1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
14

What are the two types of primary safeguarding methods

Computers and Technology
1 answer:
hjlf3 years ago
8 0

Answer:

Guards and devices

Explanation:

You might be interested in
Im new what are points
Nesterboy [21]

You earn points to ask questions, the higher your level the more you can hold I'm guessing

8 0
3 years ago
Read 2 more answers
What is the letter for the trash directory on windows 10?
myrzilka [38]
It's usually in C: drive.
<span>C:\$Recycle.Bin
</span>But if you have several drives, there are Recycle Bins each drive.
3 0
3 years ago
Read 2 more answers
Which of the following is a benefit, as well as a risk, associated with peer-to-peer networks?
Anna71 [15]
<span>Clients depend on a working main server to perform their jobs: no, p2p relies on a structure without a central server. 

</span><span>Individuals can easily add or remove devices from their network: yes, this is true.

</span><span>Requires an IT professional, but easy to add clients to server and give privileges: no, in p2p, the server doesn't play a role.
</span>
<span>Software is maintained on the server, allowing for easy access to upgrade programs for all users: this is not an aspect of p2p</span>
5 0
4 years ago
Read 2 more answers
a user reports that her computer monitor will not allow her to switch back and forth between Microsoft word and internet explore
san4es73 [151]

Answer: B. Interrupts

Explanation:

Interrupts is a feature of digital computers that enables the interruption of the process the computer is currently engaged in so that the computer can process the new command. Interrupts is the reason I am able to type this answer because interrupts is interrupting my browser to process my typing.

If a user reports that their computer monitor will not allow her or him to switch back and forth between Microsoft Word and Internet Explorer, it is possible that the interrupts function is not working effectively to enable the switch. by interrupting one of the programs.

7 0
3 years ago
TCP connections are established through sequence numbers. Someone can guess a client's next sequence number and then impersonate
solong [7]

Options: True or false

Answer: True

Explanation:TCP(TRANSMISSION CONTROL PROTOCOL) is is an internet control protocol that allows Communication between internet users or computers by collecting and compiling packets of data and then sending such collected packets of data to the desired user.

Before using a TCP one must first create a connection which will enable it to effectively communicate with the other user.

TCP are established using sequence numbers which can be predicted by another party for their own personal gain.

6 0
3 years ago
Other questions:
  • Which of these is a biotic factor in an aquatic ecosystem?
    10·1 answer
  • On five lane roadways, the center lane is designated for __________ and is used by vehicles traveling in both directions.
    14·1 answer
  • Write a program to read customer number, Name, loan amount, interest rate and time of repayment. Calculate and display the EMI .
    9·1 answer
  • Using Word, Maureen is writing an outline of a presentation she plans to give to her company. She will be showing a video during
    12·2 answers
  • The person who Oversee the direct work of employees and is responsible for the day-to-day tasks the employees complete is likely
    7·2 answers
  • Where will the append() function add a new element to a list? A. At the end of the list B. At the beginning of the list C. In th
    10·1 answer
  • Are Proxy Servers illegal if im using it to surpass Facebook or something because it is banned
    12·1 answer
  • For what reason can security risks never be fully eliminated?​
    7·1 answer
  • Answer to this problem
    11·1 answer
  • Why is it important to enforce access controls and to keep logs regarding who has access to data closets
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!