1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korvikt [17]
3 years ago
8

for what reason do some security professionals consider insiders more dangerous than outside intruders?

Computers and Technology
1 answer:
dmitriy555 [2]3 years ago
8 0
Truthfully,
 I think they trust the people where they originally came from than different people!!!!
You might be interested in
Explain synchronized plug firing.
eimsori [14]
HEY THERE!!

In a camera, flash synchronization is defined as synchronizing the firing of a photographic flash with the opening of the shutter admitting light to photographic film or electronic image sensor. It is often shortened to flash sync  or flash synch.


HOPE IT HELPS
6 0
3 years ago
Powerpoint provides only three picture effects. true or false.
scZoUnD [109]
False, there is a variety
4 0
3 years ago
What does the W in WAN represent
Ilya [14]
WAN stands for Wide Area Network.
7 0
3 years ago
Read 2 more answers
Xavier composed an email message using a webmail application. Listed below are the different elements that Xavier used in his em
dusya [7]
E., sentence casing.
3 0
3 years ago
Read 2 more answers
ShowDialog, used by a FileDialog object to display itself, is ______________________.
emmasim [6.3K]

Answer: A method

Explanation:

 The show Dialog is the type of method that is used by the file-dialog object for displaying itself. The main purpose of show-dialog is that it runs the common dialog box in the system with the default owner. It is basically inherited from the common-dialog.

The show-dialog is the type of method that displays the dialog box for defining the file extension filter and the various dialog behavior in the system.

 

8 0
3 years ago
Other questions:
  • If using the md5 hashing algorithm, what is the length to which each message is padded?
    11·1 answer
  • You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wa
    9·1 answer
  • Write a pseudocode thats accept and then find out whether the number is divisible by 5 ​
    6·1 answer
  • Which of the following is not a type of bank? (Everfi)
    9·2 answers
  • What does this mean, i am so confused- Explain the importance of identifying the purpose/use for pre-production documents
    9·1 answer
  • Create a program that finds (n+1)! -factorial- of an integer n in C++.
    13·1 answer
  • Please help thank u!!!!!
    13·2 answers
  • Which of the following is not part of the processes involved in data valida
    11·1 answer
  • Which of the following techniques can you not use to make the members of the std namespace available to your code? a. Code a usi
    11·1 answer
  • if anyone is on a Chromebook, do you ever mean to press backspace, then you accidentally press the power button and think "OH CR
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!