1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnoma [55]
3 years ago
9

9. Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when travel

ing overseas. Instead, they bring loaner devices and follow strict security procedures including not connecting to their domestic network while out of the country. T/F
Computers and Technology
1 answer:
tatuchka [14]3 years ago
3 0

Answer:

True

Explanation:

It is known as Don-Not-Carry rules are implemmented to avoid

-Unauthorized full disk copies (it have been made while the laptop owner was out of the hotel room on overseas travel)

-Laptops steals

- Monitoring by third parties of wireless using.

You might be interested in
What is pseudocode? O A way of describing a set of instructions in text form using plain english O A diagrammatic representation
Marat540 [252]

The definition of pseudocode is that; A: A way of describing a set of instructions in text form using plain English

<h3>What is Pseudocode? </h3>

In computer science, pseudocode is defined as a plain language description of the steps in an algorithm or another system.

Now, the way Pseudocode works is that it often makes use of structural conventions of a normal programming language to be utilized for human reading instead of machine reading.

Pseudocode usually omits details that are essential for machine understanding of the algorithm, such as variable declarations and language-specific code.

Read more about Pseudocode at; brainly.com/question/11623795

8 0
3 years ago
What does the hard drive do
Gnoma [55]

The most important characteristic of a hard drive is how much data the hard drive can store, referred to as the storage capacity. A typical internal hard drive for a new desktop computer or laptop has a storage capacity of several hundred gigabytes

8 0
4 years ago
Read 2 more answers
What is a technology?​
Leokris [45]

Answer:

The definition of technology is science or knowledge put into practical use to solve problems or invent useful tools

                                                    OR

Technology is the sum of techniques, skills, methods, and processes used in the production of goods or services or in the accomplishment of objectives, such as scientific investigation

7 0
3 years ago
What is an Integrated Development Environment (IDE)?
kogti [31]

Answer: A diverse workplace for software developers

6 0
3 years ago
In numerical methods, one source of error occurs when we use an approximation for a mathematical expression that would otherwise
Shtirlitz [24]

Answer:

The function in Python is as follows:

import math

import numpy as np    

def exp(x):

   mylist = []

   for n in range(10):

       num = (x**n)/(math.factorial(n))

       mylist.append([num])

   exp_approx = np.asarray(mylist)

   sum = 0

   for num in exp_approx:

       sum+=num

   return sum

Explanation:

The imports the python math module

import math

The imports the python numpy module

import numpy as np    

The function begins here

def exp(x):

This creates an empty list

   mylist = []

This iterates from 0 to 9

   for n in range(10):

This calculates each term of the series

       num = (x**n)/(math.factorial(n))

This appends the term to list, mylist

       mylist.append([num])

This appends all elements of mylist to numpy array, exp_approx

   exp_approx = np.asarray(mylist)

This initializes the sum of the series to 0

   sum = 0

This iterates through exp_approx

   for num in exp_approx:

This adds all terms of the series

       sum+=num

This returns the calculated sum

   return sum

3 0
3 years ago
Other questions:
  • What movie won best picture oscar for 1990
    14·2 answers
  • Which is a good plan for backing up data?
    6·1 answer
  • Which firewall has a network interface located in a unique network segment that allows for true isolation of the segments and fo
    9·1 answer
  • Complete function PrintPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "To
    5·1 answer
  • Que quiere decir analogico
    6·1 answer
  • A question to determine your ability to use the reference materials effectively. Your boss has determined that you will be using
    9·1 answer
  • Write a method named addCommas that accepts a string representing a number and returns a new string with a comma at every third
    10·1 answer
  • Which data type is used to teach a Machine Learning (ML) algorithm during structured learning?
    12·1 answer
  • How can touch typing increase productivity of a business?
    15·2 answers
  • What information most likely presents a security risk on your personal
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!