1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
2 years ago
15

People use a computer connected to the internet to manage financial accounts

Computers and Technology
1 answer:
Marrrta [24]2 years ago
3 0

Answer:

No however, if financial accounts are on website, then that is done, however, not on public network.

Explanation:

This should not be done on the public network, or some other computer. And in general its no. However, if the internet is required, then this must only be done on a private network and under strict firewall rules. Do not ever use the VPN for this as well, as your information can be leaked. You need to do all this, as these are monetary usage, and at times it can be very heavy, and result in very heavy loss. However, this is especially required by small children who use bank accounts regularly. They and all should keep this in mind.

You might be interested in
Discuss at least 1 Microsoft Windows security features that could protect data?
Licemer1 [7]

Answer:

Virus & threat protection.

Explanation:

Monitor threats to your device, run scans, and get updates to help detect the latest threats.

5 0
2 years ago
You are an IT technician at your company. The company has two small offices in different cities. The company's head office conta
Vesna [10]

The IT technician can configure DHCP and provide a static IP address a on the user’s computer.

Further explanation:

We have a case of one office containing a DHCP server and another one does not. A DHCP server assigns IPs to client machines and relies on DHCP protocol. By default, a DHCP server usually assigns clients in a network dynamic IPs. However, in this case scenario, since the head office contains a DHCP server, the IT technician is required to configure the general tab of the IPV4 network settings of the user’s machine to use the DHCP server. Configuring DHCP on client’s machine will ensure that the user will gain access to the network’s resources every time he is in head office.

A machine is built to check for alternate IP addresses if a DHCP server is absent. Therefore, to ensure that this user is always connected, the technician should also configure static IPs in the alternate configuration tab of IPV4 settings so that he will be able to connect to the branch office. Note that the static IP should be configured within the IP range of the branch office and not of the DHCP server.

In conclusion, you should avoid configuring a static IP on both the general and the alternate configuration tab for the branch office network. Doing so will restrict the user from accessing an established network while at the head office. The same case goes to the head office. Therefore, the technician should configure DHCP's general tab to be used in head office and static IPs on the alternate configuration tab to be used in the branch office.

Learn more about DHCP

brainly.com/question/10595289

#LearnWithBrainly

6 0
3 years ago
Direct connections provide continuous access to the Internet. Many bandwidth options are associated with direct connections. Whi
Murljashka [212]

Answer:

Option B i.e, T1.

Explanation:

The T1 seems to be the licensed electronic transmission connection efficient for delivering the following bits each sec. T1 lines are required to transmit that server information of such an organization to both the Web or to link to such an ISP.

  • Option A is incorrect because their transmission is different as compared to the T1.
  • Option C is incorrect because consumers are equipped with a high rates broadband link from such a mobile wall socket over an installed telecommunications line.
  • Option D is incorrect because it seems to be a circuit-switched telecommunications line infrastructure that communicates both information as well as voice across a wire cable.
6 0
3 years ago
2. A body is thrown vertically<br>100 m/s Theme taken to retum​
kondaur [170]

Answer:dead man lol roffle

Explanation:Not a gamer moment

6 0
3 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
postnew [5]

Answer: Computers as target

Explanation:

Whenever an authorized  access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.

8 0
3 years ago
Other questions:
  • Electronic files created on a computer using programs such as word software are considered to be
    15·1 answer
  • The Fibonacci numbers are the numbers
    15·1 answer
  • Priscilla is providing the junior analysts in her firm with some real-world illustrations to explain some of the recommendations
    12·1 answer
  • Over the past few years a very definite need has arisen in the electrical trades for:
    15·1 answer
  • What type of engineer is interested in designing, developing, and building different machines, devices, and tools? A.aerospace
    8·2 answers
  • Consider a system consisting of m resources of the same type, being shared by n processes. Resources can be requested and releas
    13·1 answer
  • On the Format tab, which group allows you to select a different font for a chart?
    7·2 answers
  • Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the
    9·1 answer
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
  • Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!