1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FinnZ [79.3K]
3 years ago
14

How do networks help protect data?

Computers and Technology
1 answer:
klasskru [66]3 years ago
7 0
Network Security. Network Security protects your network from common security threats like viruses, worms, trojans, spyware, adware, identity theft, denial of service attacks and more. To protect yourself you could install an anti-virus/anti-spyware software like Kaspersky or Malwarebytes.
You might be interested in
A __________network is useful for connecting a small network. campus area local area wide area system area
12345 [234]

WLAN (Wireless Local Area Network) helps you to link single or multiple devices using wireless communication within a limited area like home, school, or office building.

<h3>What is communication ?</h3>

It is said that communication is "an apparent remedy to the unpleasant divisions between self and other, private and public, and inner thought and outer world" (from the Latin communicare, meaning "to share" or "to be in relation with").

As this definition makes clear, it is challenging to consistently define communication because, in everyday usage, the term refers to a very broad spectrum of various behaviors involved in the spread of information. According to John Peters, the challenge in defining communication arises from the fact that it is both a universal phenomenon (because everyone communicates) and a distinct academic profession with institutionalized research.

To learn more about communication from the given link:

brainly.com/question/26152499

#SPJ4

5 0
2 years ago
What is the purpose of an attribute in HTML
bearhunter [10]
Most of the HTML tags can also have attributes, which are extra bits of information
8 0
3 years ago
Read 2 more answers
Which of the following would NOT be considered an agricultural pest?
Komok [63]
A dog laying amongst the crops would not be a pest, so the correct choice would be the first one.
4 0
3 years ago
Read 2 more answers
Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional
Artist 52 [7]

Answer:

All of the above.

Explanation:

You shouldn't be doing any of these things using your employer's computer networks, even if there aren't any explicit rules against them. For one thing, your usage of company systems and networks is being continuously monitored, so you can forget about trying to get away with it. Checking social media and surfing the internet can expose parts of your personal life that you don't want anyone else to see, and downloading <em>anything</em> from <em>anywhere</em> is dangerous, especially if you're pirating music from some backwater site where adult sites and survey scams are waiting to bombard the whole network with pop-up ads. You should always do these things on your personal devices while connected to your personal home network.

4 0
3 years ago
The purpose of this programming project is to demonstrate a significant culmination of most constructs learned thus far in the c
Oksana_A [137]

Answer:

Java program explained below

Explanation:

here is your files : ----------------------

Word.java : --------------

import java.util.*;

public class Word implements Comparable<Word>{

private String normal;

private String canonical;

public Word(){

 normal = "";

 canonical = "";

}

public Word(String norm){

 setNormal(norm);

}

public void setNormal(String norm){

 normal = norm;

 char[] arr = norm.toCharArray();

 Arrays.sort(arr);

 canonical = new String(arr);

}

public String getNormal(){

 return normal;

}

public String getCanonical(){

 return canonical;

}

public int compareTo(Word word){

 return canonical.compareTo(word.getCanonical());

}

public String toString(){

 return "("+normal+", "+canonical+")";

}

}

AnagramFamily.java : ------------------------------

import java.util.*;

public class AnagramFamily implements Comparable<AnagramFamily>{

private LinkedList<Word> words;

private int size;

private class WordComp implements Comparator{

 public int compare(Object o1,Object o2){

  Word w1 = (Word)o1;

  Word w2 = (Word)o2;

  return w2.getNormal().compareTo(w1.getNormal());

 }

}

public AnagramFamily(){

 words = new LinkedList<>();

 size = 0;

}

public LinkedList<Word> getAnagrams(){

 return words;

}

public void addAnagram(Word word){

 words.add(word);

 size++;

}

public void sort(){

 Collections.sort(words,new WordComp());

}

public int getSize(){

 return size;

}

public int compareTo(AnagramFamily anag){

 Integer i1 = new Integer(size);

 Integer i2 = new Integer(anag.getSize());

 return i2.compareTo(i1);

}

public String toString(){

 return "{ Anagrams Family Size : "+size+" "+words.toString()+"}";

}

}

WordMain.java : ------------------------------

import java.util.*;

import java.io.File;

import java.io.PrintWriter;

public class WordMain{

public static void readFile(LinkedList<Word> words){

 try{

  Scanner sc = new Scanner(new File("words.txt"));

  while(sc.hasNext()){

   words.add(new Word(sc.next()));

  }

  sc.close();

 }catch(Exception e){

  e.printStackTrace();

  System.exit(-1);

 }

}

public static void findAnagrams(LinkedList<AnagramFamily> anagrams,LinkedList<Word> words){

 Iterator<Word> itr = words.iterator();

 while(itr.hasNext()){

  Iterator<AnagramFamily> aitr = anagrams.iterator();

  Word temp = itr.next();

  System.out.println(temp);

  boolean st = true;

  while(aitr.hasNext()){

   AnagramFamily anag = aitr.next();

   Iterator<Word> anags = anag.getAnagrams().iterator();

   while(anags.hasNext()){

    Word t1 = anags.next();

    if(t1.compareTo(temp) == 0 && !t1.getNormal().equals(temp.getNormal())){

     anag.addAnagram(temp);

     st = false;

     break;

    }

   }

   anag.sort();

  }

  if(st){

   AnagramFamily anag = new AnagramFamily();

   anag.addAnagram(temp);

   anagrams.add(anag);

   System.out.println(anag);

  }

 }

}

public static void writeOutput(LinkedList<AnagramFamily> anagrams){

 try{

  PrintWriter pw = new PrintWriter(new File("out6.txt"));

  Collections.sort(anagrams);

  int i = 0;

  Iterator<AnagramFamily> aitr = anagrams.iterator();

  while(i < 5 && aitr.hasNext()){

   AnagramFamily anag = aitr.next();

   anag.sort();

   pw.println(anag);

   i++;

  }

  aitr = anagrams.iterator();

  pw.println("\n\nAnagramsFamily size 8 datas : ");

  while(aitr.hasNext()){

   AnagramFamily anag = aitr.next();

   anag.sort();

   if(anag.getSize() == 8){

    pw.println(anag);

   }

  }

  pw.close();

 }catch(Exception e){

  e.printStackTrace();

  System.exit(-1);

 }

}

public static void main(String[] args) {

 LinkedList<Word> words = new LinkedList<>();

 readFile(words);

 Collections.sort(words);

 //System.out.println(words.toString());

 LinkedList<AnagramFamily> anagrams = new LinkedList<>();

 findAnagrams(anagrams,words);

 //System.out.println(anagrams.toString());

 writeOutput(anagrams);

}

}

8 0
3 years ago
Other questions:
  • Marco makes $65,000 a year as a graphic designer. He makes a charitable donation of $1,000 each year. He also has $5,000 of busi
    12·2 answers
  • Suppose a subnet has a prefix 128.119.44.128/26. Give an example of an IP address from this subnet. If an ISP owns a block of ad
    14·2 answers
  • 1.the following code example would print the data type of x, what data type would that be?
    12·1 answer
  • Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
    8·1 answer
  • 1. Haruto was a programmer working in the early 2000s. Which kind of program or language was
    5·1 answer
  • Is MS DOS a network operating system?​
    10·1 answer
  • PLEASE HELP!!!!!!!!!!
    6·2 answers
  • Sara would like to begin creating macros in Excel 2016. Where can she find the ability to launch the Macro dialog box?
    6·2 answers
  • Chloe is not pleased with how four images that she has placed on a web page relate to each other. Which search string will be mo
    5·1 answer
  • Discusse five advantages of utilising DBMS over a file based system
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!