1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reptile [31]
3 years ago
8

The protections from the security software must continue when the device is taken off the network, such as when it is off-grid,

or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device?
Computers and Technology
1 answer:
snow_lady [41]3 years ago
3 0

Answer:

third ighjojdudjz

ghddduewjj

wkckdjjj

Explanation:

cchmddkhwmx

ndhdnahdd

jruditndjed

You might be interested in
What are work incidents/situations or ethical problem?<br>​
777dan777 [17]

5 Common Ethical Issues in the Workplace

Unethical Leadership.

Toxic Workplace Culture.

Discrimination and Harassment.

Unrealistic and Conflicting Goals.

Questionable Use of Company Technology.

7 0
3 years ago
Read 2 more answers
A Network Management Station (NMS) is using SNMP to manage some Cisco routers and switches with SNMPv2c. Which of the following
Rom4ik [11]

Answer:

b. Using either the read-write or read-only community string.

Explanation:

The SNMP agent on a router authenticates any SNMP Get requests received from the NMS using either the read-write or read-only community string.

In the SNMPv2c, if the NMS sends either the read-write or read-only community string requests, SNMP Get requests will be allowed.

7 0
3 years ago
Read 2 more answers
Information that indicates ground air or navy force levels or dispositions is what security?
AlexFokin [52]

Information that indicates ground air or navy force levels or dispositions is <u>confidential</u> security.

Security for a country's higher organizations is essential for a nation's protection.

Serious information like the nuclear organizations, army, navy, and ground air is at a higher risk for threats and hence requires higher security.

The information in such higher organizations is kept confidential and no third person is allowed access to the code of conduct of such organizations.

If information is leaked from the ground air or from navy force levels then there can be serious consequences for it. Hence, such information is always kept under confidential security.

To learn more about security, click here:

brainly.com/question/25375059

#SPJ4

8 0
2 years ago
What is mean by sole trading concern?​
DENIUS [597]

Answer:

trading as a whole

Explanation:

pls give brainlest almost lvled up.

6 0
3 years ago
Wht is RAM called Random Access memory and ROM IS called Read only memory​
nasty-shy [4]

Answer: Computer memory is of two basic type – Primary memory(RAM and ROM) and Secondary memory(hard drive,CD,etc.). Random Access Memory (RAM) is primary-volatile memory and Read Only Memory (ROM) is primary-non-volatile memory.

Explanation: Hope this helps :)

6 0
3 years ago
Other questions:
  • Convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920​
    12·1 answer
  • Suppose that a local area network requires seven letters for user names.​ lower- and uppercase letters are considered the same.
    13·1 answer
  • What is search engine
    15·2 answers
  • What is the purpose of filters in a data base
    11·1 answer
  • An athlete runs every day for five days. Write a program that computes the total distance and average distance ran by the athlet
    10·1 answer
  • Given :an int variable k,an int array currentMembers that has been declared and initialized ,an int variable nMembers that conta
    12·1 answer
  • Which type of function distill the information contained within a file (small or large) into a single fixed-length number, typic
    14·1 answer
  • 20 points
    6·2 answers
  • How does the technology work
    10·2 answers
  • Which one of these are a valid IPv4 address?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!