1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katovenus [111]
3 years ago
15

2 reasons why someone might want to alter data on someone else’s computer

Computers and Technology
1 answer:
IRINA_888 [86]3 years ago
6 0

Answer:

1. Looking at someone else's files.

2. To hack into the bank's computer and wanting to increase the amount in your account.

You might be interested in
The specific term for expediting the delivery of software by breaking a task into smaller increments is called
Ksivusya [100]
Rapid Application Development is the specific term
8 0
3 years ago
When inserting a fly in animation what is the first step in the process?
weqwewe [10]

Answer:

you select the element you wish to animate

6 0
3 years ago
A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it ma
Rashid [163]

Answer:

Blocking Mode    

Explanation:

Spanning Tree Protocol is used to allow path redundancy in the network without creating cycles/circles also called loops.

When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.

This affects the performance of the network as the result of broadcast packets flooding.

STP puts one port of the switch to forwarding mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to blocking mode and the one port that is left after this is placed in forward mode.

Spanning Tree Algorithm is used by STP to determine the optimal path  of switch to the network.

Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.

This information helps STP to eliminate the redundant paths.

So this is how STP allows only one active path to the destination while blocking all other paths to avoid switching loop.

6 0
3 years ago
The area that holds all the startup instructions the computer needs to start is the
Zigmanuir [339]
The area that holds all the startup instructions the computer needs to start is the ROM, or read-only memory. 
8 0
3 years ago
Do people answer questions more on this site or be on social more ??? no right or wrong answer your opinion
Sindrei [870]
It really depends on the person
3 0
3 years ago
Other questions:
  • would specify that only selected members of the payroll and human resources department would have the right to change sensitive
    11·1 answer
  • A c++ member function that uses, but does not change, the value of a member variable is called
    13·1 answer
  • Give an example of an input device, an output device, a storage device, and a networking device.
    10·1 answer
  • A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic o
    9·1 answer
  • The benefits of flextime include:
    11·2 answers
  • "This part of the computer fetches instructions, carries out the operations commanded by the instructions, and produces some out
    15·1 answer
  • Blank determines the overall brightness or darkness of an entire image
    5·1 answer
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    5·1 answer
  • PLS HURRRYYYYYY!1!1!1!1!1
    5·2 answers
  • TECHNICAL TERMS: the adderess of a website
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!