1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
3 years ago
8

Which statement best describes network security

Computers and Technology
2 answers:
ExtremeBDS [4]3 years ago
7 0
That would depend on the type of network.

I would say that the answer is B, because if no one had authorization to use it, should it have even been implemented in the first place?
Andreyy893 years ago
3 0
<span>B.network security means all personal information is kept safe the network is not compromised and only authorized users had access 

Im pretty sure they ment has instead of had</span><span />
You might be interested in
The Windows Operating System: A) is a web-based operating system for the Internet era. B) is a data management application used
NNADVOKAT [17]

The Windows Operating System is an operating system used on most Wintel PCs throughout the world.

E) is an operating system used on most Wintel PCs throughout the world.

<u>Explanation:</u>

An operating system can be defined as a system software whose main function is to act as an interface between the user and the computer.  It performs different administrative elements of a PC and gives a graphical UI to the client with the goal that they can impart to the PC.  

Wintel is a PC exchange industry term for PCs dependent on the Intel chip and one of the Windows working frameworks from Microsoft. In the zone of work area and smart phones, Windows is commonly above 70% in many markets and at 78% all inclusive, Apple's macOS at around 14%, Google's ChromeOS at about 3% (in North America) and Linux at around 2%.  

The term Wintel PCs originate from the mix of two words: Windows and Intel, which allude to the PCs that work on the Windows Operating System and use Intel Processors.

6 0
3 years ago
java class What is the output of the following JAVA program (Java assumes public if no access modifier is given)? class Test { p
Natasha2012 [34]

Answer:

The answer to the given question is it will produce an "error"  

Explanation:

In the given java program it will produce an error because in java we do not use double quote("""") for message printing. We use a single quote("") for message printing. In the given program if we use a single quote(""). so it will give output that is "dogood:dogood".

The correct program to this question is can be given as:

Program:

public class Test  //define a class test.

{

   public static void main(String[] args)  //define main method

   {

       Test obj = new Test();   //create class object  

       obj.start(); //calling function

   }  

   void start()  //define function start.  

   {

       String stra = "do";   //define variable and assign value.

       String strb = method(stra);  //define variable and pass stra variable in method() function as a parameter.

       System.out.print(":"+stra + strb); //print value.  

   }

   String method(String stra)  //define function method  

   {  

       stra = stra + "good";   //add value

       System.out.print(stra);  //print value of stra

       return"good";  //return value

   }

}

Output:

dogood:dogood

6 0
3 years ago
Complete the sentence.<br> A text messaging application is an example of a _____ application.
Ne4ueva [31]

Answer:

chat application

Explanation:

3 0
3 years ago
Read 2 more answers
Moore's Law states that the number of transistors on an integrated circuit? increases by 20% every year
qaws [65]
Doubles every two years
3 0
3 years ago
What are the different methods of enhancing/decorating<br> bamboo product​
Zepler [3.9K]

Explanation:

Methods of this technique include glueing, chemical gilding, and electroplating.  Staining is used to color wood to give an illusion of texture. This may come in two varieties.

7 0
3 years ago
Other questions:
  • Write a class named Taxicab that has three **private** data members: one that holds the current x-coordinate, one that holds the
    9·1 answer
  • If Mark is developing a website to be optimized for mobile devices, what would be the top-level domain?
    10·1 answer
  • Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
    13·1 answer
  • As the team leader, John ensures that all his teammates are clear in the team goals they need to achieve. He demonstrates the qu
    12·2 answers
  • What does the acronym GIF stand for? Graphics Interface Format Graphics Interchange Format Going Into Files Gathering Informatio
    12·2 answers
  • You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
    10·1 answer
  • What is the output of the following program?
    10·1 answer
  • Ok so this question is kinda weird but does anyone know what google drive is. If so how do you upload a video to it?
    11·2 answers
  • Decimal numbers is equivalent to binary 110
    5·1 answer
  • Help me pls...
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!