1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reptile [31]
3 years ago
8

The protections from the security software must continue when the device is taken off the network, such as when it is off-grid,

or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device?
Computers and Technology
1 answer:
snow_lady [41]3 years ago
3 0

Answer:

third ighjojdudjz

ghddduewjj

wkckdjjj

Explanation:

cchmddkhwmx

ndhdnahdd

jruditndjed

You might be interested in
A virus is a self-replicating program that produces its own code by attaching copies of it into other executable codes.
Allisa [31]

Answer: Stealth/Tunneling Virus

Explanation: Stealth or tunneling virus are the virus which are responsible for attacking a computer system which causes the problem in the functioning of the operating system by manipulating files, creating partition etc.

These viruses try to avoid or prevent the anti-virus scans for the detection any sort of virus or error . They act to prevent any malfunction detection by taking charge for the anti-virus operation.

5 0
3 years ago
Aspiring graphic designers can earn a(n) certification for graphic design software, such as Photoshop and Acrobat.
kobusy [5.1K]

<u>Answer is:</u>

Yes, they earn a certification as a graphic designer


<u>Explanation:</u>

And they can do everything that graphic designer do, so that is why they earn a certification of a graphic designer such as Photoshop and adobe illustrator.

I hope you got the answer well. Thanks

5 0
3 years ago
Read 2 more answers
Data mining must usestatistics to analyze data.<br> True<br> False
Rasek [7]

Answer: True

Explanation: In data mining, they use statistics component for the analyzing of the large amount of data and helps to deal with it. Statistics provide the techniques for the analyzing, evaluating and dealing with the data that is known as data mining.Data statistics provide the help to organize large data in a proper form and then analyze it. Thus, the statement given is true that data mining must use statistics to analyse data.

4 0
3 years ago
 How does critically analyzing technology add value to interactions with people in personal and professional contexts?
AysviL [449]

Answer:

Critically analyzing technology helps realize the need for improvement, extension and creativity that technology can bring towards advancement basically both for personal interactions and in professional settings.

Explanation:

It's helps build the need of Technological inclusion for productivity. Thank you.

8 0
3 years ago
Read 2 more answers
Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?
defon

Performance monitor tool can you use to display hardware utilization statistics.

<h3>what is a performance Monitor?</h3>
  • Performance Monitor is a system monitoring program introduced in Windows NT 3.1. It monitors various activities on a computer such as CPU or memory usage.

To learn more about performance monitoring, refer

to brainly.com/question/12960090

#SPJ4

7 0
2 years ago
Other questions:
  • Suppose an array with six rows and eight columns is stored in row major order starting at address 20 (base 10). If each entry in
    8·1 answer
  • When a crystal grows in unrestricted space, how does growth occur?
    14·2 answers
  • E-fit and similar software compares what?
    7·1 answer
  • You can tell that the equals() method takes a ____ argument because parentheses are used in the method call.
    6·1 answer
  • 5. The stage of engine operation when both the intake and exhaust valves are closed is the _______ stage.
    5·1 answer
  • If you will be giving your presentation to an audience, you can practice your presentation by using View, ___________, to rehear
    14·1 answer
  • Which of the following statements is correct?
    11·1 answer
  • __________ are hosted on dedicated computers known as 'web servers'.​
    8·2 answers
  • When you are working in Performance Monitor, in the "Add Counters" dialog box, and need more information about a particular coun
    8·1 answer
  • The second generation of computer languages is a higher-level language than
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!