1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zavuch27 [327]
3 years ago
10

8. Why is it important not to download pictures to your school or workplace network if you do not plan to use them?

Computers and Technology
1 answer:
Anni [7]3 years ago
7 0

Answer:

not appropriate use of technology.

Explanation:

You might be interested in
Alonzo collects bugs. He has created a fascinating display of large insects. Collecting bugs is a(n) _____ to Alonzo.
-Dominant- [34]
The answer is hobby. He does it because he enjoys it. There is no information of him being told or paid to collect bugs, so it is a hobby.
3 0
3 years ago
Read 2 more answers
Microsoft Word
ValentinkaMS [17]
It looks like it would have to be choice D.

Explanation: Pagination is number assignment to pages. Word wrap is when if a word is too long it is sent to the next line. Editing would not be a precise or accurate answer.
3 0
3 years ago
Read 2 more answers
What is a non-example of job outlook.
Papessa [141]

Answer:

Before you choose a career you should find out what its job outlook is. ... employed in a particular occupation over a set period, for example, two years, five years or ... 2% and 4%); Have little or no change (a decrease or increase of 1% or less) .

Explanation:

4 0
3 years ago
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
What is the correct sequence of processing instructions in a machine cycle?
Aleks04 [339]

Answer:

The four-step process of fetch, decode, execute, and store. Type of memory where the contents of this are not erased when the computer is turned off.

7 0
3 years ago
Other questions:
  • In gaming, "rendering" refers to:
    12·2 answers
  • Write code for a function with the following prototype: /* Addition that saturates to TMin or TMax */ int saturating_add(int x,
    12·1 answer
  • Which technology can allow a single ground-based telescope to achieve images as sharp as those from the Hubble Space Telescope?
    7·1 answer
  • You're programming an infinite loop. What must you include in your code to prevent crashes?
    15·2 answers
  • Debbie’s colleague hasn’t provided her the required details to complete an important report. She is upset by this, and she sends
    14·2 answers
  • Why would it be hard to find the ideal CO2 level if the light intensity were very low?
    9·1 answer
  • What is the function of the NOS? Select all that apply.
    5·2 answers
  • A(n) ________ is a chart based on PivotTable data.
    15·1 answer
  • A method signature for a method consists of all elements of the method except the body. That is, a method signature consists of
    14·1 answer
  • A sensitive manufacturing facility has recently noticed an abnormal number of assembly-line robot failures. Upon intensive inves
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!