Answer:
d) attach a bag of weights to the tripod
Explanation:
Answer:
A. Acceptable use policies
Explanation:
These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.
Answer:
encryption
Explanation:
A(n) encryption virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
It opens a different article depending on what program you on, to accommodate that program.