The biggest thing she need to consider are her variables. and the output she will get.
Answer:
specific areas of access should be determined and they should be as restrictive as possible.
Explanation:
According to my research on security features of networks , I can say that based on the information provided within the question then specific areas of access should be determined and they should be as restrictive as possible. This would provide the highest level of security while still allowing production to be smooth.
I hope this answered your question. If you have any more questions feel free to ask away at Brainly.
Most computer devices are connected to the computer through port
Keyboard through usb port
Printer through usb port
Hand point device through usb port
Also computer equipped with LPT port for printers and COM port for additional devices like external modems e.t.c
There are two types of secondary memories.
- RAM
- ROM
RAM:
- RAM stands for random access memory .
- It is expandable.
- we can do multiple things in it.
- Its erasable.
ROM
- ROM stands for read only memory.
- It is permanent .
- We can only read in it.
- Its permanent hence not removable.
Answer:
I'm stuck on this but the correct answers I would at-least pick is A and C I need more information about what operating system you have on the computer.