1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harlamova29_29 [7]
2 years ago
6

Which of the following is not an interconnector?

Computers and Technology
1 answer:
igor_vitrenko [27]2 years ago
3 0

The following is not an interconnector :

A wireless keyboard jack

Explanation:

  • An interconnector is a structure which enables energy to flow between networks.
  • An electrical or optical connection or cable that connects two separate devices.
  • Since a wireless device does not have a cable connecting the two, they are not an interconnector.
  • The cable that connects your monitor or hard drive to the computer system is called an interconnect.
  • Switches can be used to connect together a number of end-user devices such as workstations, or to interconnect multiple network segments.
  • A standard computer system will contain multiple interconnects.
You might be interested in
Which model represents any process in general?
Readme [11.4K]

Answer: A. universal

Explanation: correct on Plato

5 0
2 years ago
Help please fast
Pachacha [2.7K]
Bookmark because you can go back to it at any given time to re use it
4 0
2 years ago
Read 2 more answers
4.2 lesson practice help plzs
sertanlavr [38]

The output is 21 because c is incremented by 3 until it surpasses 10 and the value of c is added to sum each time the loop runs.

I hope this helps!

8 0
2 years ago
Any malware software that covertly gathers user information without the user s knowledge, is known as ______ .
shusha [124]
It be known as spyware
3 0
3 years ago
In 200 words or more, please describe the Cyber Security Enhancement Act. Include when it was implemented and what it's purpose
makvit [3.9K]

Answer:

The summary below was written by the Congressional Research Service, which is a nonpartisan division of the Library of Congress.

12/18/2014--Public Law. (This measure has not been amended since it was passed by the Senate on December 11, 2014. The summary of that version is repeated here.)

Cybersecurity Enhancement Act of 2014 - Title I: Public-Private Collaboration on Cybersecurity - (Sec. 101) Amends the National Institute of Standards and Technology Act to permit the Secretary of Commerce, acting through the Director of the National Institute of Standards and Technology (NIST), to facilitate and support the development of a voluntary, consensus-based, industry-led set of standards and procedures to cost-effectively reduce cyber risks to critical infrastructure.

Requires the Director, in carrying out such activities, to: (1) coordinate regularly with, and incorporate the industry expertise of, relevant private sector personnel and entities, critical infrastructure owners and operators, sector coordinating councils, Information Sharing and Analysis Centers, and other relevant industry organizations; (2) consult with the heads of agencies with national security responsibilities, sector-specific agencies, state and local governments, governments of other nations, and international organizations; (3) identify a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, that may be voluntarily adopted by owners and operators of critical infrastructure to help identify, assess, and manage cyber risks; and (4) include methodologies to mitigate impacts on business confidentiality, protect individual privacy and civil liberties, incorporate voluntary consensus standards and industry best practices, align with international standards, and prevent duplication of regulatory processes.

Prohibits the Director from prescribing a specific solution or requiring that products or services be designed or manufactured in a particular manner.

Prohibits information provided to NIST for purposes of developing cyber risk standards from being used by federal, state, tribal, or local agencies to regulate the activity of any entity.

Directs the Comptroller General (GAO) to submit biennial reports over a specified period concerning NIST's progress in facilitating the development of such standards and procedures. Requires such reports to address the extent to which such standards: (1) are voluntary and led by industry representatives, (2) have been promoted by federal agencies and adopted by sectors of critical infrastructure, and (3) have protected against cyber threats. Instructs the Comptroller General to include in such reports an assessment of the reasons behind decisions of sectors to adopt or not adopt such standards.

Title II: Cybersecurity Research and Development - (Sec. 201) Directs the following agencies, working through the National Science and Technology Council and the Networking and Information Technology Research and Development Program, to develop, and update every four years, a federal cybersecurity research and development strategic plan:

Explanation:

4 0
2 years ago
Other questions:
  • If you want to use your computer for recording your band, you would benefit most from a(n)
    13·2 answers
  • Select all that apply.
    15·2 answers
  • Which style of leadership would be most helpful to Charles in the following situation? Charles has just started an internship at
    15·1 answer
  • Complete the paragraph describing characteristics of an audio mixer
    8·2 answers
  • In the game of $Mindmaster$, secret codes are created by placing pegs of any of seven different colors into four slots. Colors m
    5·1 answer
  • Your disaster recovery plan calls for tape backups stored at a different location. The location is a safe deposit box at the loc
    13·1 answer
  • The process of identifying and removing logical errors and runtime errors is called ..............
    5·2 answers
  • E commerce is the demand of modern society both for time and money
    14·2 answers
  • Lily obtained data from five trails 50 kcal 72 kcal 12 kcal and 50 kcal which best decribes her data
    11·1 answer
  • Which of the following expressions in Java is equal to 4?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!