1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
3 years ago
11

Which act will the person be punished by trying to obtain personal information employees illegally?

Computers and Technology
1 answer:
solong [7]3 years ago
3 0

Jail or something worse

You might be interested in
Var words = ["apple", "bug","car", "dream", "ear", "food"]
irina [24]

Answer:

B

Explanation:

I haven't taken cs principles, but i have taken cs a

is that python?

bug, car, ear are the only words less than 4 characters in legnth

5 0
3 years ago
Read 2 more answers
Examine the following output:
bixtya [17]

The report shows that SERVER1 has six active TCP connections. The first two are in the state TIME WAIT, the third is in the state CLOSE WAIT, and the final three are in the state ESTABLISHED.

TCP: What is it?

One of the key protocols in the Transmission control protocol / internet family is the Transmission Control Protocol. (TCP). It was first used to supplement the Internet Protocol in network protocol deployments (IP). TCP/IP is the name given to the full suite as a result. Software running on hosts communicating via an IP network can transmit a stream of octets (bytes) in a reliable, orderly, and error-checked manner using TCP. TCP is a key component of popular internet services like the World Wide Web mail, remote management, and file transfer.

To know more about TCP
brainly.com/question/28119964
#SPJ4

8 0
1 year ago
Four differences between fourth and fifth generation of computers​
Juliette [100K]

Answer:

 The following are the four difference between the fourth and the fifth generation of the computer that are:

  • The fourth generation computer technology is basically based of the microprocessor. On the other hand, the fifth generation computer is based upon the artificial intelligence technology.  
  • The fourth generation computer system are faster in computation. Whereas, the fifth generation computer are more reliable and faster in speed as compared to all other generations.
  • The fifth generation computer are small in the size and more potable as compared to the fourth generation computer system.
  • Laptop, notebook and Chromebook are some of the example of fifth generation. Whereas, STAR 100 and IBM 4341 are the example of fourth generation.
7 0
3 years ago
Computing devices translate digital to analog information in order to process the information
tester [92]

Complete Question:

Which of the following about computers is NOT true?

Group of answer choices.

A. Computing devices translate digital to analog information in order to process the information.

B. Computing devices are electronic.

C. The CPU processes commands.

D. The memory uses binary numbers

Answer:

A. Computing devices translate digital to analog information in order to process the information.

Explanation:

Computing is the process of using computer hardware and software to manage, process and transmit data in order to complete a goal-oriented task.

The true statements about computers are;

I. Computing devices are electronic: the components and parts which makes up a computer system are mainly powered by a power supply unit and motherboard that typically comprises of electronic components such as capacitors, resistors, diodes etc.

II. The CPU processes commands: the central processing unit (CPU) is responsible for converting or transforming the data from an input device into a usable format and sent to the output device.

III. The memory uses binary numbers: computer only understand ones and zeros.

5 0
3 years ago
Which command should you enter to configure a single port to discard inferior bpdus 200-125?
Airida [17]

Answer:

spanning-tree portfast bpduguard

Explanation:

spanning- tree protocol (STP) is a layer 2 protocol in the OSI model. It is automatically configured in a switch to prevent continual looping of BPDUs, to avoid traffic congestion. The fastport bpduguard is only applicable in non-trunking access in a switch. It is more secure to configure the fastport mode in switch port connected directly to a node, because there are still bpdus transfer in a switch to switch connection.

BPDUs Guard ensures that inferior bpdus are blocked, allowing STP to shut an access port in this regard.

8 0
3 years ago
Other questions:
  • Which of the following characteristics relates to authentication header (AH)? It is a document that defines or describes compute
    11·1 answer
  • Correspondence involves verbal communication. True False
    6·2 answers
  • There are ways to perform computer commands quickly and multiple times. <br> a. True <br> b. False
    11·2 answers
  • Two technicians are discussing the voltage measurements taken on the circuit below: V1 = 12Volts; V2 = 12Volts; V3 = 0Volts; V4
    11·1 answer
  • How do emotions affect purchasing decisions?
    6·1 answer
  • How do you change colors for presentation to blue warm in power point?
    11·1 answer
  • When you call a ____________ method, it executes statements it contains and then returns a value back to the program statement t
    6·2 answers
  • Which of the following are valid calls to Math.max? 1. Math.max(1,4) 2. Math.max(2.3, 5) 3. Math.max(1, 3, 5, 7) 4. Math.max(-1.
    9·1 answer
  • If you can name this you get 15 points: ↑↑↓↓←→←→βα
    10·1 answer
  • Write a FOR loop that displays the following numbers exactly like this (you must use a loop):
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!