1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tensa zangetsu [6.8K]
3 years ago
13

Which of the following are risks to a network?

Computers and Technology
2 answers:
german3 years ago
7 0

Answer:

Granting administrator access to a non-administrator  

 Opening files from unknown senders

Explanation:

Psst those are the answers

Vilka [71]3 years ago
4 0

Answer:

option  b and c are correct answers.

Explanation:

Let see each option in detail.

a) Sending email is not a risk.

b) Granting access is a problem because the other person can undermine the network

c) Unknow senders can send virus or other malicious code to corrupts you data.

d) Unwanted advertisement is not a big deal.

You might be interested in
1. Write the full forms of the following.
Dmitry_Shevchenko [17]

Answer:

1. A) Language of graphics-oriented.

B) Initial public offering

C)

D) Central processing unit

2A) False

B) True

C) False

D) True

7 0
3 years ago
Read 2 more answers
In Windows Vista, which location contains the Printer link?
ipn [44]
I believe it's B.) Printer and Faxes.
3 0
4 years ago
Read 2 more answers
Describe the difference between a chained conditional and a nested conditional. Give your own example of each.
I am Lyosha [343]
Here you go :) have a good day :))))

5 0
3 years ago
Which of the following did you include in your notes?
iVinArrow [24]

Answer:

How you will be innovative in what you offer

Explanation:

personally I think all 3 but it is what it is

6 0
3 years ago
Why can't I access my micro SD card on my Lenovo ThinkPad Yoga 11e? I'm trying to export some PNG files onto my Micro SD card, s
BabaBlast [244]

maybe you need a new sd card

6 0
4 years ago
Other questions:
  • Categories of general purpose application software and examples each​
    13·1 answer
  • What is a taskbar?
    5·1 answer
  • Why you should care about copyright
    13·1 answer
  • The network layer of the Internet model uses the _____________ protocol to route messages though the network.
    13·1 answer
  • Which of the following statements is correct?
    11·1 answer
  • If you want to conserve ink or toner, you can instruct powerpoint to print ____ documents.
    6·1 answer
  • A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
    12·1 answer
  • Which statements are true? Select 4 options.
    9·1 answer
  • What is the launching of a 3-D map called?
    12·1 answer
  • How many pages is 1500 words double spaced 12 font?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!