1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkinab [10]
3 years ago
10

Andrew is researching a new operating system for the computers at his workplace. His boss wants the computers to be able to conn

ect to the cloud and thus have security in case the laptops are stolen.What version of Windows 8.1 does not have the ability to lock the hard drive so that it is unusable if removed from a laptop?A. Window 8.1 CoreB. Windows 8.1 ProC. Windows 8.1 BasicD. Windows 8.1 Enterprise
Computers and Technology
1 answer:
Bumek [7]3 years ago
6 0

Answer:

Windows 8.1 Core

Explanation:

In this particular example, we're going to use Windows 8.1 Core, is the most basic of the window's family, in this case, only we need an OS to connect the hardware with the cloud computing for security and is not necessary another license, in addition, Windows 8.1 core is easiest to use, is so friendly with the user.

You might be interested in
You are capturing packets with a network sniffer and notice a number of packets that are flagged by the sniffer and described as
Rom4ik [11]

Answer:

Transport Layer                                    

Explanation:

  • Transport layer is responsible for correcting data transmission errors which is done by requesting retries also called re-transmission of packets in case of data loss or corrupted data.
  • Transport layer ensures end to end delivery of data making sure that the data is received correctly and in same order in which it was sent.
  • Transmission Control Protocol (TCP) is a protocol in this layer that continues to transmit data packets securely from sender to receiver, identifying packet losses.
  • Transport layer works on packet loss issues and corrects data transmission errors.
  • It has flow control and error control services manage data transmission rate and ensures data is received without error.
  • So in case of transmission errors and re-transmission requests transport layer should be investigated.
5 0
3 years ago
To include all fields in a sql query, use the ____ symbol after the word select.
dolphi86 [110]
SQL is a standard language for storing, manipulating and retrieving data in databases and t<span>he SELECT statement is used to select data from a database.</span>
To include all fields in a SQL query, use the * symbol after the word select. The symbol * is used after the word SELECT. This way it indicates that you want to include all fields in the query results in the order in which you described them to the DBMS when you created the table.​
4 0
4 years ago
LISTEN I NEED EVERY SINGLE BRAINLY USER TO RE POST THIS THERE IS A USER WHO JUST SAID THEY ARE GOING TO KILL THEMSELVES PLEASE C
Over [174]
WHAT IS THE NAME OF THE BRAINLY USER
7 0
3 years ago
Read 2 more answers
What happens when you double-click a column border??
IrinaVladis [17]
<span>The column width is adjusted to fit the text.</span>
7 0
3 years ago
How does a computer work?
Gre4nikov [31]

Answer:

A computer is a Device that can run multiple applications at a time and access the internet where you can find online stores and more also used to make video calls and more.

7 0
2 years ago
Read 2 more answers
Other questions:
  • PLEASE HELP!!!!!!!!!!!
    7·1 answer
  • What qualifies as a dependent (a) 25 year old son/daughter making$5k per year living at home, (b) 21 year old friend going to sc
    10·1 answer
  • I want to be a teacher some day and i know this question------------- Humans have a nose to breath , but what do fishes use to h
    6·2 answers
  • 1. _____ can’t be rewritten by the computer in which it’s installed, but it has the advantage of being very _____.
    6·1 answer
  • Topic: Pseudo-codes
    9·1 answer
  • Which of the following is the best description of an ip address?
    8·1 answer
  • A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.
    14·1 answer
  • Discuss how social media can affect social movements and social change.
    13·2 answers
  • How have cell phones improved our lives​
    5·1 answer
  • What are the nuclear codes?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!