1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikitadnepr [17]
3 years ago
6

For what is a USB port used?

Computers and Technology
1 answer:
liraira [26]3 years ago
4 0
The answer is the second one. 
You might be interested in
To rotate text in a cell, select the _____ option in the alignment grouping.
KiRa [710]

Answer:

rotate text is the correct answer

7 0
4 years ago
Who invented the collodian process
pentagon [3]
Frederick Scott Archer
5 0
3 years ago
Read 2 more answers
how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
juin [17]

Answer and Explanation:

User Domain:

Risk

  • User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.

Work Station Domain:

  • The workstation domain has some software vulnerability that connects remotely and steals data.
  • A workstation can fail because of lost data.

LAN domain

  • A worm can spread and infect the computer.
  • LAN have some known software vulnerability.
  • An unauthorized access of the organization workstation in

LAN WAN domain

  • LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems.
  • Server can receive the DOS File Transfer protocol can allow uploaded illegal software.

LAN/WAN Domain

  • The boundary between the trusted and untrusted zones.
  • Hacker can penetrate the IT infrastructure and gain access.
  • Week ingress and egress filtering performance.
  • A firewall with the ports open can allow access to the internet.

System Storage Domain:

  • A fire can destroy the data DOC can cripple the organization's email.
  • A database server can be attacked by the injection of SQL and corrupting data.

Remote Access Domain

  • Communication circuit outage the connections
  • Remote communication from the office can be unsecured VPN tunneling between the remote computer and router
5 0
3 years ago
What is the database used for
ELEN [110]
Sometimes referred to as database management systems<span>, database software tools are primarily used for storing, modifying, extracting, and searching for information within a database. </span>
7 0
3 years ago
A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.
kumpel [21]
The email should be lighter but they're variables such as the word processing program. Not sure if this answered your question.
6 0
4 years ago
Read 2 more answers
Other questions:
  • Java - Given a String variable response that has already been declared, write some code that repeatedly reads a value from stand
    12·1 answer
  • What does this mean?
    7·2 answers
  • Graded Assignments may be found at the end of each chapter of the required textbook under the title "Real-World Exercises". Each
    15·1 answer
  • When you're working with a word processing document and you press the del key, what happens?
    6·2 answers
  • Weak Induction
    8·1 answer
  • To display data in a certain manner, like alphabetical order, is called
    5·2 answers
  • Select the TRUE statement from those listed below. (Select 1)(1pts) Question 11 - Select the TRUE statement from those listed be
    14·1 answer
  • Describe the difference between a myth and a fable.
    12·1 answer
  • Very few games have any sort of narrative, not even a simple one that involves setting the mood through color, sound, environmen
    12·1 answer
  • Explain why people struggle to control themselves when they engage with social media
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!