1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zolol [24]
3 years ago
10

o maintain reasonable key security (mark all that apply): Ensure that someone else always has an extra key. Ensure that no extra

duplicates are made. Maintain strict control over master keys and control keys. Ensure that the key cannot be linked to the lock it operates.
Computers and Technology
1 answer:
Komok [63]3 years ago
6 0

Answer:

The answer is "second, third, and fourth choices"

Explanation:

In the question the numbering of the choices were missing if we numbering the choices so, the first choice will be one first number and second choice is in second and so on, and its explanation can be defined as follows:

The network safety key is a type of network login credentials or passwords which is used for provides authorization as well as access the network or device upon which client requests to communicate throughout the form of physical, digital, or biometrical information login.  

  • It doesn't ensure the extra key.  
  • It helps ensure there were no additional duplicates.  
  • It keeps strict access codes as well as keys command.  
  • It makes sure, that its key could not be linked to able to operate the lock.
You might be interested in
Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it app
Natali [406]

Answer:

Following are the memo to the vice president:

Explanation:

In this question, the president claims, that he got a threatening e-mail from the Maui worker. HR acknowledged that all of the workers should always be dismissed, in its protection, that worker claims that he did not send the message but he does not recognize why the message implies him return address. Here is a note for the vice president, who explains how an employee could have produced an email and made it look to be from another worker's account. That stuff we want will be progressively explained as follows:

a) The manipulating and e-mail used only by spammers and attackers were called this technique. In the SMTP server, it sends messages, that you can set up to send your spammer to the email addresses. Instead of a mail confirmation, I d the forger requires the receiver to see the next employee I d email. that recipient doesn't understand who sent the message.

b) The e-mail Systems information allowing for accessible transfer is used by the intruder or forger. It  must use an attacker order to verify communication with the SMTP server command:  

telnet smpt.server.name 25    

Its name of the SMTP server is smpt.domain.name, and the port is 25.

c) when the last stage is successful as well as a link created, this order to imitate an email account only with command can be entered:

MAIL from: Email-id

It creates a problem for the worker that sends the e-mail with the same id

d) Hacker sets the email of the receiver to:  

RCPT to: boss email-id  

It sets the beneficiary as the e-mail above.  

e) By entering an order, you can create the email data:  

DATA It may also adjust the date by using command and Any date we would like to use.  

Date: (date you would like)  

We should settle on the following:  

Subject: (your topic)

f) We press Insert after the topic is written. In this body can then be e-mail forms. It produces the text.  

g) its email forged is forwarded.

3 0
3 years ago
A diagram of a ten-node network that uses ten routers
tiny-mole [99]

The diagram of the of a ten-node network that uses ten routers is given in the image attached.

<h3>What is a node in a network?</h3>

A network node is known to be be seen as the kind of connection point that is seen amidst some network devices such as routers, printers, etc.

Note that they are known to often receive and send data from one network or endpoint to another.

Therefore, The diagram of the of a ten-node network that uses ten routers is given in the image attached.

Learn more about routers from

brainly.com/question/24812743

#SPJ1

3 0
2 years ago
You are setting up a small network. The customer has decided to change his internet service provider (ISP) to EtherSpeed. The IS
salantis [7]

Home pc1 becouse it is the right one

3 0
3 years ago
Links to the four default folders can be found on the left side of the file explorer window under the _________ heading:
dimulka [17.4K]

Answer:

Libraries

Explanation:

Document itself is a folder and is not a heading by the way.

Local simply means on the machine you are working and does not have default folders.

Desktop is  name of screen which is used as a gateway for using windows.

So, they cannot be correct answers.

4 0
3 years ago
Read 2 more answers
Which type of computer application is apple keynote? a. word processor b. spreadsheet c. presentation d. database e. multimedia
Naily [24]

The type of computer application which apple keynote is, is: c. presentation.

<h3>What is a presentation application?</h3>

A presentation application can be defined as a type of computer application which is designed and developed to avail its end users an ability to create various slides that comprises both textual and multimedia information, which are typically used during a presentation.

This ultimately implies that, apple keynote is an example of a presentation application which is used on computers.

Read more on presentation application here: brainly.com/question/26404012

#SPJ4

4 0
2 years ago
Other questions:
  • Impact of computer on education
    6·2 answers
  • Project using simple formulas
    15·1 answer
  • What is the difference between amplifier and the repeater?
    11·1 answer
  • VEE Physics 2006 E.C
    7·1 answer
  • Select one of the wrong answer from question 1 and explain why it is ironic.
    7·1 answer
  • In what way, if any, has community building changed in the age of digital media? People’s community building has not changed in
    13·1 answer
  • Temperature converter. This program should prompt the user for two arguments, first a decimal number and second, a single letter
    10·1 answer
  • Write the functions of F1 to F12 on the keyboard​
    5·2 answers
  • The _____ of a story describes the time and location of a story.
    5·2 answers
  • Hola, alguien aquí me podría ayudar dándome ideas a cerca de office (Word, PowerPoint o Excel) estoy desesperada no puedo pensar
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!