1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
4 years ago
5

Briefly describe the significance of the shannon limit for information capacity.

Computers and Technology
1 answer:
ella [17]4 years ago
6 0
Having too much information can slow down a computer and give it malware making it easier to hack and gain the information

Right?
You might be interested in
Define application software​
sp2606 [1]

Answer: An application software is a type of software that the user interacts with, while a system software is a type of software that the system interacts with.

Hope this helped you :)

7 0
3 years ago
You've been asked to set up a temporary Internet cafe for a conference your company is hosting. You have ten laptops to use in y
kolbaska11 [484]

Answer: Cable Locks

Explanation:

  • The cable locks is one of the type of secure device that helps in physically secure the various types of laptops and computer system.
  • The cable lock helps the devices and the confidential information to prevent from theft and it is also known as the versatile security system.  
  • The cable lock is basically warp up in the form of metal cable and we usually insert the this cable lock into the laptop device slot in the system.  

  According to the given question, The cable lock is typically used in the laptop devices that protect and physically secure from the hacking purpose and it is used in the various types of deices such as printers, electronic devices and the laptops.  

7 0
3 years ago
Hiiiiiiiiiiiiiiiiiiiiiiiii
Olenka [21]

Answer:

hi

Explanation:

hi

5 0
3 years ago
Read 2 more answers
A virus is a self-replicating program that produces its own code by attaching copies of it into other executable codes.
Allisa [31]

Answer: Stealth/Tunneling Virus

Explanation: Stealth or tunneling virus are the virus which are responsible for attacking a computer system which causes the problem in the functioning of the operating system by manipulating files, creating partition etc.

These viruses try to avoid or prevent the anti-virus scans for the detection any sort of virus or error . They act to prevent any malfunction detection by taking charge for the anti-virus operation.

5 0
3 years ago
How do you get The special and extended ending in final fight 2 snes
andreev551 [17]
Yes what that person above said!
4 0
3 years ago
Other questions:
  • Helen has no experience in security. She would like to earn a certification that demonstrates that she has the basic knowledge n
    15·1 answer
  • Which of the following need NOT be completed separately if a worksheet is prepared?
    6·1 answer
  • What would you use to exit from a for each activity and continue the execution of the workflow?
    13·1 answer
  • Structured walk-throughs take place throughout the SDLC and are called _____ reviews, depending on the phase in which they occur
    9·1 answer
  • What is the term for the error caused when one end of an unshielded twisted-pair (UTP) cable is terminated in the T568A configur
    6·1 answer
  • Consider Ron’s budget. How much money does Ron have left over each month?
    9·2 answers
  • How 0x86 processor store 0x12345678 in memory ​
    13·1 answer
  • Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to pi
    8·1 answer
  • What are some other projects or things you do in your life (other than writing an essay) where you use an iterative process?
    9·2 answers
  • How do i give brainliest? if what you say works i'll give de brain
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!