1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luda [366]
4 years ago
12

Which device hold data and instructions when it is not in use?

Computers and Technology
1 answer:
Lilit [14]4 years ago
4 0
Secondary Storage.
I hope this helps! XD
You might be interested in
Time-management techniques work most effectively when performed in which order?
Sholpan [36]

Answer:

study-time survey, project schedule, prioritize tasks, reward system.

Explanation:

Time management can be defined as a strategic process which typically involves organizing, planning and controlling the time spent on an activity, so as to effectively and efficiently enhance productivity. Thus, when time is properly managed, it avails us the opportunity to work smartly rather than tediously (hardly) and as such making it possible to achieve quite a lot within a short timeframe. Also, a good time management helps us to deal with work-related pressures and tight schedules through the process of properly allocating the right time to the right activity.

Hence, time-management techniques work most effectively when performed in the following sequential order; study-time survey, project schedule, prioritize tasks, and designing (creating) a reward system.

4 0
3 years ago
Round 74,361 to the nearest 10​
grandymaker [24]

Answer:

74,400 i think

Explanation:

8 0
3 years ago
Q1. Which implementation of Network Access Control checks users' credentials to determine what level of access they should have
sesenic [268]

Answer:

3. RBAC

Explanation:

6 0
3 years ago
Drag each tile to the correct box.
kari74 [83]

Answer:

RESET...

Explanation:

.The file is not Indexed for searches.

.The file can only be viewed.

.The file is ready for backup.

.The file or folder is hidden.

√ Reset

.Next

6 0
3 years ago
You are implementing a wireless network in a dentist's office. The dentist's practice is small, so you choose to use an inexpens
Oksana_A [137]

Answer:

You should disable WPS in the access point's configuration.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

In wireless access points, the encryption technologies used for preventing unauthorized access includes WEP, WPA, and WPA2.

In this scenario, you notice that an access point supports Wi-Fi Protected Setup (WPS) using a PIN and you are concerned about the security implications of this functionality. Therefore, to reduce this risk you should disable Wi-Fi Protected Setup (WPS) in the access point's configuration.

This ultimately implies that, the wireless access point will operate in an open state and as such would not require any form of password or PIN for use.

3 0
3 years ago
Other questions:
  • You are the IT security administrator for a small corporate network. Samuel Garcia (sgarcia) has been away on vacation and has f
    9·1 answer
  • You will use the _____
    15·2 answers
  • A​ __________ is a commonly used tool for showing how the parts of a whole are distributed.
    11·1 answer
  • Do {
    12·1 answer
  • HELP PLEASE ASAP!!! Does anyone know how to fix a broken iPhone which when I connect it to the charger it comes up with the Appl
    5·1 answer
  • What are the three primary separation of concerns on the client-side of a dynamic web application? (Check all that apply)
    13·1 answer
  • How do you italicise, bold, letters on this app?​
    11·2 answers
  • Mary wants to design an algorithm that will calculate the average for three (3) numbers. Please select the most appropriate data
    5·1 answer
  • Write a script that checks to see if at least one argument has been given on the command line and tests whether the argument is
    5·1 answer
  • What is this line called that appears and disappears in the search box<br><br> WILL MARK BRAINLIEST
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!