The first question is B.), acronym, and the second one is c.) acrostic.
Hope this helps!
Answer:
B. Change the router's default administrative password.
Explanation:
Whenever a user purchase a router for wireless network, a default password has been set for the device, which can be easily accessible to different users on the internet or that particular network. This will lead to unsecured that particular user in terms of hacking or stealing data or personnel information easily.
To make sure the security of customer on private network, the technician should change the router default password.
The code that carried out the functions indicated above is stated below. It is not be noted that the code is written in C#
<h3>
What is C#</h3>
C# is a type-safe, object-oriented programming language. It is pronounced "see sharp"
<h3>
What is the code for the above task?</h3>
Using System;
public class HoursAndMinutes
{
public static void Main()
{
// declaring minutes variable and assigning 197 as given in question
int minutes = 197;
// outputing the total minutes , hours
Console.WriteLine("{0} minutes is {1} hours and {2} minutes.", minutes, minutes/60, minutes%60);
}
}
// OUT
Learn more about C#:
brainly.com/question/20211782
#SPJ1
The following options helps keep people from slipping on floors
A) Have the proper absorbents in an easy-to-find place to quickly put on spills : So that accidental little spills can be cleaned right away.
C) Wear slip-resistant footwear : It is a precautionary step to follow, no matter where we go.
D) Mark a slippery area with an easy-to-use tent sign that says " Caution, Slippery floor" : This allows people to be aware of the wet area and cross it cautiously.
Leaving oil and fluids to air dry thoroughly, takes a long time and there are chances that people step over it and slip.
So, the answer is
(B) Anytime oil or fluids are spilled on the floor, leave them to thoroughly air dry.
Answer:
(1) Protecting the privacy of personal data and proprietary information
(2) Proprietary Information
These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon
(1) Disaster Recovery Policy
(2) Acceptable Use Policy
(3) Business Continuity plan