1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
3 years ago
11

How can security professionals use software to recover stolen laptops ?

Computers and Technology
1 answer:
inna [77]3 years ago
3 0

<u>Answer is:</u>

E). They monitor email traffic.

<u>Explanation:</u>


Track Your Device's IP Address with mail. If your laptop or smartphone was stolen, you can use a service like mail to find the IP address of your thief. When you log into those services from any computer, it logs the IP address used, and displays your last used IP in your account. So, these are source for finding the stolen laptop and smartphones.

I hope you got the idea. Thanks

You might be interested in
Suppose two hosts, A and B, are connected by a 10 Mbps link. The length of a packet is 12 Kb (Kilobits, i.e., 12 × 103 bits). Th
Alekssandra [29.7K]

Answer:

Answer is provided in the explanation section

Explanation:

Given data:

Bandwidth of link = 10* 106 bps

Length of packet = 12* 103 bits

Distance of link = 40 * 103m

Transmission Speed = 3 * 108 meters per second  

Formulas:

Transmission Delay = data size / bandwidth = (L /B) second

Propagation Delay = distance/transmission speed = d/s

Solution:

Transmission Delay = (12* 103 bits) / (10* 106 bps) = 0.0012 s = 1.2 millisecond

Propagation Delay = (40 * 103 meters)/ (3 * 108mps) = 0.000133 = 0.13 millisecond

4 0
4 years ago
P6. In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the CSMA/CA protocol for a second fr
Karo-lina-s [1.5K]

Answer:

To avoid collision of transmitting frames.

Explanation:

CSMA/CA, carrier sense multiple access is a media access control protocol of wireless networks that allows for exclusive transmission of frames and avoidance of collision in the network. When a frame is not being sent, nodes listening for an idle channel gets their chance. It sends a request to send (RTS) message to the access point. If the request is granted, the access point sends a clear to send (CTS) message to the node, then the node can transmit its frame.

Many nodes on a wireless network are listening to transmit frames, when a frame is transmitting, the node has to wait for the access point to finish transmitting, so it sends a RTS message again to exclusively transmit a second frame.

8 0
4 years ago
Which skill type refers to the knowledge and ability to perform a task?
Thepotemich [5.8K]

Sound, Audio for engineering sound Quality's.

7 0
3 years ago
Read 2 more answers
Consider the definition of the following class: (1, 2, 3, 5, 7) class productType //Line 1 { //Line 2 public: //Line 3 productTy
Shkiper50 [21]

Answer:

The C++ codes are given below with appropriate comments

Explanation:

// productType.h

#ifndef PRODUCTTYPE_H

#define PRODUCTTYPE_H

class productType

{

public:

productType();

productType(int , double ,double);

productType(string,int , double ,double);

productType(string,string,string,int , double ,double);

void set(string,string,string,int , double ,double);

void print() const;

void setQuantitiesInStock(int x);

int getQuantitiesInStock() const;

void updateQuantitiesInStock(int x);

 

void setPrice(double x);

double getPrice() const;

void setDiscount(double d);

double getDiscount() const;

 

 

 

private:

// Declaring variables

string productName;

string id;

string manufacturer;

int quantitiesInStock;

double price;

double discount;

};

#endif

=============================

// productType.cpp

#include <iostream>

using namespace std;

#include "productType.h"

productType::productType()

{

this->productName="";

this->id="";

this->manufacturer="";

this->quantitiesInStock=0;

this->price=0.0;

this->discount=0.0;

}

productType::productType(int quantitiesInStock, double price,double discount)

{

this->productName="";

this->id="";

this->manufacturer="";

this->quantitiesInStock=quantitiesInStock;

this->price=price;

this->discount=discount;

}

productType::productType(string productName,int quantitiesInStock, double price,double discount)

{

this->productName=productName;

this->id="";

this->manufacturer="";

this->quantitiesInStock=quantitiesInStock;

this->price=price;

this->discount=discount;

}

productType::productType(string productName,string id,string manufacturer,int quantitiesInStock, double price,double discount)

{

this->productName=productName;

this->id=id;

this->manufacturer=manufacturer;

this->quantitiesInStock=quantitiesInStock;

this->price=price;

this->discount=discount;

}

void productType::set(string productName,string id,string manufacturer,int quantitiesInStock, double price,double discount)

{

this->productName=productName;

this->id=id;

this->manufacturer=manufacturer;

this->quantitiesInStock=quantitiesInStock;

this->price=price;

this->discount=discount;

}

void productType::print() const

{

cout<<"Product Name :"<<productName<<endl;

cout<<"Id :"<<id<<endl;

cout<<"Manufacturer :"<<manufacturer<<endl;

cout<<"Quantities In Stock :"<<quantitiesInStock<<endl;

cout<<"Price :$"<<price<<endl;

cout<<"Discount :%"<<discount<<endl;

}

void productType::setQuantitiesInStock(int x)

{

this->quantitiesInStock=x;

}

int productType::getQuantitiesInStock() const

{

return quantitiesInStock;

}

 

void productType::setPrice(double x)

{

this->price=x;

}

double productType::getPrice() const

{

return price;

}

void productType::setDiscount(double d)

{

this->discount=d;

}

double productType::getDiscount() const

{

return discount;

}

void productType::updateQuantitiesInStock(int x)

{

this->quantitiesInStock=x;

}

=============================

// main.cpp

#include <iostream>

using namespace std;

#include "productType.h"

int main()

{

productType pt("Mobile","1234","Lenovo",34,1500,10);

pt.print();

 

pt.updateQuantitiesInStock(50);

cout<<"\nAfter Modifying the quantity ::"<<endl;

pt.print();

 

return 0;

}

6 0
4 years ago
When an event occurs, the agent logs details regarding the event. what is this event called?
Nimfa-mama [501]

If an event occurs, the agent logs details regarding the event. what is this event called GET.

The information in the agent log file is known to be the beginning of the log file, which is stated to show the agent's launch and handling of the services and configuration settings.

Keep in mind that the agent log also contains a history of the activities performed by the agent during runtime, along with any errors, and that it is utilised to investigate deployment issues.

As a result, if an event happens, the agent logs information about it. What is this GET event, exactly?

The agent monitoring services' startup and configuration settings are displayed at the log file's beginning. The sequence of agent runtime activity and any observed exceptions are also included in the agent log.

Learn more about agent logs:

brainly.com/question/28557574

#SPJ4

8 0
1 year ago
Other questions:
  • Operating systems such as Microsoft Windows use a specific character before a file extension to separate it from the filename. W
    9·2 answers
  • Consider the following statement: ptrMemberVarType objectThree(objectOne); The values of the member variables of objectOne are b
    10·1 answer
  • Anna's computer has slowed down. How might she improve her computer's performance?
    6·1 answer
  • Which organization has published more than 300 web standards
    7·1 answer
  • Write a function that creates a one-dimensional game board composed of agents of two different types (0 and 1, X and O, stars an
    11·1 answer
  • There is a class called Roster whose constructor takes a List of tuples with the names of students and their grades in the class
    13·1 answer
  • Using your computer for non-work activities while you are being paid to work is known as ________. Select one: A. cyber sleeping
    13·2 answers
  • In the following code, use a lock to protect any data that might need protecting. Keep your critical sections as small as possib
    8·1 answer
  • Given the following code:
    8·1 answer
  • Which tool is used to see the wireless networks in a given area?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!