1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
14

What actions can you take to ensure the physical security of network devices?

Computers and Technology
2 answers:
Monica [59]3 years ago
8 0
use vpns, use long hard to figure out passwords, and keep ur devices in sight or reach of you
lawyer [7]3 years ago
3 0

Answer:

Here are some steps you can take to make sure your network is secure:

Take physical precautions. ...

Make sure all of your server's security features are enabled. ...

Use both hardware and software firewalls. ...

Install the latest version of your server's software. ...

Guard passwords. ...

Be Wi-Fi savvy.

Explanation:

PLEASE MARK ME AS BRAINLIEST

You might be interested in
Assuming outFile is a file stream object and number is a variable, which statement writes the contents of number to the file ass
professor190 [17]

Answer:

Its outfile<<number.

However, before this we need to write

outfile.open("xyz.txt", ios;;out)

outfile<<number

And this code will do what is required in the question. This is going to write the number's content to the xyz.txt file which is the file associated with the outfile.

And remember this is in C++. And C++ is a imperative oriented programming language. Undoubtedly, Python and R are fully object oriented programming languages.

Explanation:

The answer is self explanatory.

7 0
3 years ago
which process consists of one application program following a logical access path (lap) and then a dbms following a physical acc
laiz [17]

A DBMS acts as a conduit between the database and the applications that will use it, enabling users to access, modify, and control how the data is arranged and optimized.

Data points that are connected to one another are stored and accessible in a relational database, which is a form of database. The relational model, an easy-to-understand method of representing data in tables, is the foundation of relational databases. Data items are requested from the database by application programs, which are created using a combination of the DBMS's data manipulation language and a traditional programming language. The DBMS locates and provides the data elements requested by the application programs.

Learn more about database here-

brainly.com/question/6447559

#SPJ4

5 0
1 year ago
A group of users can perform certain operations on a shared workbook. Which option helps them to update and track changes in the
irina1246 [14]

The “Allow changes by more than one user at the same time” option.


In a group of users, it is very important to create a shared workbook so that several people are able to update information and track changes in the workbook at the same time. To do so, one should click on the review tab of the excel sheet and select share workbook. On the editing tab of the share workbook dialog box, select the Allow changes by more than one user at the same time check box. Go ahead and click the advanced tab and select option you would want to use and then click OK

 






4 0
3 years ago
You have just read about a new security patch that has been made available for your Windows system, so you install the patch as
zhenek [66]

Answer:

A

Explanation:

The best action to take is to download and install the last good update; in that case, it will override the recent unstable update.

An update is not like a single program that can be add or remove from the control panel.

6 0
3 years ago
Which list method allows elements in a sequence to be removed and added at either end of the structure?
Amanda [17]

Answer:

b) queue

Explanation:

Queue is also an abstract data type or a linear data structure, just like stack data structure, in which the first element is inserted from one end called the REAR(also called tail), and the removal of existing element takes place from the other end called as FRONT(also called head).

4 0
3 years ago
Read 2 more answers
Other questions:
  • In a paragraph of no less than 125 words, describe how you would insert a graph in your word-processing document.
    8·2 answers
  • Machine language library routines are installed on computers Select one: a. because they can come as part of the operating syste
    15·1 answer
  • Which of the following jobs are most likely to be in greater demand due to the increasing prevalence of mobile computing? deskto
    13·1 answer
  • 11.
    11·1 answer
  • Which social media post indicates your home may be unattended?
    10·1 answer
  • Fatal error: Class 'Drush\Commands\DrushCommands' not found in /Users/amy/testsite/Sites/acquia dev desktop/fresh-install/module
    7·1 answer
  • Which is a benefit of using the paste link option?
    15·2 answers
  • Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because: Gr
    11·1 answer
  • What are four differences between tablets and smartphones?
    6·2 answers
  • Assume variable age = 22, pet = "dog", and pet_name = "Gerald".
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!