1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikitadnepr [17]
3 years ago
10

Match each statement from the passage with the message it represents.

Computers and Technology
1 answer:
Serggg [28]3 years ago
4 0

Answer:

Here is the answer:

You might be interested in
Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters
nadezda [96]

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

3 0
4 years ago
What is the data rate on a channel if the transmission duration of a frame of 1250 kb takes 200 ms ?
posledela

Answer:

6250 Kbps

Explanation:

See it in the pic.

8 0
3 years ago
Write a program to insert student grade and print the following
tangare [24]

Answer:

The answer is the program, in the explanation

Explanation:

I am going to write a C program.

int main(){

int grade = -1; /*The grade will be read to this variable*/

/*This loop will keep repeating until a valid grade is inserted*/

while(grade < 0 || grade > 100){

         printf("Insert the student's grade: %n");

         scanf("%d", &grade);

}

/*The conditional according to the grade value*/

if (grade >= 90){

     printf("Your grade is A\n");

}

else if (grade >= 80 && grade < 90){

     printf("Your grade is B\n");

}

else if (grade >= 70 && grade < 80){

     printf("Your grade is C\n");

}

else if (grade >= 60 && grade < 70){

     printf("Your grade is D\n");

}

else{

    printf("You got a failling grade\n");

}

return 0;

}

8 0
4 years ago
Which of the following refers to programs that install themselves on computers without the users' knowledge or permission and sp
defon

Answer:

The correct answer is C "Computer Virus"

Explanation:

Computer virus is a piece of code that install itself in a computer without the knowledge and permission of the user and start replicating itself and as it execute it self also start damaging the computer files.

Computer virus have ability to replicate itself and it attached to files and move from one computer to another with these files when files are transferred.

5 0
4 years ago
While the names for Web addresses, or URLs, are not case-sensitive, the names for files you create for the Web are. 
gtnhenbr [62]
90% sure the answer isTrue
6 0
4 years ago
Other questions:
  • The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
    12·1 answer
  • Write the definition of a method printGrade, which has a char parameter and returns nothing.The method prints on a line by itsel
    6·1 answer
  • When you connect a device to your computer for the first time, Windows Media Player selects the ____ method that works best for
    15·2 answers
  • How do the companies gather data to determine common passwords?
    13·1 answer
  • what is hardware ? Name the four functional hardware of a computer system Define each of them with the help of a diagram​
    12·1 answer
  • Which of the following is not a natural resource
    11·2 answers
  • What is it important to test cabless?​
    7·1 answer
  • What is the full form of cpu​
    11·2 answers
  • Which symbol should you use for entering a formula in a cell?
    7·2 answers
  • hich of the following is different on the Cisco switch CLI for a Layer 2 switch as compared with the Cisco router CLI?a. The com
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!