1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stolb23 [73]
3 years ago
14

Whoever answers first gets lots of points

Computers and Technology
2 answers:
zimovet [89]3 years ago
8 0
Firssstttttt ayyyyyyeeeeeeeeeeeee
madreJ [45]3 years ago
5 0
I'm not first but hahaha
You might be interested in
Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne
vovikov84 [41]

Answer:

Randy should deploy SSH to allow the sales department to connect to the company network securely over cellular data signal.

Explanation:

Option A is the correct answer because SSH means Secure Shell. And Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Any network service can be secured with SSH

Option B is not correct because VPN mean virtual private network. And what VPN does is to extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Option C is not correct because IMEI means International Mobile Equipment Identity and is a number that is use to uniquel identify 3GPP and iDEN mobile phones, as well as some satellite phones.

Option D is not correct because POP3 is an example of email protocol. Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline.

4 0
3 years ago
If you ping a device, you are using the______protocol
meriva
Joystick..................:-)
6 0
3 years ago
Which of the following can a cell contain?
Ksju [112]
The answer is choice D-All of these :)
8 0
3 years ago
Read 2 more answers
Liam noticed someone had accessed his social media account and made several posts without his knowledge. Which of the following
jok3333 [9.3K]

Answer:

Liam could

1) Change the password

Be sure to change the password to a "strong" one (containing lots of characters, numbers, symbols) so that way the password would be difficult to guess.

2) Avoid logging onto social media on public computers or WiFi connections.

Using public WiFi leaves you vulnerable to someone accessing your information through Internet traffic. If you do use public computers, just make sure to log out.

3) Avoid giving out account information to friends and avoid opening suspicious links and emails.

Opening suspicious links or emails could allow malware to infect your computer the moment you open them. Friends can unknowingly share these links that are designed to steal information.

I hope this helped <3 please lmk if there's anything more to add.

4 0
3 years ago
1 paint 2 anahaw leaf 3 shellac 4 varnish 5 metal sheets 6 paint 7 G.I. pipe 8 enamel paint 9 bamboo 10 fillers
Aleksandr-060686 [28]

?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

8 0
2 years ago
Other questions:
  • ll of the following are extra precautions you can take to secure a wireless network EXCEPT ________. Select one: A. turn on secu
    9·1 answer
  • How many host ip addresses are available on a network with a subnet mask of 255.255.255.192?
    6·1 answer
  • The individual accountable for ensuring the day-to-day operation of the InfoSec program, accomplishing the objectives identified
    7·1 answer
  • Alexi is writing a program which prompts users to enter their age. Which function should she use?
    6·2 answers
  • An algorithm is:
    14·1 answer
  • Which of the following is a productivity strategy for collaboration?
    9·1 answer
  • Why is the Microsoft website considered the best source for information about pagefile.sys?​
    15·1 answer
  • Dragging a mouse over text is called
    9·1 answer
  • How do you delete questions you asked?
    7·2 answers
  • What is the action of extracting data fragments and then reassembling them in order to recover a file?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!