1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
4 years ago
11

Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support

and asked Paavo’s opinion regarding its security. What would Paavo tell him about USB OTG security
Computers and Technology
1 answer:
grandymaker [24]4 years ago
4 0

Answer:

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Explanation:

Since in the question it is mentioned that Paavo reviewed a request by an executive for subnotebook computer i.e new. but he needs to USB OTG support so it is a  USB i.e on the go that links the devices from one device to another

Therefore by links the mobile device to the computer i.e infected that allows malware we called virus so that we are able to send it to that device. By this,  he wants to tell about the USB OTG security

You might be interested in
Write an algorithm to calculate the average<br> value of array of integer elements
amid [387]

Answer:

Explanation: Input : arr[] = {1, 2, 3, 4, 5}

Output : 3

Sum of the elements is 1+2+3+4+5 = 15

and total number of elements is 5.

So average is 15/5 = 3

Input : arr[] = {5, 3, 6, 7, 5, 3}

Output : 4.83333

Sum of the elements is 5+3+6+7+5+3 = 29

and total number of elements is 6.

So average is 29/6 = 4.83333.

7 0
3 years ago
PLEASE HELP ME ASAP!!!!
coldgirl [10]

First party insurance: Loss due to laptop theft, loss due to interruption in business activities due to website failure

Third party insurance: cost of lawsuits filed against the policyholder, fees of a special programmer investigating a cyber fraud, expenses of providing notifications of the cyber attack to clients and employees

8 0
3 years ago
Match the definition
Katen [24]

Answer:

¿???????????? SORRY..........

8 0
3 years ago
In Microsoft Word, when you highlight existing text you want to replace, you're in <br>     
IRISSAK [1]
You are in a formatting toolbar.
5 0
3 years ago
Read 2 more answers
Assume we have two lists, list A and list B. List A contains the numbers [20,10,20], while list B contains the numbers [40,10,30
Tcecarenko [31]

Answer:

5/ 18

Explanation:

Given :

List A: [20,10,20]

List B: [40,10,30,20,40,30]

Chance that number drawn from list A is larger than or equal to that drawn dlfrom list B.

If:

A = 20

B ≤ 20 : [10,20] = 2

A = 10

B ≤ 10 : [10] = 1

A = 20

B ≤ 20 : [10,20] = 2

Probability = Required outcome / Total possible outcomes

Hence,

required outcome = (2 + 2 +1) = 5

Total possible outcomes = 3C1 * 6C1 = (3 * 6) = 18

Hence,

chance that the number we drew from list A is larger than or equal to the number we drew from list B

= 5 / 18

8 0
3 years ago
Other questions:
  • What are the constraints for designing small and large files and how these are resolved in different file system
    7·1 answer
  • ANSI defines four events that signal the end of a transaction. Of the following events, which is defined by ANSI as being equiva
    14·1 answer
  • 2. Use the Internet to research Robocopy switches and then construct a command line that will use Robocopy to copy files in rest
    14·1 answer
  • I will mark you Brainliest if you could guess how old i am :3
    9·1 answer
  • Part 3:<br> Please answer
    9·1 answer
  • In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing
    7·1 answer
  • This is the number of items arranged in an order.
    7·2 answers
  • nder a Huffman encoding ofnsymbols with frequenciesf1, f2, . . . , fn, what is the longest a codewordcould possibly be
    13·1 answer
  • Select the correct answer. Nancy has made a small web page with the new features of HTML5. She has to show this web page in scho
    9·1 answer
  • TensorFlow and Pytorch are examples of which type of machine learning platform?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!