1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
11

Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support

and asked Paavo’s opinion regarding its security. What would Paavo tell him about USB OTG security
Computers and Technology
1 answer:
grandymaker [24]3 years ago
4 0

Answer:

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Explanation:

Since in the question it is mentioned that Paavo reviewed a request by an executive for subnotebook computer i.e new. but he needs to USB OTG support so it is a  USB i.e on the go that links the devices from one device to another

Therefore by links the mobile device to the computer i.e infected that allows malware we called virus so that we are able to send it to that device. By this,  he wants to tell about the USB OTG security

You might be interested in
A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password
Setler [38]

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

5 0
3 years ago
The Leal button is located in the
Fed [463]
The button is located on the left side of the gear shift right under the main shift button
7 0
2 years ago
Help!! Best answer will get Brainliest!!
Eddi Din [679]

Answer:

answer(s):

-set goals

-select a topic

-write down research questions

Hope this helped and sorry for the bold. <3

Explanation:

6 0
2 years ago
Read 2 more answers
Choose all of the items that accurately describe an operating system.
Simora [160]

Answer:

provides the platform that application software runs on, manages a computer's hardware, and implements features like file and folder management.

Explanation:

6 0
2 years ago
An array similar to a phone book has 1000 names arranged as names [0], names[1]....names[999]. Nancy wants to search a name X in
sammy [17]

Answer:

b. The names in the list should be in alphabetical order.

Explanation:

A binary search is an algorithm used for searching for an item in a list or array. The algorithm first sorts the data structure into order and then divides it into halves. If the searched item is less than the middle item in the list, then the algorithm searches for the target in the first half, else, in the second half. This reduces the time complexity of the search.

5 0
2 years ago
Other questions:
  • Which tab and group will allow the insertion of rows and columns in a worksheet?
    8·2 answers
  • Using a pin or password in addition to tpm is an example of what type of authentication?
    13·1 answer
  • Press the ____ key(s) to erase one character to the left of the insertion point.
    10·2 answers
  • In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red
    13·1 answer
  • Explain why using infrared telescopes would not be useful for stargazing in the city?
    14·1 answer
  • Why do we need vram​
    6·1 answer
  • The method main of a class is called when you instantiate an object of that class like this: Box myBox = new Box();
    9·1 answer
  • Describe the difference between a chained conditional and a nested conditional. Give your own example of each.
    5·1 answer
  • A corporate or government network that uses Internet tools, such as Web browsers, and
    13·1 answer
  • True or False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!