1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trapecia [35]
3 years ago
5

Bob works in a small office with a network of computers. Bob, along with all the other employees, is responsible for securing hi

s own computer. This is an example of network security.
A. True.
B. False
Computers and Technology
1 answer:
miskamm [114]3 years ago
5 0

Answer:

False

Explanation:

When an employee becomes the one responsible for the security of His own computer then the scenario does not define Network security. Network security is a usage of hardware and related software to provide protection to the underlying network architecture from unauthorized access and other anomalies related to networks.

You might be interested in
What is a good way to become a game developer without spending a lot of money?
Stels [109]

Answer:

Codes

Explanation:

learn the codes first. when you're already expert, you'll find ways from there.

8 0
3 years ago
Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first
irinina [24]

Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first acknowledgement is lost, but the second acknowledgement arrives before the timer for the first segment expires is True.

True

<u>Explanation:</u>

In network packet loss is considered as connectivity loss. In this scenario host A send two segment to host B and acknowledgement from host B Is awaiting at host A.

Since first acknowledgement is lost it is marked as packet lost. Since in network packet waiting for acknowledgement is keep continues process and waiting or trying to accept acknowledgement for certain period of time, once period limits cross then it is declared as packet loss.

Meanwhile second comes acknowledged is success. For end user assumes second segments comes first before first segment. But any how first segment expires.

3 0
3 years ago
Desktop systems are invariably a better value than lighter, more mobile computers. true or false
vladimir1956 [14]
The answer is true. Desktop systems perform and serve a user better than those units that are lighter or mobilized (mobile computers). Desktop Systems or Desktop Computers, provide the user a better experience in terms of many things because Desktops provides better quality and better service.
6 0
3 years ago
Read 2 more answers
What language do computers use to process information?
patriot [66]

Answer:

binary language

Explanation:

5 0
3 years ago
3 Points
Levart [38]

Answer:

A

Explanation:

3 0
3 years ago
Other questions:
  • How to access Tor Browser on Android which is not rooted?
    7·1 answer
  • Data that are collected on large populations of individuals and stored in databases are referred to as _____.
    15·1 answer
  • Testing for information would be most likely to occur in which type of engineering?
    5·2 answers
  • The flynn effect best illustrates that the process of intelligence testing requires up-to-date ________
    14·1 answer
  • package dataStructures; /** * Class OrderedLinkedList. * * This class functions as a linked list, but ensures items are stored i
    8·1 answer
  • Fuction table of JK-Flip flop?
    11·1 answer
  • How do you do 3.4.5 Add parentheses for code hs? I need answers please
    15·2 answers
  • How many comparisons will be done to find 8 in this list using a linear search?
    8·1 answer
  • In this exercise you will debug the code which has been provided in the starter file. The code is intended to do the following:
    8·1 answer
  • An array name is a pointer constant because the address stored in it cannot be changed during runtime.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!