1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leno4ka [110]
4 years ago
14

A(n) _______________ is a collection of configuration and security settings that an administrator has created in order to apply

those settings to particular categories of users or devices
Computers and Technology
1 answer:
ioda4 years ago
6 0

Answer:

Profile

Explanation:

<em>A </em><em>profile </em><em>is a collection of configuration and security settings that an administrator has created in order to apply those settings to particular categories of users or devices. </em>

Profile Security Requirements are very important in order to define the levels of protection. Every particular profile counts on its predefined rules. Such set of rules either allow or deny in order to having access to the computer and the type of access to be granted to the user profile in the computer.

You might be interested in
A(n)…………is the interface used toconnect external devices to the computer.
Mama L [17]

Answer:

D. PORT

Explanation:

A Port is the interface used to connect external devices to  computer.

Ports are of various types based on the type of communication interface:

For example:

  • Serial port : information transfer takes place one bit at a time.
  • Parallel port : transfer of multiple bits at a time.
  • Ethernet : used for connecting network cable
  • USB : Universal Serial Bus

Computer peripherals like mouse,keyboard, modem, printer etc connect to the computer via the port which is in accordance with their specified communication interface.

6 0
4 years ago
A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of
Nostrana [21]

Answer:

drive-by-download

Explanation:

3 0
3 years ago
Read 2 more answers
What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
Paraphin [41]

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

3 0
3 years ago
Is B$4 is an example of a relative cell reference?
yawa3891 [41]
Yes it is because B$4<span> instructs Excel to keep the </span>cell reference<span> B4 (absolute). assumptions </span>
5 0
3 years ago
A farmer sells tomatoes. For some reason, the farm obeys mechanical laws of fate.
Mars2501 [29]

Answer:

Here are the if/elif statements:

if tomatoes == 24:  #if farmer sells exactly two dozen tomatoes

   watermelons +=4  #farmer receives 4 watermelons

elif tomatoes >= 12:  #else farmer sells at least a dozen tomatoes

   watermelons +=2  #farmer receives 2 watermelons

else:

   tomatoes<12   #On the days that farmer sells less than a dozen tomatoes

   apples +=1  #farmer will get a single apple

Explanation:

You can test the working of these if elif statements by this program:

tomatoes = int(input("Enter the amount of tomatoes sold: "))  #prompts user to enter number of tomatoes

watermelons = 0  #initialize watermelons value to 1

apples = 0  #initialize apples value to 1

if tomatoes == 24:

   watermelons +=4

elif tomatoes >= 12:

   watermelons +=2

else:  

   tomatoes<12

   apples +=1

   

print("Number of watermelons recieved: ",watermelons)  #displays the received number of watermelons

print("Number of apples recieved: ",apples )  #displays the received number of apples

8 0
3 years ago
Other questions:
  • Which of the following is an advantage of algorithmic thinking? Select all that apply.
    6·1 answer
  • In one to two sentences, explain why citizens pay taxes
    8·1 answer
  • How does the post process alert the user if it detects a hardware problem during the post process?
    6·1 answer
  • One major challenge in developing an international information system is to find​ a(n) ________ when there is so much cultural a
    11·1 answer
  • In the ISO/IEC 27002 framework, _________________ describes the use and controls related to encryption.
    15·1 answer
  • Assume you are a security professional. You are determining which of the following backup strategies will provide the best prote
    10·1 answer
  • What is the name of tool in number 9 picture? CAPITAL LETTER ONLY
    5·1 answer
  • What are some benefits that each computer system being used?
    12·2 answers
  • n (m,n) correlating branch predictor uses the behavior of the most recent m executed branches to choose from 2m predictors, each
    11·1 answer
  • Take values of length and breadth of a rectangle from the user and check if it is square or not.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!