Get a program for this perpose or perhaps get a new computer
Answer:
A favor: porque permite manejar la memoria, disco, medios de almacenamiento de información y los diferentes periféricos o recursos de nuestra computadora, como son el teclado, el mouse, la impresora, la placa de red, entre otros.
En contra:
Si uno llega a fallar con un codigo en algun sistema puede verse afectado el dispositivo
Explanation:
The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.
<h3>What is offence?</h3>
A deviation from a code of conduct or law is referred to as a violation. When driving a car, going over the posted speed limit is a regular legal violation. Invading someone else's privacy could include reading their journal. failure to uphold a duty or right; breaching the law.
The two types of violations are states and acts. A transgression is a violation of the rules that is less serious than a foul and frequently involves technicalities of the game. A disrespectful or vulgar act: profanation.
Hence, The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.
To learn more about violation, refer to:
brainly.com/question/1274113
#SPJ4
An unshielded cable are twisted pair is used to connect modem in telecommunication industry to connect computer through telephone cable, Ethernet cables it is called as UTP cables.
<u>Explanation:</u>
These UTP cables are twisted cables where conducted are used in form of single circuit.
These types of UTP cables used to connect modem to establish connection to other networks for internet or connecting to other side computer or desktop or laptops.
UTP cables uses rj-45 or rj-11 or rs232 or rs 499. Normally rs-45 with cat 5e cable is used to connect LAN. Rj-11 is used to connect to modem for dial purpose.
If we use ip networks RJ-45 will do both.
I believe that would be authorization.