1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korvikt [17]
3 years ago
8

for what reason do some security professionals consider insiders more dangerous than outside intruders?

Computers and Technology
1 answer:
dmitriy555 [2]3 years ago
8 0
Truthfully,
 I think they trust the people where they originally came from than different people!!!!
You might be interested in
A disk with many program and data files scattered on it is said to be ____.
Airida [17]
Fragmented would be the answer
5 0
3 years ago
Higher resolution images mean they can be enlarged better, <br> True or false
ella [17]

Answer:

False

Explanation:

High resolution just mean It looks better

6 0
3 years ago
Read 2 more answers
Virtual machines are not susceptible to the threats and malicious attacks like other operating systems.
Nonamiya [84]

Answer:

flamingo was here

Explanation:

3 0
3 years ago
Which line in the following code contain an error
Burka [1]
Please attach a photo
4 0
3 years ago
Random integer between 3 and 13 (inclusive)
garri49 [273]

Answer:

6

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • How do you spell kiss in Japanese
    13·2 answers
  • 10.
    13·1 answer
  • _____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard
    8·1 answer
  • Some people are unable to arrange six matches to form four equilateral triangles because they fail to consider a three - dimensi
    6·1 answer
  • Which of these forms of multimedia would most likely contain both music and text:
    14·1 answer
  • Many computer programs contain ____ that detail the specific instructions a computer should perform (in a specific order) to car
    9·1 answer
  • Using a "word" of 5 bits, list all of the possible signed binary numbers and their decimal equivalents that are represent able i
    12·1 answer
  • A network technician is attempting to add an older workstation to a Cisco switched LAN. The technician has manually configured t
    11·1 answer
  • What is the function of ctrl+Q​
    14·1 answer
  • You will use the Word application to design, develop, and create a business letter to potential clients of your new business. Th
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!