1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
3 years ago
13

The local area network software called a ____ server provides workstations with the authorization to access a particular printer

, accepts and queues prints jobs, prints cover sheets, and allows users access to the job queue for routine administrative functions.​
Computers and Technology
1 answer:
Oksana_A [137]3 years ago
6 0

Answer:

I think Its a Wi-Fi

                         

You might be interested in
TRUE/FALSE QUESTIONS: T F 1. An intruder can also be referred to as a hacker or cracker. T F 2. Activists are either individuals
Law Incorporation [45]

Answer:

1. True 2. False 3. True 4. True 5. True 6. False 7. True

Explanation:

1.  A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.

2. Activists are people who campaign to bring about a positive political or social change.

3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.

4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.

5. Yes, intruders have a common attack methodology.

6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.

7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.

5 0
3 years ago
. The _____________ is the responsibility of the CISO, and is designed to reduce incidence of accidental security breaches by or
irinina [24]

Answer: SETA program

Explanation:

 The SETA program is basically stand for the security, education, training and awareness. It is basically used to reduce the accidental security which is break by the organization member such as employees, vendors and contractors.

The SETA program provided various benefits to the organization as it improve the behavior of the employees.It basically enhance the training and education program by focus and concentrate on the information security.

It can also inform he member of the organization about the report of violating many policies.

7 0
3 years ago
What ribbon contains the option to edit a font, including underlining?
ivanzaharov [21]
<span>Format ribbon. the ribbon containing options for formatting fonts. One can change case, style, bold, italics, underline etc using the short cut keys in the format ribbon or using the menu options provided in the ribbon. It is common for microsoft word or excel applications.</span>
8 0
4 years ago
What is the Median Pay of Advertising, Promotions, or Marketing Managers?
NemiM [27]

Answer:

it is 125.510$ per yr but try B see if its correct

6 0
3 years ago
Read 2 more answers
To use an outline for writing a formal business document, what should you
nydimaria [60]

Answer: D. enter each major point from the outline on a separate line

6 0
4 years ago
Other questions:
  • Gaven's instructor told him to include a personal statement in his work portfolio. Why did his instructor recommend including a
    6·1 answer
  • I don’t know technically
    9·2 answers
  • What is the slogan of the sociological school of criticism ?​
    9·1 answer
  • How do companies use web sites?
    6·1 answer
  • How does virtualization factor into a layered vs. non-layered design discussion?
    14·2 answers
  • 15. Write a program in python to read three numbers in three variables and swap first two variables with the sums of
    8·1 answer
  • Connect 5 LEDs with any random colors. Iteratively, turn ON 1 to 5 LED(s) that will take 5 iterations in total, and in every ite
    6·1 answer
  • A program that allows employees to choose their starting and ending times, as long as they are at work during a specified core p
    8·1 answer
  • What are the four steps for planning a table?​
    10·1 answer
  • Name:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!