1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fudgin [204]
3 years ago
12

Among the rights you have as a user of computing resources is the right to​ _______.

Computers and Technology
2 answers:
Zinaida [17]3 years ago
4 0

Answer:

C) protection from​ viruses, worms, and other threats

Explanation:

Your obligations include:

  • You should follow the standard techniques for using applications.
  • You should only report important and relevant problems.
  • You should use your mobile following your organization's guidelines and not at free will.
  • You should treat your password very seriously.

You are entitled to be protected from viruses, worms, and other threats  when you use your computing resources.

Ivanshal [37]3 years ago
3 0
Protection from​ viruses, worms, and other threats
You might be interested in
Frequently used _____________ can be saved as _____________ for use in analysis, dashboards, reports, tickets, and alerts.
Ilia_Sergeevich [38]

Frequently used filters can be saved as queries for use in analysis, dashboards, reports, tickets, and alerts.

<h3>What are the types of filters in a computer?</h3>

The low-pass filter, high-pass filter, band-pass filter, and notch filter are the four main categories of filters (or the band-reject or band-stop filter).

The following is a list of the three filtration kinds.

Vacuum Filtration: In order to quickly draw fluid through a filter, vacuum filtration uses a vacuum pump.

Centrifugal Filtration: In this technique, the material to be filtered is spun at a very high speed.

You can use the filter tool to identify the crucial elements you require by filtering a column of data within a table. You have the option to sort by date, number, alphabetical order, and more using the sorting tool. The use of sorting and filtering is explored in the example that follows, along with some sophisticated sorting methods.

It is possible to save frequently used filters as filters, queries for analysis, dashboards, reports, tickets, and alerts.

To learn more about filter tool refer to:

brainly.com/question/10169776

#SPJ4

4 0
2 years ago
Technologies designed to replace operating systems and services when they fail are called what?
Pie

Answer:

Bare metal recovery.

Explanation:

Technologies designed to replace operating systems and services when they fail are called bare metal recovery.

Basically, it is a software application or program which is primarily designed to enable users to reboot the affected system and services that have failed, usually from a removable media, CD-Rom using an image file of the operating system backup.

4 0
4 years ago
An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be i
a_sh-v [17]

Answer: Closed port

Explanation:

Port 23 basically refers to the telnet which provide very severe services and it is used to access the server remotely. We should always closed the port 23, when we are not using telnet services because to prevent it from being hacked due to the port scanning.

As, now a days it is rarely used by the hackers as it is difficult to access this services from the server.

Therefore, Closed port is the correct answer.

3 0
3 years ago
Help pweaseee!! Lloyd has created a validation script for a data entry form. What property should he use to test for a selected
Talja [164]
I think it’s gonna be D. clicked
5 0
3 years ago
The area of a square is stored in a double variable named area. write an expression whose value is length of the diagonal of the
ale4655 [162]
You should specify what language you're using in these types of questions; here's an example in C++.

#include <iostream>
#include <math>

int main()
{
// example area
double area = 25;

// square root the area to find the length
// then apply basic pythagoras
double diagonal = sqrt(pow(sqrt(area), 2) + pow(sqrt(area), 2));

return 0;
}
8 0
3 years ago
Other questions:
  • Information management examines the organizational resource of information and regulates its definitions, uses, value, and distr
    11·1 answer
  • Suppose that a computer virus infects your computer and corrupts the files you were going to submit for your current homework as
    12·1 answer
  • How many valence electrons are present in the atom of the atomic number of 12?
    10·1 answer
  • 2. What's the keyboard command that will allow you to "copy" text?
    8·2 answers
  • The fossil record is usually incomplete due to the destruction of fossils.
    10·1 answer
  • Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices again
    6·1 answer
  • To implement a small database, a database designer must know the "1" and the "M" sides of each relationship and whether the rela
    7·1 answer
  • What is essential to delivering a successful presentation?
    5·2 answers
  • Hi All,
    12·2 answers
  • Does anyone know how to change your username? plz help I don't want my name on this lmo
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!