1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
12

What is required for real-time surveillance of a suspects computer activity?/p Group of answer choices a. Blocking data transmis

sions between a suspect’s computer and a network server. b. Poisoning data transmissions between a suspect’s computer and a network server. c. Preventing data transmissions between a suspect’s computer and a network server. d. Sniffing data transmissions between a suspect’s computer and a network server.
Computers and Technology
1 answer:
Hitman42 [59]3 years ago
3 0

Answer:

c  Preventing data transmissions between a suspect’s computer and a network server

Explanation:

You might be interested in
Which sql keyword is used to retrieve a minimum value from an attribute in a table
konstantin123 [22]

The SQL keyword that is often used to retrieve a minimum value from an attribute in a table is the MIN function.

<h3>What is the MIN Function? </h3>

The MIN Function is known to be a group found under Excel Statistical functions.

Note that the MIN often return the minimum value in any list of arguments and as such The SQL keyword that is often used to retrieve a minimum value from an attribute in a table is the MIN function.

Learn more about SQL from

brainly.com/question/25694408

#SPJ11

5 0
2 years ago
Read 2 more answers
Telecommunications is the transmission of voice and video as well as data and usually implies transmitting a longer distance tha
saul85 [17]

Answer:

The correct answer to the following question will be "True".

Explanation:

  • Telecommunication seems to be the transmitting by cable, antenna, optical or other electromagnetic networks of signs, commands, letters, words, texts, pictures, and sounds, or knowledge of any kind.
  • This happens when the use of technologies involves the information exchange between participants in the conversation.

Therefore, the given statement is true.

6 0
3 years ago
Which of the following is part of the process of publishing a website?
Mamont248 [21]
I think it's the first one. Hope this helps
6 0
3 years ago
Read 2 more answers
What are the text or graphics that are lighter than the main text located in a document's background called?
faust18 [17]
That would be a watermark
7 0
3 years ago
How to know if somebody else is listening my conversations by cellphone?
weeeeeb [17]
I dont think it would be possible for someone to listen to your calls im pretty sure only the police could if they provide a sign warrent by a judge to the phone company
4 0
3 years ago
Other questions:
  • Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate
    10·2 answers
  • ​What file system below does not support encryption, file based compression, and disk quotas, but does support extremely large v
    10·1 answer
  • When an attacker uses bluetooth to copy e-mails, contact lists, or other files on the device, it is called?
    12·1 answer
  • Programs that are based on ___ graphics record your images on a pixel by pixel basis and will typically save files in formats su
    15·1 answer
  • answer for brainliest Today, trending current events are often present on websites. Which of the following early developments in
    15·1 answer
  • With only a floor plan to reference, the designer would know what about a window?
    7·1 answer
  • How do I make sure I have full access to this app where do I put in payment information
    8·1 answer
  • ROM is a volatile memory. true or false​
    11·1 answer
  • Write a program that outputs inflation rates for two successive years and whether the inflation is increasing or decreasing. Ask
    9·1 answer
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!