1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
3 years ago
8

Which statement best describes network security

Computers and Technology
2 answers:
ExtremeBDS [4]3 years ago
7 0
That would depend on the type of network.

I would say that the answer is B, because if no one had authorization to use it, should it have even been implemented in the first place?
Andreyy893 years ago
3 0
<span>B.network security means all personal information is kept safe the network is not compromised and only authorized users had access 

Im pretty sure they ment has instead of had</span><span />
You might be interested in
Select the correct answer.
sashaice [31]

Answer:

A. Project Manager

Explanation:

3 0
3 years ago
Read 2 more answers
Which software application is most appropriate for creating slideshows using text, charts, photographs, clip art, and video? dat
Daniel [21]
I'd say powerpoint I always use this to show graphs and stuff
4 0
3 years ago
Read 2 more answers
Luis got himself in trouble by accidentally sending an e-mail to a client instead of his coworker. He resolved to be more carefu
Elodia [21]

Answer:

Explanation:

There are two main practices that Luis needs to make into a habit of doing every time he sends an e-mail, these are

  • Being careful when using the Reply to All feature.
  • Double-checking the Cc and Bcc fields.

Taking into account both of these practices will make sure that Luis is sending the written e-mail to the correct individual's address and also making sure that he is not sending the e-mail to any other individual by accident when using the Reply to All feature.

7 0
3 years ago
A domain name points to a specific internet address known as a? A. Domain name B. User name C. URL D. IP address
hodyreva [135]
C, URL since the other options aren’t addresses at all
6 0
4 years ago
QlVEQkNjQWdERnpsSnJnVkJIMDVSbWtDK2ttZ1RSQzNEejJESkNhT20raEhqTWR3UFNINnVpaGk3YjhW
Misha Larkins [42]
Sure, it says "Hulk smash on keyboard"
8 0
3 years ago
Other questions:
  • Give two reasons why network security is the most important issue regarding data centers.
    15·1 answer
  • Write an application that inputs three numbers (integer) from a user. (10 pts) UPLOAD Numbers.java a. display user inputs b. det
    10·1 answer
  • A computer processes data using only 1s and 0s true or false?
    9·2 answers
  • Quinton is having trouble learning Spanish because he keeps reverting back to the grammatical structures of his native English l
    6·1 answer
  • What are the characteristics of good blogs?
    8·1 answer
  • Shipments of compact digital cameras dropped by 42% due to the industry being unable to adjust to changes in the ________. a. ec
    11·1 answer
  • Write a line of code to convert time to hours. Remember there are 60 minutes in an hour. Then write a line of code to calculate
    9·2 answers
  • Which of the following is part of a person's digital footprint? *
    5·1 answer
  • Consider the key success factors of B2C. Is it only IT? What is most important?​
    8·1 answer
  • Cycle technology implemented a dibs initiative last year for one of the manufacturing sites. however, the initiative is not prog
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!