1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fgiga [73]
3 years ago
6

Often used in connection with a business

Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
3 0

Answer:

I would have to say public domain (but i am not sure)

You might be interested in
Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne
Misha Larkins [42]

Answer:

By using a virtual private network (VPN)

Explanation:

If Randy deploys a virtual private network (VPN), it will give the sales department online privacy since VPN encrypt connections whenever the sales department connects to the company network over the Internet. A VPN for the sales department is very necessary to use over a cellular data signal to ensure the department's overall digital defense, and it also has other uses.

7 0
3 years ago
Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and
nikitadnepr [17]

Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users’ needs.Alex been offered

A.Security administrator

Explanation:

  • A security systems administrator handles all aspects of information security and protects the virtual data resources of a company.
  • They are responsible for desktop, mobile, and network security, and are also responsible for installing, administering and troubleshooting an organization's security solutions.
  • A security administrator is the point person for a cybersecurity team.
  • A Security Administrator installs, administers, and troubleshoots an organization's security solutions.
  • The Security Administrator will ensure the network's security, protect against unauthorized access, modification, or destruction, and troubleshoot any access problems

3 0
4 years ago
Help plz its do today
TiliK225 [7]

Answer:

It is a good idea to consider supply and demand when considering your future career. This will give us an idea of how easy or difficult it is to enter the area and make a living from it.

Explanation:

8 0
3 years ago
Write a program to print the given number is prime or composit using do while loop​
Alex_Xolod [135]

Answer:There are 28 chocolate-covered peanuts in 1 ounce (oz). Jay bought a 62 oz. jar of chocolate-covered peanuts.

Problem:

audio

How many chocolate-covered peanuts were there in the jar that Jay bought?

Enter your answer in the box.

Explanation:There are 28 chocolate-covered peanuts in 1 ounce (oz). Jay bought a 62 oz. jar of chocolate-covered peanuts.

Problem:

audio

How many chocolate-covered peanuts were there in the jar that Jay bought?

Enter your answer in the box.

6 0
3 years ago
What is one way to recognize whether an online source has been copyrighted
lara [203]
Copy and paste a sentence or a paragraph and search it and usually that site the person copyrighted it from will pop up, and/or if it's a image, it was have a name on it somewhere in the corner. 
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which command compiles the java source code file welcome.java?
    9·1 answer
  • Create a stack with three integers and then use .toarray to copy it to an array.
    10·1 answer
  • The implementation stage of the SDLC _____.
    7·1 answer
  • John works for Internal Computer Specialists, a company that focuses on helping small business owners resolve MIS infrastructure
    12·1 answer
  • Nancy needs to find the average of two numbers in the middle from an even count of numbers arranged in descending order. which s
    9·2 answers
  • Jack started a job as a consultant with an IT firm he will be interacting with various customers and employees from different pa
    13·1 answer
  • You have used loops for repetitive processes.
    11·1 answer
  • Join my among us <br><br> code GNLMJF
    13·2 answers
  • What allows a programmer to write code quickly and efficiently for an action that must be repeated?
    14·1 answer
  • What is the advantage of learning through story compared to learning through personal experience?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!