1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
9

You have users who connect to the corporate network using their laptops. because these computers often access confidential data,

you need to be sure that users access network resources only from computers that comply with the company policy of having an anti-virus, anti-spyware and have the newest windows updates. you decide to use nap. which type of enforcement policy should you implement
Computers and Technology
1 answer:
Triss [41]3 years ago
7 0
<span>You implement NAP Enforcement for 802.1X</span>
You might be interested in
Multibeam sonar technology uses _____.
blsea [12.9K]
More than one sound source and listening device<span>
</span>
8 0
3 years ago
Read 2 more answers
Small programs are shortcuts that are displayed as graphics pinned to your desktop are called_____
steposvetlana [31]

Answer:

Taskbar or they are pinned to desktop

Explanation:

3 0
2 years ago
An online game is played with two dice. In this context, explain what is meant by decomposition.
Vlad [161]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about desinging a game that is played with two dice and gets or shows their value to the player.

The dice value is random, and it can be between one and six. So, you need to generate two numbers between 1 and 6. You may also need to display the numbers

The main part of this program is that you need to know the numbers to limit or restrict what the user may do next while playing.

That's most of the first level of decomposition for solving a problem. In decomposition, you need to keep decomposing (breaking) the problem into smaller pieces, thinking outline of the program and deciding what objects, functions, variables, and logic you're going to implement in the coding.

4 0
3 years ago
What is the maximum number of elements that will be visited by the binary search algorithm when searching a sorted 45-element ar
sergey [27]

The max nukber of elements visited will be 6.

6 0
2 years ago
Is anyone else recieving a notification from brainly near the search bar about a message and click it and there nothing there???
Yakvenalex [24]

tessa the same with me I hate it and then I'll click I and then it's blank

4 0
3 years ago
Other questions:
  • Write a function that is named times_ten and accepts a number as an argument. When the function is called, it should return the
    8·1 answer
  • 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
    9·1 answer
  • What does the third argument (3) refer to in the following formula: VLOOKUP(10005, A1:C6, 3, FALSE)
    6·1 answer
  • categorize each job role as an administrative job or management job auditor director legal secretary payroll clerk etc ​
    8·1 answer
  • The physical part or components of a computer system called​
    5·2 answers
  • Factoring of integers. Write a python program that asks the user for an integer and then prints out all its factors. For example
    13·1 answer
  • How do i choose a most brainlyist
    5·2 answers
  • HELP ME PLEASEEEE
    8·1 answer
  • burger hut is trying to decide if it can receive money from the government for providing employees with insurance .
    6·1 answer
  • Explain the pros and cons of touchscreen, non-touchscreen, and hybrid devices:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!