1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yanalaym [24]
3 years ago
11

∀פפIN∀W∀ qwda dawdawdawdawd BAN ME NOW

Computers and Technology
1 answer:
Dvinal [7]3 years ago
6 0

Answer:

why

Explanation:

You might be interested in
Which is an advantage of a computer network?
stealth61 [152]
The answer is "networks allow computer to connect quickly and to share data or equipment". This is true because with a commuter network you can instantly share files to all the other computer by putting them of the network file storage center. This also allows multiple pieces of equipment to be used to complete one task that would usually take longer if a single computer did it
5 0
3 years ago
Read 2 more answers
Which of the following methods is the easiest way to set up a VPN client on a computer for a user who is not technical?
Pie

Answer:

Option D.

Use CMAK to create an executable to install.

Explanation:

The CMAK is the Connection Manager Administration Kit it is a feature in Microsoft Windows that allows users to customize the remote connection experience for users on their network.

The CMAK can be simply used by the technical expert to remotely operate the client computer, and customize the VPN himself without the non-technical user having to do anything. This can be done for computers only on a network however.

3 0
3 years ago
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
3 years ago
Which file types have .exe and .png as their extensions?
uysha [10]
.png are for photos and .exe are for programs.
6 0
3 years ago
Read 2 more answers
List at least 5 features that can be used to format a report in word 2013
Masteriza [31]

Answer:

Following are the features for formatting a report in word 2013

  1. Design Tab
  2. Convenient Layout options and alignment
  3. Resume work option
  4. Managing longer documents in a better way
  5. Enhanced table features

Explanation:

In word 2013, many of the new features were introduced:

  • The design tab was given a new look, including templates options and much more.
  • The layout option was also made much convenient by putting all necessary option under the right-click option.
  • Word started to present an option for resuming the work were you left last time. This made the working much efficient.
  • By dealing with headings the word 2013 version made it easier to compact the document by collapsing heading and focus on the specific part you want.
  • Many of the options were added to tables formatting such as border, colors, line weight and much more.

i hope it will help you!

8 0
3 years ago
Other questions:
  • ______ engineers build prototype cars and troubleshoot them.
    8·2 answers
  • Which loan type requires you to make loan payments while you’re attending school?
    7·1 answer
  • A sample containing 4.30 g of O2 gas has an initial volume of 13.0 L. What is the final volume, in liters, when each of the foll
    5·1 answer
  • a. Write a function called fizzbuzz. This function will take 1 number as a parameter. The function will print all numbers from 0
    15·1 answer
  • In excel what is the biggest disadvantage of copying a worksheet into another workbook?
    15·1 answer
  • Eight what makes one character
    14·1 answer
  • What is the best way to set up the spreadsheet? List each expense in a row. List each income source in a column. List each expen
    15·2 answers
  • Who doesn't like reeses
    11·2 answers
  • Complete the sentence. Use a ___ ___ (2 words) to find a website's URL based on keywords you specify.​
    15·1 answer
  • A service that enables a customer to build and run their own applications but doesn't include extensive access to hardware and m
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!