1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pogonyaev
3 years ago
9

What can be done to improve the security of business uses of the Internet? Give several examples of ecurity measures and technol

ogies you would use
Computers and Technology
1 answer:
igor_vitrenko [27]3 years ago
7 0

Answer Explanation

There are many things to improve the security of business with the help of internet

  • the pillars of business depends upon the information and internet provide security to these information.
  • the computer or laptop which is used for business purpose are secure by internet
  • we use hardware and software firewalls to protect the PC or laptop.
  • we use antivirus to protect the system
  • for runing the computer we uses software firewalls
  • for protection purpose we use hardware firewalls

You might be interested in
WILL GIVEE BRAINLIEST ANSWER!!!!
Licemer1 [7]

Answer:

People have been ringing the death knell for email on and off for a few years now. But should we be listening?

The latest peal came from French IT company Atos, which declared that it would phase out internal emails by 2013. And for reasons we’ll all recongize: too much time spent dealing with too many emails, of which too few are useful and too many are spam. CEO Thierry Breton said his staff would instead use good old face-to-face communication, as well as instant messaging (IM) and social media tools.

3 0
3 years ago
Demand is created through meeting customer buying criteria, credit terms, awareness (promotion) and accessibility (distribution)
tankabanditka [31]

Answer:

Bell

Explanation:

In the given case the product that has the highest Dec. Cust. Survey score will be treated as most competitive at the end of last year. Based on the information provided in the "Top Products in Thrift Segment" table, we can conclude that Bell has highest score for Dec. Cust. Survey score which stands at 31.

Please see attachment for the product list we referenced to as non was given.

7 0
3 years ago
"You are on a service call to fix a customer’s printer when she asks you to install a software package. The software is on a per
pickupchik [31]

Answer:

Ask her to get a genuine software

Explanation:

if i will install, it can cause the following problems:

1. Prated software makes your system Vulnerable to the security attacks because the activities of the software are not monitored by any organization and no one is responsible for anything bad happened to your system.

2. It may stop working anytime because there would not be maintenance patches available for it so that it can work properly.

3. It cannot be updated and may cause problems in core functionalities of it.

4.Serious legal actions can be taken against anyone using them because  economy has drastic decrease due ti use of it.

7 0
3 years ago
a. Show the output of the following program: 1: public class Test { 2: public static void main ( String [] args ) { 3: A a = new
faust18 [17]

Answer:

See attached file.

Explanation:

See attached file.

Download txt
3 0
4 years ago
Help pls put them in order for me??
Natalija [7]

Answer: i can't see the hole thing?

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Don is the superintendent of the county school system. What task might Don
    8·1 answer
  • Yahoo! allows users to create personalized my yahoo! pages. users can add or delete a variety of information from their personal
    8·2 answers
  • On the 74ls74 d flip-flop, the clk input has a small triangle. the pr (preset) and clr (clear) inputs have a circle. what do the
    15·1 answer
  • What are the basic tools for coding HTML manually?
    10·2 answers
  • What is the analysis stage in System development life cycle?
    12·1 answer
  • 50 POINTS & A FOLLOW!
    11·2 answers
  • An IP address in the form 197.169.100.1 is called a(n) ________. dotted quad encryption key random number sequential access numb
    7·1 answer
  • ____ steganography places data from the secret file into the host file without displaying the secret data when you view the host
    9·1 answer
  • Four major parts of the keyboard
    12·2 answers
  • If the tax percent is 15% and tax is $36 and percent discount is 10, what is the cost price?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!