1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
2 years ago
12

Which technology will a business use to figure out who accessed confidential files on a company's computer system

Computers and Technology
1 answer:
Charra [1.4K]2 years ago
8 0

Answer:

insaj cdsjl ljhwbalfhb

Explanation:

You might be interested in
What is folded card publishing?​
Alexeev081 [22]

Answer:

Folded card This layout type is for creating greeting cards by printing pages on a sheet and then folding the sheet to make the card. If you choose the Folded card layout, then sheet fold options are displayed. Select an option in the list to specify how you will fold your publication

Explanation:

3 0
2 years ago
Read 2 more answers
You work part-time at a computer repair store, and you are on-site at a customer's premises. Your customer has signed up for DSL
patriot [66]

The fill up are:

First Install the DSL router and link it to the phone line via:

  • Look at the Shelf, and expand Routers.
  • Take in the DSL router to the Workspace area.
  • Beyond the router, click on Back to switch to the back view of the router.

<h3>What is the steps about?</h3>

Next check On the Shelf, and expand Cables.

Click on the twisted pair cable that has RJ11 connectors.

Looking at the Selected Component window, take in a connector to the RJ11 port on the router.

Looking at the Selected Component window, take in or drad the other connector to the empty phone port that can be seen on the wall outlet.

Then Plug in the router via:

The Shelf, click on the power adapter.

  • Using the Selected Component window, take in the DC power connector to the power port on the DSL router and also take in the AC power plug to the wall outlet then:

Click on the computer to the DSL router as follows:

Beyond the computer, click on Back to switch to the back view of the computer and in the Shelf, click on the Cat5e cable.

Using the Selected Component window, take in a connector to the network port on the computer and then take in other connector to a network port on the DSL router.

The implementing DSL and Select the DSL filter then click on the phone cable under Partial connections and take in or drag unconncected connector to the RJ11 port on the filter.

Learn more about DSL internet  from

brainly.com/question/14599737

#SPJ1

5 0
2 years ago
Which tool did Adnan use to modify the image?
artcher [175]

Answer:

D

Explanation:

4 0
3 years ago
Read 2 more answers
Select the standardized features of Windows that make it easier to manage your tools:
anygoal [31]

Answer: The Standardized feature of Windows that make it easier to manage tools are:

1. Toolbar

2. Menu

3. Taskbar

Explanation: 1. Toolbar helps to easily show the various tools that can be used on Windows.

2. Menu helps to separate the different parts of the Windows for easy access.

3. Taskbar helps to show the various tools for doing a task.

5 0
3 years ago
What guidance identifies federal information security controls?
Vladimir79 [104]

Answer:

<u>FIPS</u> <u>Publication</u> <u>2</u><u>0</u><u>0</u>, the second of the mandatory security standards, specifies minimum security requirements for information and information systems supporting the executive agencies of the federal government and a risk-based process for selecting the security controls necessary to satisfy the minimum security..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

3 0
2 years ago
Other questions:
  • A user can set the security and privacy settings on what is displayed in the message bar from the ________ within the options me
    8·1 answer
  • What percentage of jobs work in the entertainment industry?
    13·1 answer
  • As the performance of PCs steadily improves, computers that in the past were classified as midrange computers are now marketed a
    9·1 answer
  • a.Write a Python function sum_1k(M) that returns the sumí‘ í‘ = ∑1푘푘푀푀푘푘=1b.Compute s for M = 3 by hand and write
    15·1 answer
  • . public members are accessible from ________________ where the object is visible
    9·1 answer
  • Chen needs to configure a filter on the current folder and would like to filter by the sender of a message. Which tab in the Fil
    7·2 answers
  • Many of the first photographers were actullay scientists and inventors
    11·1 answer
  • A program runs from start to finish, producing unexpected results, though no error message is received. What most likely occurre
    15·1 answer
  • Suppose that the instruction format for a modified Little Man Computer requires two consecutive locations for each instruction.
    5·1 answer
  • What does the asterisk (*) after select tell the database to do in this query?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!