1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
coldgirl [10]
3 years ago
9

Select the correct answer.

Computers and Technology
2 answers:
Anit [1.1K]3 years ago
4 0

Answer: Steady OR Flashing

Explanation: If you are talking about the internet connection / power received lines One light should be Solid or "Steady" and the other usually green light will be flashing indicating that data is being transferred. Beware that just because the Orange light is Steady that does not mean that the internet is working that just means that it sees its connected.

My name is Ann [436]3 years ago
3 0

Answer:

steady

Explanation:

You might be interested in
True or false Encryption prevents hackers from hacking data?
nlexa [21]

Answer:

The answer here is False.

Explanation:

Encryption protects the data and not access to data.

In some cases, the hacker may not necessarily be trying to access or decrypt the data. They may prevent one from accessing it by placing a Ransomeware virus on it.

What a Ransomeware virus would do is to prevent the legal and rightful owner from accessing such data (whether encrypted or not) until their demands are met.

In many cases, they would ask for monies or cryptocurrencies.

Another way hackers attempt to get encrypted files is to try to get the decryption keys instead. The best practice against this is to keep decryption keys manually or in a password manager. Another way to protect very sensitive information is to have sensitive systems isolated from the internet.

Cheers

8 0
3 years ago
What is the name of the malware included in CCleaner?
Ludmilka [50]
I don't know the specific answer but this might help you 
https://www.pcworld.com/article/3225407/security/ccleaner-downloads-infected-malware.html
5 0
3 years ago
The false reject rate describes the number of legitimate users who are denied access because of a failure in the biometric devic
Eduardwww [97]

Answer: Rate

Explanation:

  • Rate is the one that is used to describe the number of legitimate users who are denied access because there is a failure happening in the biometric device and that type of failure is also known as Type I Error.

When it comes to hypothesis testing we can say that this kind of error is considering the rejection of the null hypothesis. On the other side, there is also Type II Error who is not rejecting the false null hypothesis and it is the opposite of a Type I Error.

4 0
3 years ago
An exact-match query is:
Greeley [361]

Answer:

C. Where a record is returned if its unique identifier matches the search value

Explanation:

Exact match is a Google keyword match type that allows you show your adverts when searcher type the exact word or phrase you are bidding on. An exact match query will always return records that matches what is being searched on.

5 0
3 years ago
A wall is built of bricks. What force is being applied to each brick from the bricks above? ​
ValentinkaMS [17]

Answer:

Gravitational Pull is the force that is being applied to each brick.

5 0
3 years ago
Other questions:
  • Monetary Policy can be either Expansionary or Contractionary. Which of the following actions classify as Expansionary Monetary P
    7·2 answers
  • While a hard drive is running, even a slight bump against the computer may cause the
    9·2 answers
  • When jump starting a vehicle , once the stalled vehicle is successfully started remove the cable in same order in which they wer
    13·1 answer
  • Basic engine operation can be divided into four stages. These stages are
    13·1 answer
  • In the context of information systems, which of the following is a disadvantage of prototyping? a. A prototype is more difficult
    8·1 answer
  • Which equation gives you the amount of work performed?
    13·1 answer
  • . Use of communications and information systems that are familiar to users is a part of which key principle? A. Security
    14·2 answers
  • Assignment 1 is to write a program that will write the lyrics to "X number of beers on the wall". Use only the main method. Prom
    11·1 answer
  • 3. In a 32-bit CPU, the largest integer that we can store is 2147483647. Verify this with a
    12·1 answer
  • If a pixel displayed on a screen has a red DN of 127, a green DN of 127, and a blue DN of 127, what color is the pixel
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!