1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
4 years ago
12

The MAA is responsible on a daily basis to protect office computers and patient records and personal information from hackers. R

esearch using Google or another search engine and briefly explain and list two things that you can do to protect these assets while using the computer or Internet.
Computers and Technology
1 answer:
d1i1m1o1n [39]4 years ago
3 0

Two things that I can do in order to protect these assets with the use of the computer or the internet is by first, downloading and using an antivirus software where this has the ability to protect the computer from invaders, hackers and other viruses that could get into the system of the computer. Second, making the data encrypted, so that it will be protected with a code to prevent other people who are trying to get in the data.

You might be interested in
the two main ways in which marketers address the competition with their strategies are by satisfying a need better than a compet
Nonamiya [84]

Offering a lower price (Apex)

4 0
3 years ago
Read 2 more answers
What Intel socket recommends the use of a liquid cooling system?
Komok [63]
The socket which Intel recommends that one should use with a liquid cooling system is LGA 2011. LGA 2011, also known as socket R is a CPU socket manufactured by Intel. It was released into the market in November 2011 and it replaced LGA 1366 and LGA 1567 in the performance and high end desk tops and server platforms. Socket R has 2011 pins that touch contact points on the underside of the processor.
7 0
3 years ago
Taylor develops a prototype for a new smartphone. It only includes code, a way to process the input, a memory card, and a microp
marysya [2.9K]

Answer:

i would say C.output

Explanation:

the program would be the code, the input would be the input, and the memory card would be the memory leaving the output as the only thing forgotten.

6 0
3 years ago
Read 2 more answers
What is a characteristic of an open software license
Darya [45]

Answer: Something people can change and share. It is usually given the bad name of have a bunch of fake information and bugs. Wikipedia is a good example of an open source website but it is not a program.

Explanation: An open source program is a program where you have free rein to basically do whatever you want to it.

3 0
3 years ago
Which of the following statements best describes O*NET OnLine?
irakobra [83]

The process that aids managers to better understand the processes through which they are performed most effectively by gathering and organizing detailed information about various jobs within an organization so that is called Job analysis and is performed by a job analyst in an organization. Occupational Information Network (O*Net) is a database that provides both basic and advanced job-analysis information; as such, IT can be viewed as an alternative to conducting job analysis. O*NET OnLine has detailed descriptions of the world of work for use by job seekers, workforce development and HR professionals, students, researchers, and more. It is a tool for career exploration and job analysis.

 

 

 





8 0
3 years ago
Other questions:
  • Query: [mcdonalds Austin] Viewport: Fresh User Location: within Houston, TX Result Returned: McDonalds location in a neighboring
    7·1 answer
  • We never need to use a forward declaration when invoking a public subprogram. true or false?
    15·1 answer
  • A document with a(n) ____ guarantees that the document was indeed sent by a specific individual and that it hasn t been tampered
    10·1 answer
  • There are varying definitions for the term "dumb terminal," but it often refers to the fact that the terminal has
    13·1 answer
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • What method is used to manage contention-based access on a wireless network?
    7·1 answer
  • If you're unsure if something
    9·2 answers
  • What is the value of numX when this program is executed? if 3 < 5 and 8 != 3: numX = 3 else: numX = 7
    13·2 answers
  • Describe the user interface in other high-technology devices commonly found in the home or office, such as a smartphone, HD tele
    13·1 answer
  • Need help finding the totals and with the empty spots
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!