1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
3 years ago
15

Case 7-2gabrielle is the network administrator at a medium-sized company. one of her responsibilities is to purchase network dev

ices to maintain the company network. gabrielle realizes that to improve network performance, she needs to buy and install a ____, which identifies the device on the network for which the data is intended and sends the data to that device only.
Computers and Technology
1 answer:
Ivahew [28]3 years ago
7 0
She buys and installs a switch. Switch is the answer
You might be interested in
1. Name the first PC virus.<br> 2. In which language are viruses written for Microsoft programs?
Tju [1.3M]

Answer:

The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by Amjad Farooq Alvi and Basit Farooq Alvi in Lahore, Pakistan, reportedly to deter unauthorized copying of the software they had written. The first virus to specifically target Microsoft Windows, WinVir was discovered in April 1992, two years after the release of Windows 3.0.

Explanation:

HOPE THIS HELPS

6 0
3 years ago
Read 2 more answers
If we recorded the average U.S. Housing Price every month for the next year, what graphical display is most appropriate to displ
JulijaS [17]

Answer:

Time plot.

Explanation:

A time plot, also known as a time series can be defined as a graphical representation of a pre-defined value (data) against time.

If we recorded the average U.S. Housing Price every month for the next year, the graphical display which  is most appropriate to display the data is a time plot.

Generally, when representing data that changes with respect to time or that are random in nature; a time plot is considered to be the most effective graphical display to use.

In this scenario, the average U.S. Housing Price that is observed should be plotted against the time of occurrence (months) over a year.

3 0
3 years ago
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
What is the maximum number of different codes that can be represented in 2 bytes?
olganol [36]
A two byte word has 16 bits, so there are 2^16 possible values.
5 0
4 years ago
The two major types of system software programs are utility programs and the ________. Select one: A. user interface B. supervis
Scrat [10]

Answer:

operating system

Explanation:

System software are those programs that many refer to as computer programs. The most basic function of system software is to manage the computer systems. It acts as an interface between the computer’s hardware and the end user. System software converts instructions that end users give to the computer into a machine understandable language. Examples of system software include operating systems, utility programs, device drivers, and windows systems. The operating system is responsible for the functioning of all the computer’s hardware parts. It is the software loaded into the system when the computer boots up. It manages everything, from the memory, to the CPU, and many other different tasks.

8 0
4 years ago
Other questions:
  • Most sim cards allow ___________ access attempts before locking you out.
    10·1 answer
  • Generally, websites ending in .edu, .gov, and .org are less likely to be biased, or to show preference toward a certain financia
    12·1 answer
  • Sadie helman runs a web site for amateur snowboarders. she likes to post videos and music related to snowboarding on her site as
    12·1 answer
  • When working with copper cabling (as opposed to fiber optic) a ________ can check a variety of a cable's electrical characterist
    13·1 answer
  • Your company's network topology diagrams aren't very detailed so you're helping to improve them. The new set will have separate
    9·1 answer
  • Write a program to have the computer guess at a number between 1 and 20. This program has you, the user choose a number between
    9·1 answer
  • How will you define a text?
    10·1 answer
  • When streaming video, data is temporarily stored in a
    5·2 answers
  • Please answer questions in complete sentences!
    14·1 answer
  • Write a C++ line of code to declare a variable of type “double” that signifies the average of student grades, then initialize th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!