing the file on your friends system.

You might be interested in
What element is not a selection in the Interface preferences? UI Character Presets UI Font Size UI Language UI Scaling
Dovator [93]

Answer:

The element is not a selection in the Interface preferences is:

UI Character Presets

Explanation:

The interface preferences is a  section of the Set Preferences dialog, which contains settings related to the user interface for the display and configuration of certain features and dialogs, in accordance with the user's preferences.  They include the UI Font Size, UI Language, and UI Scaling, with the exception of the the UI Character Presets.  The UI Scale is the frontend extension of the actual screen resolution to the user.  The UI Language configures the user's preferred language, just as the UI Font Size allows the user to choose a preferred font size for display on the screen.

6 0
3 years ago
Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a
Evgesh-ka [11]

Answer:

b) False.

Explanation:

Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, anAn IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message., is a FALSE statement.

5 0
3 years ago
When presentations are being shown to an audience of over fifty people, how they should be displayed?
Anarel [89]
Full screeennn !!!!!!
6 0
3 years ago
Read 2 more answers
Which of these is a major mobile game developer?
Firlakuza [10]
Im thinking Zynga because it has tons of games
7 0
2 years ago
Read 2 more answers
1.Discuss the differences and similarities between a peer-to peer network and a client server network.
irga5000 [103]

Answer:

dsdasd1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

Explanation:

jaiusfkybuetcrjnwxyefshrcxijkwuecvashcnzx

5 0
2 years ago
Other questions:
  • Can you help me correct a sentence?
    13·1 answer
  • Carol typed a memo to send to everyone in her department. To create this memo, she used a _____. spreadsheet word processor fax
    10·2 answers
  • Write a program that asks the user for two file names. The first file will be opened for input and the second file will be opene
    8·1 answer
  • Bobbi owns a protein shake company, which has been trading for 3 years. Her products are stocked in a number of gyms, but the co
    11·1 answer
  • What are the differences in LAN and WAN and how they are used to Increase Cybersecurity
    7·1 answer
  • Which of the following illustrations is depicted in the icon that's used to access Windows Help and Support files?
    13·1 answer
  • Which TWO objects are likely to have SSD chips in them?
    5·2 answers
  • 1. What are you going to do if someone ask for your personal information online?​
    12·2 answers
  • What is the codebook?
    6·1 answer
  • Why can't this app have people ask riddles.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!