1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STatiana [176]
4 years ago
13

What was the partition style(s prior windows server 2008 and windows vista?

Computers and Technology
1 answer:
Sauron [17]4 years ago
4 0
Master boot record (MBR) only is your answer
You might be interested in
A network technician is setting up a wireless access point in the front office of a small company. The technician needs to disab
VladimirAG [237]

Answer:

He should disable UPnP technology to disallow devices to dynamically add themselves to the network without configuration.

Explanation:

  • UPnP stands for Universal Plug n Play.
  • It is an easiest way that allows gadgets to find all other devices connecting to your network.
  • This can also modify router settings to allow devices from outside the network to access the router.
  • External IP address can also be obtained by the gadget and a new port forwarding map can be set
  • So from all perspectives, UPnP is an open invitation for hackers to scan for the ports and hack into the device.
  • UPnP is a vulnerability to the secure system
6 0
3 years ago
Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t
Tems11 [23]

Answer:

Answer explained below

Explanation:

Think about all of the cloud services you use. How vulnerable are you right now to having your data stolen?

At its most basic level, “the cloud” is just fancy talk for a network of connected servers. (And a server is simply a computer that provides data or services to other computers). When you save files to the cloud, they can be accessed from any computer connected to that cloud’s network.

The cloud is not just a few servers strung together with Cat5 chords. Instead, it’s a system comprised of thousands of servers typically stored in a spaceship-sized warehouse—or several hundred spaceship-sized warehouses. These warehouses are guarded and managed by companies capable of housing massive loads of data, including the likes of Google (Google Docs), Apple (iCloud), and Dropbox.

So, it’s not just some nebulous concept. It’s physical, tangible, real.

When you save files to the cloud, you can access them on any computer, provided it’s connected to the Internet and you’re signed into your cloud services platform. Take Google Drive. If you use any mail, you can access Drive anywhere you can access your email. Sign in for one service and find your entire library of documents and photos in another.

Why are people concerned with cloud security?

It’s physically out of your hands.

You aren’t saving files to a hard drive at your house. You are sending your data to another company, which could be saving your data thousands of miles away, so keeping that information safe is now dependent on them. “Whether data is being sent automatically (think apps that sync to the cloud) or driven by users uploading photos to social media, the end result is that it’s all there somewhere being logged and stored,” says Jérôme Segura, Senior Security Researcher at Malwarebytes.

And that somewhere is a place that’s not in your direct control.

Risks of cloud storage

Cloud security is tight, but it’s not infallible. Cyber gurus can get into those files, whether by guessing security questions or bypassing passwords. That’s what happened in The Great iCloud Hack of 2014, where unwanted pictures of celebrities were accessed and published online.

But the bigger risk with cloud storage is privacy. Even if data isn’t stolen or published, it can still be viewed. Governments can legally request information stored in the cloud, and it’s up to the cloud services provider to deny access.

8 0
3 years ago
WILL GIVE BRAINLIEST!! 20 PNTS!!!
Anettt [7]

Answer:

C 1,2,3,4

Explanation:

This means I want to count from 0-4 and set it o the current loop I am currently on.

for i in range(0, 5):

 print("i currently equals: ", i)

The result will be

i currently equals: 0

i currently equals: 1

i currently equals: 2

i currently equals: 3

i currently equals: 4

8 0
3 years ago
Read 2 more answers
Match the following to the best fitting answer The job of TCP is to Answer 1 Fault tolerance provides Answer 2 Routers work to A
Zanzabum

TCP and router system is the best fitting answer.

<u>Explanation:</u>

In network TCP IP address plays major roles. Without TCP even network will not work.  To access the internet we need TCP address. TCP is required to send an email or chatting software or VPN connectivity. To get access or connect computer or desktop or workstation TCP  plays major roles.

To send an email id we need from address and to address at the same time to send mail we need TCP and their router systems. To check whether we are connected to network router we use PING command in DOS  MODE  for that TCP IP address is required.

6 0
3 years ago
A spreadsheet keeps track of student scores on all the exams in a course. Each row of the spreadsheet corresponds to one student
vivado [14]

Answer:

Check the explanation

Explanation:

A. The fundamental or basic operations are addition and division.

B. The total figure for each student (which starts at 0) will be included to c times. Given that there are r student totals, there are <em>r*c</em> additions for the totals. (An optional correct answer is <em>r*(c-1)</em> if you begin the accumulator with the initial item in a column, and perform <em>(c-1)</em> additions.)

Each exam average will be included to r times. In view of the fact that there are c exams, this gives another <em>c*r</em> additions.

All the exam average will be divided exactly once by the amount of students, c. So, c divisions.

C. <em>O(rc) </em>

D. LINEAR (Note: The Big O appears like a quadratic value, although the INPUT SIZE is rc, and the running time is linearly relative to the input size.)

7 0
3 years ago
Other questions:
  • T<br> F<br> 5.<br> You can save presentations in PDF and XPS formats.
    14·1 answer
  • Which member of the restaurant and food/beverage service career is mostly likely to plan menus and direct worker
    6·2 answers
  • What is the name of the function used to open a file in C?
    8·1 answer
  • The valid call to the function installApplication is
    5·1 answer
  • Write an assembly subroutine that check if a number is in the interval of [0, 10] and return 1 if the number is in this interval
    6·1 answer
  • Declare an ArrayList of Strings. Add eight names to the collection. Output the Strings onto the console using the enhanced for l
    9·1 answer
  • What explains the discrepancy between the number of bytes you can
    13·1 answer
  • Please answer the following in python: Answering the ones that have #TODO
    14·1 answer
  • Write an inheritance hierarchy for classes Quadrilateral, Trapezoid, Parallelogram, Rectangle and Square. Use Quadrilateral as t
    14·1 answer
  • A ____ is an Access feature that makes it easy to enter data.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!