1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
3 years ago
14

Without a/an ________. a computer is useless

Computers and Technology
1 answer:
Len [333]3 years ago
3 0
Without a/an Operating system. a computer is useless
You might be interested in
___ are limited computers because they are placed inside devices which require specific computing functions
Pachacha [2.7K]

I guеss thе cοrrеct answеr is Еmbеddеd systеms  

An еmbеddеd systеm is a prοgrammеd cοntrοlling and οpеrating systеm with a dеdicatеd functiοn within a largеr mеchanical οr еlеctrical systеm, οftеn with rеal-timе cοmputing cοnstraints. It is еmbеddеd as part οf a cοmplеtе dеvicе οftеn including hardwarе and mеchanical parts.

3 0
3 years ago
The_provides access to the internet may also be internal​
fgiga [73]

Local Area Network (LAN), Hope this helps

4 0
3 years ago
Which two options are negotiated via ncp during the establishment of a ppp connection that will use the ipv4 network layer proto
liberstina [14]
<span>NCP are protocols that are used for establishing PPP sessions. </span>During the establishment of a PPP connection that will use the IPv4 network layer protocol the following options are negotiated: the algorithm to compress TCP and IP headers and the IPv4 address used for routing IP over the PPP link.

6 0
3 years ago
I need a free flashdrive can anyone tell me any website links so i can get one for free????​
olga55 [171]

Answer:

wish

Explanation:

look for one that is free

4 0
3 years ago
Your network employs basic authentication that centers on usernames and passwords. However, you have two ongoing problems. The f
Agata [3.3K]

Answer:

Using a one time password OTP and using a three factor authentication.

Explanation:

Social engineering is a form system and network attack, drafted by an attacker, to steal user credentials needed for accessing their accounts, to steal information.

Social engineering attacks like phishing, spear phishing, baiting and quid quo pro are used to fool users to giving out their user details.

One time password is an implied use of a password just once and a new password his generated to boost security. In a three factor authentication, OTP can be used as well as biometrics of a user which can not be giving away by a user to an attacker.

8 0
3 years ago
Other questions:
  • Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
    9·1 answer
  • There are a multitude of items that Cyber Security professionals view as attack vectors but none are more prevalent and exploita
    13·1 answer
  • Over the last few years, security cameras and other devices have become more common. Some people argue that these measures viola
    14·2 answers
  • jason works for a restaurant that serves only organic local produced what trend is this business following?
    6·2 answers
  • I am bad with excell pleasee heelp
    15·1 answer
  • You have imported a library with the birthMonth() function. Based on the API, how many strings are inputed to calculate the birt
    11·1 answer
  • La estructura basica de una pagina web en Html​
    11·1 answer
  • What are the different types of monitors?
    8·1 answer
  • Where to get industrial circuits far cry 6
    8·1 answer
  • Which element of the MakeCode Arcade interface represents an individual
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!