1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
3 years ago
14

What do we do if IOC is called on the intercom ??

Computers and Technology
1 answer:
laiz [17]3 years ago
5 0

Answer/Explanation:

Get out of sight of the intruder

Intruder On Campus

You might be interested in
For activities with output like below, your output's whitespace (newlines or spaces) must match exactly. See this note. Jump to
Vinvika [58]

Answer:

The program to this question can be given as:

Program:

#include<stdio.h>//include header file

int main() //defining main method

{

printf("Hello..! and please vote the answer."); //print value.

return 0;

}

Output:

Hello..! and please vote the answer.

Explanation:

In the given question some information is missing that is the message to be printed, In this code assume some message to be displayed, and the description to the above code as follows:

  • In the above code firstly header file is included for using a basic function like print method, input method, etc.
  • In the next line main method is defined, inside the main method a print function is used in this function a message is passed with a double-quote ("'). When the code will execute it will print the message that is given in the output section.

5 0
2 years ago
30 points!! What should I do if I plug my computer in and it starts making noises and sounds and it starts smelling.
soldier1979 [14.2K]

Answer:

ummmm, you are probably overusing it or it's too old.... if it's an apple computer you can look at the activity monitor and check the activity usage on it because if the activity usage is really high you should probably shut it off and let it chill out for a bit...

6 0
3 years ago
A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed c
BabaBlast [244]

Answer:

B. Spyware

Explanation:

Spywares are silent software that steals sensitive information such as internet or company data, and other similar information. They are oftentimes unnoticed and supply stolen data to external users, data centers or advertisement companies.

Sophisticated spyware can go as far as installing software to manipulate your settings or use passwords on your behalf.

Even though the Trojan was detected in our scenario, The Trojan would have created a backdoor to allow spyware in. This spyware will not be easily noticed by the technician or the antivirus, however, it could be more devastating than the Trojan.

That is why the security administration expresses concern over a breach despite the removal of the Trojan.

3 0
2 years ago
Which domain of an IT infrastructure primarily includes the processes and procedures that end users use to remotely access an or
nadezda [96]

Answer:

Remote Access Domain

Explanation:

Remote access domain allows users to access organization IT infrastructure remotely. It is one of the seven domains of IT infrastructure. Other domains of IT infrastructure include :

1. User Domain,

2.User Domain,

3. Workstation Domain,

4. LAN Domain,

5. LAN-to-WAN Domain,

6. System/Application Domai

7 0
3 years ago
Which part of the software hierarchy is working behind the scenes allowing programs to perform tasks?
Svetradugi [14.3K]
The right answer for the question that is being asked and shown above is that: "Currently dispatched threads." The  part of the software hierarchy is working behind the scenes allowing programs to perform tasks is that <span>Currently dispatched threads</span>
5 0
3 years ago
Other questions:
  • Which of the following statements is false? a. Classes (and their objects) encapsulate, i.e., encase, their attributes and metho
    15·1 answer
  • In which of the following situations is having a good credit score important?
    13·1 answer
  • Mary needs to choose the menu in order to place the text in a desired fashion around the image.
    14·2 answers
  • When using the red / yellow / green method to present status of a project, yellow can mean which of the following? A. There are
    5·2 answers
  • What is Microsoft first product
    6·2 answers
  • Universal Containers wants line items to be organized into pre-defined groups on the output document. The name of these pre-defi
    14·1 answer
  • What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to di
    11·1 answer
  • What will be the results from running the following code?
    5·1 answer
  • How do you check to see if the user entered more than one character? Complete the code.
    14·1 answer
  • In which wireless configuration type do nodes communicate directly with each other, rather than with an access point?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!