1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
4 years ago
8

Answers please !!!!!!!!!!!!!!!!!!!!!!!!!!!

Computers and Technology
1 answer:
alina1380 [7]4 years ago
4 0
Hard to see please add a better image. Actually just type out the question.
You might be interested in
Compare and contrast the following network types: Personal Area Network (PAN) Local Area Network (LAN) Metropolitan Area Network
Dominik [7]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

The various forms of networks and their contrast are as follows:

<u>LAN</u>

This is another form of connection that links the machine and system community together in such a limited but wider range than those of the PAN network. LAN will attach the two as well as three surrounding buildings for shared folders including assets as well as knowledge exchange.

<u>MAN</u>

MANs represent networks or channels that are broader than LANs although smaller than WANs since they cover the whole metropolitan area which might be a city rather than a county.

<u>WAN</u>

WANs seems to be the channel's biggest and wider than MANs, allowing machines to connect and communicate to one another and miles away, and it can also link all machines across the globe to either the Internet as well as network access.

<u>WLAN</u>

Wireless LAN is used to link connections in such a LAN network using Wi-Fi wireless innovations. The positive point here is really that we don't have to manually interact via cables in WLAN, and instead promote flexibility including networking for portable devices.

7 0
3 years ago
Zack sees an online contest. He could win $10,000 instantly! On the sign-up form he enters his name and email address. He is als
lana66690 [7]

Answer:

Do not please! Online hackers and identity thieves can use such informations or clues to figure out Zack's passwords.

Explanation:

In this scenario, Zack sees an online contest stating that he could win $10,000 instantly! On the sign-up form he enters his name and email address. He is also asked to enter his nickname, the name of any pets, and his mom's maiden name.

Hence, it is advisable, that Zack shouldn't do it because online hackers and identity thieves can use such informations or clues to figure out Zack's passwords.

Basically, this type of cyber attack is simply known as baiting in social engineering.

Social engineering can be defined as a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering are quid pro quo, phishing, baiting, tailgating etc.

8 0
3 years ago
Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evalua
Veseljchak [2.6K]

Answer:

more than one safeguard may be necessary.

Explanation:

The conceptual framework can be used to developed as well as construct through a process of the qualitative analysis. The approach includes the in the frameworks for identifying and evaluating the threats to compliance with the rules.

But since the rules formed cannot always address all the circumstances, the Code includes to evaluate the threats to the compliance of more than one safeguards that are necessary.

8 0
3 years ago
What are you win your good at tech
Kisachek [45]

Answer:

Dude

Explanation:

Say this again but not in gibberish.

8 0
3 years ago
Read 2 more answers
Why might you use the "search network campaigns with display opt-in" campaign type?
slava [35]
The answer is:
You can use one budget to advertise on the Search Network and Display Network
5 0
3 years ago
Read 2 more answers
Other questions:
  • Social networking sites like Office Online, PayPal, and Dropbox are used to develop social and business contacts.
    6·2 answers
  • Correspondence involves verbal communication. True False
    6·2 answers
  • The keyboard and the mouse____ parts of a computer ​
    8·1 answer
  • What safety feature melts to protect a circuit? a. fuse b. diode c. three-prong plug d. transistor
    10·2 answers
  • Tom Daniels, an employee of a telecommunications company, is developing software that would enable customers to activate value-a
    7·1 answer
  • What does it mean to say that data in an Excel table is “dynamically linked” to a chart? What are the advantages of this feature
    5·1 answer
  • 8.Which of the following IC was used in third generation of computers?Immersive Reader
    13·1 answer
  • C++ Write a program that initially asks a user to enter two positive integer numbers a and b. If either a or are zero or negativ
    9·2 answers
  • A server is handling thousands of simultaneous connections, and proxying requests to another service. Which concurrency model is
    9·1 answer
  • Which of the examples is part client side code
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!