1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
8

Please help!!

Computers and Technology
1 answer:
vovikov84 [41]3 years ago
7 0

Answer:

I Don't Know if this is right, but for the first part it would be people making hype for a product so more people know about it.

Sorry thats all I got, but i saw u had no other answers so I hope this did You some good :(

You might be interested in
When troubleshooting firewalls, which of the following is not something you should do after you attempt a fix?
mart [117]

Answer:

a. make multiple fixes.

Explanation:

When we are troubleshooting firewalls we should not make multiple fixes after attempting a fix because it will not be beneficial for the security purpose.

We can repeat the failure after attempting the fix because we can fix it but a person with right mind won't be doing that.

We can test after each attempt that it is working properly.

We can also  reverse or undo the solution failures after making a fix.

5 0
3 years ago
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directl
34kurt

Answer:

The answer is "Remote access "

Explanation:

The capacity to access another computer or network that you do not have. Remote computer access provides an employee with remote access to the desktop and file. This assists an employee, for example, who works at home efficiently.

Remote users access documents or other resources on any network-connected device or server, enhancing organizational efficiency and increase there are to cooperate more interact with peers nation.

6 0
2 years ago
Protocol 2 - Check for Errors
Lapatulllka [165]

Please note that the Problem to be solved from Protocol 1 is not provided hence the general answers. To construct and send, open a network environment a single multi-packet message, simply click "Add Packet" and then click "Send at Once".

<h3>How will the receiver know the order of the packets or if any are missing?</h3>

If the text or message sent does not make any reading sense, or if certain words are jumbled and out of place, then it is clear that something is wrong.

If the messages arrive in a coherent fashion, then the packet was fully received.

<h3>How will the receiver request missed packets and what will the sender do in response?</h3>

Where the users are familiar with the Transmission Control Protocol, lost packets can be detected when there is a timeout. Lost packets are referred to as Dropped packets.

Learn more about Packets at:
brainly.com/question/17777733

7 0
1 year ago
"If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or hard
Jobisdone [24]

Answer:

It is  just true in most cases

Explanation:

This statement is just true in most cases because in some cases having a physical access to the computer or hard drive this does not guarantee access to the information contained in the hard drive or computer because the data/information in the hard drive or computer might as well be encrypted and would require a password in order to de-crypt the information.

Having a physical access is one step closer in some cases but not the only step required .

4 0
3 years ago
_________________ component defines the correct granularity for access controls and oversees the relationships between identitie
Otrada [13]

Answer:

<u>Authorization</u> component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

8 0
2 years ago
Other questions:
  • The North American Free Trade Agreement (NAFTA) among Canada, Mexico, and the United States is intended to _____.
    5·2 answers
  • Identify the parts used in an electric circuit- Tiles
    9·2 answers
  • Your organization issues devices to employees. These devices generate one-time passwords every 60 seconds. A server hosted withi
    15·1 answer
  • Pls Help Me!!!!!!!!!!! It won’t work when I connect to ITunes!
    12·1 answer
  • Instructions:Select the correct answer.
    9·1 answer
  • How do operating system work?
    5·1 answer
  • Write a program that asks the user for a word. Next, open up the movie reviews.txt file and examine every review one at a time.
    15·1 answer
  • A school has an intranet for the staff and students to use. Some of the files stored on the intranet are confidential. Give two
    15·1 answer
  • Topic: Video Games.
    7·1 answer
  • Which of these is a possible disadvantage of working with a team?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!