1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
11

How do networks help protect data? -by preventing access by more than one person at a time -by restricting access to department

chairs -by scheduling regular backups -by shutting down at 5:00 p.m. each evening
Computers and Technology
2 answers:
Zielflug [23.3K]3 years ago
5 0
By restricting access to department chairs
Whitepunk [10]3 years ago
3 0

Answer:

because they have to rest

You might be interested in
Everfi module 7 answers
Nat2105 [25]
What is the question?
7 0
3 years ago
Fryshta is using the Help window in PowerPoint to learn about inserting Smart Shapes into a presentation. She currently has a He
Rainbow [258]

Answer: Pin

Explanation:

Pin button is the button that is used for sticking or saving the ideas from the windows or web on that very place.This feature helps in reviewing or getting the idea back later anytime from the window as per users need. User use this button for saving any food recipe, steps of any process, guidelines etc.

  • According to the question, Fryshta can use pin button from the help window for sticking or pinning the steps of inserting shapes in her presentation.She can have a look at the steps whenever she want.
8 0
3 years ago
How can i see what websites are visited on my wifi
grigory [225]

Answer:

If you want to view sites visited on a wireless network, you can check the logs stored by the wireless router to see what information is available. You may need to set your logging settings to capture the data you want.

Explanation:

5 0
3 years ago
HELP ASAP!!!! PLEASE !!! What information does the Media Access Control (MAC) on a network card provide?
sladkih [1.3K]

Answer:

3. the company that installed the network card into the computer's motherboard

3 0
3 years ago
Read 2 more answers
you are configuring a server that will be used by an external organization. what is required when you install the ad fs role on
agasfer [191]

you are configuring a server that will be used by an external organization. <u>Web Application Proxy servers</u> Web Application Proxy servers.

What is a proxy server?

A proxy server i<u>s a server program used in computer networking that stands between a client and the server supplying the resource that the client is requesting</u>. A proxy server is a server program used in computer networking that <u>stands between a client and the server</u> supplying the resource that the client is requesting.

Proxies add a <u>significant degree of protection to your machine.</u> They can be configured as firewalls or web filters to defend your computer against online dangers like viruses.

<u>This added security from a </u><u>proxy </u><u>server is also beneficial when used in conjunction with a secure web gateway or other email security tools</u>. Using this method, you can filter traffic based on the level of security it offers or the volume of traffic your network—or certain computers—can handle.

To learn more about proxy server, use the link given
brainly.com/question/9257742
#SPJ4

8 0
1 year ago
Other questions:
  • What software refers to the on authorized and illegal duplication or sale of software
    10·1 answer
  • Jose wants to be sure maintains a high credit score as he is planning yo buy a new car soon what should he do to ensure his scor
    13·2 answers
  • PLEASE HELP!!!!! David has gone to the Niagara Falls with his camera. He wants to click photos of the people around him and also
    11·2 answers
  • Write a method named circleArea that accepts the radius of a circle as a parameter (as a real number) and returns the area of a
    12·1 answer
  • A contracting company recently completed it's period of performance on a government contract and would like to destroy all infor
    13·1 answer
  • The Internet is considered a WAN. *<br><br> True<br> False
    9·1 answer
  • Alicia uses a software application to store the names, email addresses, and phone numbers of her friends in alphabetical order. 
    11·1 answer
  • In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
    13·1 answer
  • Consider the following code:
    12·1 answer
  • Why can it be helpful to perform mathematical calculations using programming? Choose the best answer.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!