1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mila [183]
3 years ago
13

________ is installed into special, read-only memory of devices like printers and print servers or devices used for various type

s of communication. Vertical-market software
Computers and Technology
1 answer:
Kitty [74]3 years ago
4 0

Answer:

A Firmware

Explanation:

A firmware is a hardware device usually ROM (Read Only Memory) containing a program. This program will be responsible for making the device to run and perform its expected functions. examples of devices that use firmware to run are printers, computer peripheral devices, many of the modern consumer electronics, etc. The manufacturer may decide to give an update on the firmware from time-to-time if there is a need.

You might be interested in
Describe security risks associated with downloading items online
AURORKA [14]

Answer:

1. Hackers could get information and sell it. 2. Hackers can get a hold of your files online. 3. Hackers can look at your photos. Download a VPN

8 0
3 years ago
Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
Svetradugi [14.3K]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

No, we don't even own our identity data on social networking sites. It may be said as permission is needed as an factor for recognizing an acceptable interpretation and solution to a circumstance as well as a method to be followed.

  • They would conclude that, in contemplating the data generated from social networking, this could be recognized that although the data that they left as our electronic fingerprints must be used with applications that can provide the businesses with the appropriate strategy to best reach the consumer.
  • With all this into consideration, the method of information gathering does not include personal identifying information, and also the reality that we must be made mindful of what details has been accessed as well as the right to get out of obtaining such details from the social platform.
3 0
3 years ago
Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company c
professor190 [17]

<u>The wireless network:</u>

Wireless networking and internet access are essentials when it comes to the smooth functioning of an enterprise. Certain information can be transferred from one computer to another within a specified if they are connected to a network.

In this case, as the company shares the building with the branch office of a rival company there may be repercussions. First of all, the company's wireless network should be equipped with a strong password and it should be changed regularly too.

Next, the officials responsible for networking should also monitor the range of their wireless network. There is no point in keeping the range of wireless network wide as it is to be used by employees only and they can access it on the company's premises.

5 0
3 years ago
An intentional action designed to prevent legitimate users from making use of a computer service is called
MatroZZZ [7]
Denial of Service Attack. If multiple machines are involved, it's a Distributed Denial of Service Attack.
4 0
4 years ago
You are designing a Webpage for your company's site that reaches an international audience. What should you do to solve the prob
Helga [31]
It is b cause of its answer
8 0
3 years ago
Other questions:
  • I need help please?!!!!!!!!!
    15·1 answer
  • You picked the corridor which led you here. If the guards find you, they're going to be really ANGRY! What is the synonym of ANG
    5·2 answers
  • Write a program that reads a file containing text. Read each line and send it to the output file, preceded by line numbers. If t
    8·1 answer
  • Assume s is a string of lower case characters.
    15·1 answer
  • You are a police officer trying to crack a case. You want to check whether an important file is in the evidence room. Files have
    5·2 answers
  • Interpretation is adding meaning to information by making connections and comparisons and by exploring causes and consequences.
    11·1 answer
  • A bug collector collects bugs every day for seven days. Write a program in Python that finds the highest number of bugs collecte
    11·1 answer
  • SIKILDIM OF NAPİM TÜRK OLAN VARMI
    15·1 answer
  • How does human error relate to security risks
    5·1 answer
  • Write a program in c# that simulates the roll of two six sided dice.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!