1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elenna [48]
4 years ago
9

When are computers most vulnerable to threats or damage?

Computers and Technology
1 answer:
valentinak56 [21]4 years ago
8 0
With virus protection
You might be interested in
The internet connects millions of computers connected through millions of ____ worldwide.
Rom4ik [11]
Servers is the correct answer
8 0
3 years ago
Which of the following technologies can operate in the 125 kHz to 134 kHz range?
Sophie [7]

Technologies that can operate in the 125 kHz to 134 kHz range is the

B. RFID

Explanation:

  • RFID is technology which works on radio frequency and it is used for the auto-identification for the different object.
  • The RFID system mainly consists of two parts. In this RFID system, this RFID reader continuously sends radio waves of a particular frequency
  • RFID is the use of radio waves to read and capture information stored on a tag attached to an object, providing a unique identifier for an object.
  • Active RFID tags have a transmitter and their own power source. Instead, they draw power from the reader, which sends out electromagnetic waves that induce a current in the tag's antenna.
  • Semi-passive tags use a battery to run the chip's circuitry, but communicate by drawing power from the reader.
  • Radio frequency identification (RFID) can operate in three frequency bands: 125 kHz to 134 kHz, 13.56 MHz, or 856 MHz to 960 MHz. Bluetooth is 2.4 GHz; NFC is 13.56 MHz; and LTE is between 600 MHz and 6 GHz.
7 0
3 years ago
Complete the concept map on computer as outlined below​
USPshnik [31]

Answer:

Here is your answer.

have a great day

6 0
3 years ago
We can harden a host by: a. Limiting physical access to it b. Turning off unnecessary services c. Installing patches d. All of t
Rina8888 [55]

Answer:

D

Explanation:

All three of A, B and C are required to harden a host. Thus, All of the above makes the best option.

Hardening simply refers to making your data impossible to be penetrated. More like bulletproof.

To do this, ensure measures like

- Regular Program cleanup

- Patches management

- service pack installation

- service or usage policies

...among others.

Cheers

3 0
3 years ago
The type of software used widely in businesses to complete specific tasks is _____. application software programming language sy
max2010maxim [7]
It is eather pythone or html
8 0
3 years ago
Read 2 more answers
Other questions:
  • which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi
    6·1 answer
  • In the game of economics, which player has the role of providing goods and services
    10·1 answer
  • 4. Scientists are not concerned with the human impact on the environment. True or False?
    6·2 answers
  • a) Before writing any code, you should go through a design process. Try to do so carefully – either follow a top-down approach,
    15·1 answer
  • Wireless data networks are particularly susceptible to known ciphertext attacks.
    10·1 answer
  • Please help it’s timed
    13·1 answer
  • (Comparable interface) Write Rectangle class that implements the Comparable interface. Override the equals method so that two Re
    12·1 answer
  • Write a paragraph discussing privacy issues on the internet<br> and their impact on human lives.
    9·1 answer
  • Briefly explain how Riboflavin deficiency lead to disease state.​
    15·1 answer
  • B. WAP to check whether input number is palindrome number or not using SUB...... END SUB.​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!