1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liraira [26]
2 years ago
14

A business has recently deployed laptops to all sales employees. The laptops will be used primarily from home offices and while

traveling, and a high amount of wireless mobile use is expected.
To protect the laptops while connected to untrusted wireless networks, which of the following would be the best method for reducing the risk of having the laptops compromised?
A. MAC filtering
B. Virtualization
C. OS hardening
D. Application white-listing
Computers and Technology
1 answer:
lys-0071 [83]2 years ago
5 0

C. OS hardening.

Making an operating system more secure. It often requires numerous actions such as configuring system and network components properly, deleting unused files and applying the latest patches.

The purpose of system hardening is to eliminate as many security risks as possible. This is typically done by removing all non-essential software programs and utilities from the computer.

You might be interested in
Can someone please help me with this pleaseeeee
vladimir1956 [14]

Answer:

The answer of this question is given below into explanation section

Explanation:

answer (a)

I visited the carrerbuilder dot com and search for data entry job. The link of the posting is given below

https://www.careerbuilder.com/jobs?utf8=%E2%9C%93&keywords=data+entry&location=

answer(B)-Requirements of the the job

  • Previous office experience (data entry experience a plus)
  • Proficient with a computer and computer software (Excel knowledge required)
  • Excellent verbal and written communication skills
  • The ability to multi-task and work in a team-oriented environment
  • High School Diploma / G.E.D.
  • Ability to meet background check and drug screening requirements

answer(C)-Tasks of the job

  • Open, sort, and scan documents
  • Track all incoming supplies and samples
  • Data entry of samples that come in
  • Assist with documentation and maintaining of data
  • Prepare and label information for processing
  • Review and correct any data entry error or missing information

answer (d)

I have 3 years of experience in organization administration where I managed the organization data, generated reports and communicated verbally and written within the organization efficiently.

6 0
3 years ago
Question 5 (frue/False Worth 3 points)
azamat

<em><u>true</u></em>

Explanation:

<em><u>because</u></em><em><u> </u></em><em><u>logical</u></em><em><u> </u></em><em><u>errors</u></em><em><u> </u></em><em><u>are</u></em><em><u> </u></em><em><u>made</u></em><em><u> </u></em><em><u>to</u></em><em><u> </u></em><em><u>be</u></em><em><u> </u></em><em><u>unexpected</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>was</u></em><em><u> </u></em><em><u>before</u></em>

5 0
3 years ago
Write a JavaScript statement to convert "Information Technology" to uppercase.
OLEGan [10]

Answer:

The JavaScript  statement is

var str1 =    "Information Technology";

var result = str1.toUpperCase();

Explanation:

JavaScript  is used to validate the client side it means it provide the client side validation.

Following are the function of JavaScript that converted the string into uppercase.

 function val()

{

 var str1 = "Information Technology ";

 var result = str1.toUpperCase();

}

The toUpperCase() function convert the string into uppercase in JavaScript

OUTPUT  

INFORMATION TECHNOLOGY

4 0
2 years ago
Which is the most visual social media site?
Aleks04 [339]
Enge extrapolated this analysis across the 2.2 billion<span> users on Google and concluded that while the “active profiles” on Google+ amount to </span>111 million<span> users, only 6.7 million users have 50 or more posts ever, and only 3.5 million have 50 or more posts in the last 30 days</span>
3 0
3 years ago
you might propose a(n) program for your country if you wanted to hire a large number of manual laborers from neighboring countri
miskamm [114]

You might propose  guest worker program for your country if you wanted to hire a large number of manual laborers from neighboring countries to build a large dam or canal, with the understanding that they would not be granted any other privileges or legal status in your country, after the project is finished.

<h3>What is guest worker program?</h3>
  • In the absence of a ready supply of replacement workers, guest worker programs enable foreign workers to live and work temporarily in a host nation.
  • For temporary employment lasting less than a year, the United States now offers two guest worker programs: the H-2A program for temporary agricultural work and the H-2B program for temporary non-agricultural work.
  • Guest workers will be eligible for all federal programs, including Social Security and Medicare, if they are granted green cards. Additionally, low-skilled, low-income guest workers bring along their spouses and kids, who are enrolled in local schools and qualify for a variety of state benefits.

To learn more about  program refer to:

brainly.com/question/20534047

#SPJ4

4 0
10 months ago
Other questions:
  • One of the major advantages of digital photography is the ability to see the shot as soon as you take it.
    13·1 answer
  • ___ is a career discipline focusing on helping companies use computer technology effectively.
    12·1 answer
  • What would be one advantage and one risk of using an electric car?
    14·2 answers
  • What is an example of how pseudo - randomness is used to creative variation​
    5·1 answer
  • The difference between a for loop and a while loop is that a for loop is a loop that happens for a certain number of times. A wh
    14·1 answer
  • A(n) _____ is money paid for work.<br><br> A. raise <br> B. allowance<br> C. wage<br> D. grant
    14·2 answers
  • Which are two main areas of the properties inspector
    7·1 answer
  • Write an expression to compute the quartic root of x. the quartic root of a number is the square root of its square root. exampl
    11·1 answer
  • What are the tyoe of typical application of mainframe computer<br>​
    6·1 answer
  • Briefly describe the working of computer processing system?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!