1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
12

What should not be compromised when trying to meet standards and deadlines?

Computers and Technology
1 answer:
n200080 [17]3 years ago
5 0
A i believe is the answer
You might be interested in
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
kumpel [21]

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

8 0
3 years ago
What does project manager do?
lapo4ka [179]
Project managers (PMs) are responsible for planning, organizing, and directing the completion of specific projects for an organization while ensuring these projects are on time, on budget, and within scope.
7 0
2 years ago
Assume that the client wants to retrieve the www.cnn home page but has no information about the www.cnn web server IP address. D
liberstina [14]

Answer:

You could type<em> ipconfig www.cnn</em> in command promt.

Explanation:

4 0
2 years ago
A technician wants to configure the inbound port of a router to prevent FTP traffic from leaving the LAN.
Archy [21]

Answer:

The technician will want to add ACL for ports 20 and 21

Explanation:

The FTP protocol by default will attempt to use 21 for TCP access and 20 for data access.  By enabling an Access Control List (ACL) on ports 20 and 21, the technician can prevent FTP traffic from leaving the network on the default ports.

Cheers.

8 0
3 years ago
Determine whether the compound condition is True or False.
Viktor [21]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The given compound statement are:

4 < 3 and 5 < 10

4 <3 or 5 < 10

not (5 > 13)

4 < 3 and 5 < 10  this statement is false because "and" logical operator required that both operand (4<3) and (5<10) are true. Statement (4<3) is a false statement so this statement is false. "and" operator becomes true when all its inputs are true otherwise it becomes false.

4 < 3 or 5 < 10  this statement is true because "or" logical operator to be true if one of its input is true and false when all inputs are false. so in this compound statement, the first statement is false and the second statement is true. so this compound statement is true.

not(5>13) this compound statement is true because it has "not" operator and "not" operator makes a false statement to true and vice versa. so (5>13) is a false statement, and when you append "not" operator before it, then this compound statement will become true statement, so this is a true statement.

7 0
2 years ago
Other questions:
  • Jenny needs to record the names of 30 students, write down the subjects they studied, and note their grades in each subject afte
    14·2 answers
  • 5. Are you more honest in your online communication? Explain your response.
    6·1 answer
  • So when i try to click on an assignment to answer it the ask a question thing pops up and i can't exit out of it. I've tried rel
    10·2 answers
  • In today's classrooms, computers are generally being used to
    6·1 answer
  • How do u use this app?
    15·2 answers
  • What is your favorite food
    11·2 answers
  • If a tire fails or you have a blowout you should immediately concentrate your attention on
    6·2 answers
  • Tgif
    7·1 answer
  • Consider the following static method.
    9·1 answer
  • Question A low level distributed denial of service (DDoS) attack that involves SYN or SYN/ACK flooding describes what type of at
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!