1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
3 years ago
6

Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application. Sele

ct one: True False
Computers and Technology
1 answer:
FrozenT [24]3 years ago
6 0

Answer:false

Explanation: why would you need a powerful it security system, if they already have authorized access?

You might be interested in
Not everything is a success all of the time! So do you know which version of Windows was the least popular?
mario62 [17]

Answer:

windows xp

Explanation:

I think because it is not fast and don't play the games and programs which have higher requirements

7 0
3 years ago
What a register in cpu does ?​
Rufina [12.5K]

Answer:

CPU register) is one of a small set of data holding places that are part of the computer processor. A register may hold an instruction, a storage address, or any kind of data (such as a bit sequence or individual characters). Some instructions specify registers as part of the instruction.

6 0
3 years ago
Claudette is shocked to discover that her company's data has been stolen, and their Web site shut down, by a malicious ex-employ
liraira [26]

Answer:

The answer is "Ex-employee hack IoT firms from Claudette to access them".

Explanation:

Computer system hacking is only a breach between both the access as well as the stealing or misuse of critical information between both computer software from the target system. In this sense, a malicious attacker uses a computer device or even a network to access or illicitly exploit information.

8 0
3 years ago
Jason Diaz is a financial advisor who works in an open office with coworkers nearby. Jason advises clients both in person and ov
Elanso [62]

Answer:

There is a need for a microphone and a speaker in the form of a headset for privacy, also, the conventional keyboard and monitor screen. For information security, a configured firewall is recommended to prevent hacking.

Explanation:

Input and output devices are tools used by an operator of a computer device to give instructions and monitor results respectively.

Jason would need a headset, which has a speaker for hearing and a microphone for speaking to the client on a video conference call. These I/O devices are readily available on some personal computers. Every computer system has a keyboard and a monitor, this is also useful for Jason for communicating with his client.

7 0
3 years ago
List five function key<br> list two alphabet key<br>byEmmanuel okorie​
Tanya [424]

Explanation:

Function keys:F1,F2,F3,F4

Alphabetic keys H,A

5 0
3 years ago
Other questions:
  • Why is the cpu the most important component in a computer?
    6·1 answer
  • You respond to an "unknown medical problem" in an area commonly populated by Hispanic Americans. You arrive to find several indi
    13·1 answer
  • Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t
    14·1 answer
  • Which of the following is the definition of registration authority ( RA)?
    10·1 answer
  • What is the description of ?
    13·1 answer
  • What is a computer memory <br>​
    9·2 answers
  • Choose all items that represent characteristics of HTML attributes.
    5·2 answers
  • nder a Huffman encoding ofnsymbols with frequenciesf1, f2, . . . , fn, what is the longest a codewordcould possibly be
    13·1 answer
  • The L-exclusion problem is a variant of the starvation-free mutual exclusion problem. We make two changes: as many as L threads
    15·1 answer
  • You have a server that has a 100basefx network interface card that you need to connect to a switch. the switch only has 100baset
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!