1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stella [2.4K]
3 years ago
9

Please help on both of these questions will give brainliest !!

Computers and Technology
2 answers:
sasho [114]3 years ago
7 0
First one is all of the above
Alja [10]3 years ago
3 0

I think the first one is All of the above

You might be interested in
John works as a sales representative with Northwind Traders. He has to make a presentation to his customers in another town. The
Sphinxa [80]

Answer:

Laptop.

Explanation:

In the following scenario, John works in the company as the sales representative and he creates a presentation for his users who belongs to another town. The following presentation contains 10GB storage and he also modifying his presentation at the time of traveling.

So, It is clear that he is not using the Mainframe, PDA, or any other desktop computer, he will using his Laptop.

8 0
3 years ago
In computer science, what does the word security mean?
zepelin [54]

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

4 0
3 years ago
3. How are you able to create photographs differently than 100 years ago?
Agata [3.3K]

Answer:

it willbe black and white

Explanation:

3 0
3 years ago
Read 2 more answers
Tecty Motors Pvt. Ltd. has recently deployed RFID technology in the vehicles which allows the car owner to unlock the car with t
loris [4]

Answer:

The answer is B.

Explanation:

Radio Frequency Identification (RFID) is a technology that uses radio waves to  secure objects, pair devices, tag them etc. and it is made up of a transmitter which emits radio waves and a receiver.

The example given in the question where Jamie listens to the communication between the RFID tag and the devide of the user and copies the information to later use it to gain access to the vehicle is an example of a replay attack.

Also called "eavesdropping & replay", the first part is the listening to the conversation to steal the data and the replay part is where he uses the information to gain access.

I hope this answer helps.

7 0
3 years ago
2. Imagine that the user at computer A wants to open a file that is on computer C's hard disk, in a peer-to-peer fashion. What p
Elis [28]

Answer:

Since there is no server in a peer-to-peer network, both computers will share resources through the network component used in linking them together such as a cable or a switch.

Explanation:

In its simplest form, a peer-to-peer (P2P) network is created when two or more computers (in this case computer A and C) are connected and share resources without going through a separate server computer. A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files or through an Ethernet cable. A P2P network also can be a permanent infrastructure that links a half-dozen computers in a small office over copper wires using switches as a central connector. Or a P2P network can be a network on a much grander scale in which special protocols and applications set up direct relationships among users over the Internet.

Please find attached the diagram of the peer-to-peer network of the two computers, computer A and computer. We have two network connections in the diagram.

The first one was implemented using a crossover Ethernet cable to connect both computers through the RJ45 LAN port on their network interface card.

In this network configuration, that will go through the NIC card from Computer C, through the cable to the NIC on computer A and vice versa.

In the second implementation, we used a switch to connect both computers using a straight Ethernet cable.

In this connection, data will go through the NIC card in computer C, through the cable connecting Computer C to the switch, through the switch, then through the cable connecting the switch to computer A and finally through the NIC card on computer A and vice versa

4 0
3 years ago
Other questions:
  • Which online text source would include a review of a new TV show?
    9·2 answers
  • Write a MATLAB script using the quiver and contour commands to visualize the field and its divergence. Assume the region of inte
    12·1 answer
  • Consider two sets S1 and S2 of size 3 and 2 each.
    13·1 answer
  • Type dig www.example A in order to get the IP address of www.example. What’s the TTL of the A record returned in the response? W
    9·1 answer
  • ____ includes any attempt to intentionally conduct dishonest activities online.
    5·1 answer
  • D State Six Impact of ICT the society​
    7·1 answer
  • Which function category is not in Excel 2016?
    12·2 answers
  • An if statement must always begin with the word “if.” True False python
    15·2 answers
  • How do most business applications and websites process credit card transactions?
    13·1 answer
  • 10 computer and operating systems errors​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!