1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka57 [31]
3 years ago
14

What: A challenging question on this module's material.

Computers and Technology
1 answer:
Alekssandra [29.7K]3 years ago
6 0

Need further information!!!

You might be interested in
Can anyone help me with these assignments??? Hands On Assignments- Insertion of Symbols, Special Characters, and Images.... and
Alekssandra [29.7K]

Answer:

yes send me the worksheet

Explanation:

5 0
3 years ago
Computing hardware, computers using vacuum tubes were called the first generation; transistors and diodes, the second; integrate
boyakko [2]
I think this is true but like think about the computer hardware and stuff
8 0
3 years ago
Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. Which Microsoft c
Lemur [1.5K]

Answer:

The command to use to check if he can connect to the server is the ping command.

Explanation:

The ping command is a network testing command to verify that one computer can reach or communicate with another computer on the network.

In Microsoft, the ping command is used in the command prompt window.

The ping command sends an Internet Control Message Protocol or ICMP Echo request or packets to another computer on the network and waits for a reply. The reply either informs you of the time it took to communicate with the other computer or inform you that there was no response.

4 0
3 years ago
Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t
Tems11 [23]

Answer:

Answer explained below

Explanation:

Think about all of the cloud services you use. How vulnerable are you right now to having your data stolen?

At its most basic level, “the cloud” is just fancy talk for a network of connected servers. (And a server is simply a computer that provides data or services to other computers). When you save files to the cloud, they can be accessed from any computer connected to that cloud’s network.

The cloud is not just a few servers strung together with Cat5 chords. Instead, it’s a system comprised of thousands of servers typically stored in a spaceship-sized warehouse—or several hundred spaceship-sized warehouses. These warehouses are guarded and managed by companies capable of housing massive loads of data, including the likes of Google (Google Docs), Apple (iCloud), and Dropbox.

So, it’s not just some nebulous concept. It’s physical, tangible, real.

When you save files to the cloud, you can access them on any computer, provided it’s connected to the Internet and you’re signed into your cloud services platform. Take Google Drive. If you use any mail, you can access Drive anywhere you can access your email. Sign in for one service and find your entire library of documents and photos in another.

Why are people concerned with cloud security?

It’s physically out of your hands.

You aren’t saving files to a hard drive at your house. You are sending your data to another company, which could be saving your data thousands of miles away, so keeping that information safe is now dependent on them. “Whether data is being sent automatically (think apps that sync to the cloud) or driven by users uploading photos to social media, the end result is that it’s all there somewhere being logged and stored,” says Jérôme Segura, Senior Security Researcher at Malwarebytes.

And that somewhere is a place that’s not in your direct control.

Risks of cloud storage

Cloud security is tight, but it’s not infallible. Cyber gurus can get into those files, whether by guessing security questions or bypassing passwords. That’s what happened in The Great iCloud Hack of 2014, where unwanted pictures of celebrities were accessed and published online.

But the bigger risk with cloud storage is privacy. Even if data isn’t stolen or published, it can still be viewed. Governments can legally request information stored in the cloud, and it’s up to the cloud services provider to deny access.

8 0
3 years ago
Angela's ready to get started with her first Smart Display campaign, but her account isn't yet eligible due to not having enough
Kisachek [45]

Answer:

At least 50 conversions on Display or at least 100 conversions on Search

Explanation:

Smart Display Campaigns by Google provides an intelligent and simply solution to help manage the complexities of display advertising, and is regarded as the easiest way to increase customer base and conversions. In order to set up a Smart Display Campaign, go to the Campaign tab in Google Adwords and go ahead to click on "create a new display campaign". It is important to be aware that to be eligible to run this solution, you are expected to have at least 50 conversions on display or 100 conversions on Search in the last 30 days.

3 0
3 years ago
Other questions:
  • What is the abbreviation used for educational sites/?
    8·1 answer
  • What type of firestopping technology expands as much as 25 times in volume?
    6·1 answer
  • A user can easily moved to the end of document by pressing what key combination?
    8·2 answers
  • what are Include the data on usage you gather from your interactions with friends or by listening to people on the radio or on T
    7·1 answer
  • The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
    7·1 answer
  • George works for a print newspaper in which of these areas would you be interested to hire new recruits for the newspaper WHICH
    11·1 answer
  • Que significa WWW en informática ._.​
    11·1 answer
  • What is the output?
    7·1 answer
  • Cottonisagoodreflectorofsound​
    6·2 answers
  • What is 2+2 I need to know hurry
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!