1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STALIN [3.7K]
3 years ago
8

Some machine/items/gadget having only hardware​

Computers and Technology
1 answer:
shepuryov [24]3 years ago
6 0
Yeh it’s becoz they work with hardware that’s why
You might be interested in
Explain 3 ways you can be an upstander when seeing cyberbullying.
Bess [88]

Answer:

Assuming an upstander is someone that opposes cyberbullying:

(1) Call them out

(2) Report the behavior to proper moderation authority

(3) Tell the person to block messages from the cyberbully

I don't really know what else you want from this.

Cheers.

3 0
3 years ago
Read 2 more answers
Binary numbers are based on __________.
Lena [83]
D. Two digits (1s and 0s
8 0
3 years ago
Read 2 more answers
At a local marketing firm, Steve is the lead Web developer and is responsible for working with customers on their Web designs, d
attashe74 [19]

Answer:

All of the above.

Explanation:

Understanding that he must create a unique domain name for each client

Being able to work with HTML

Understanding of the World Wide Web and how hyperlinks work

All of these would be a critical skill Steve must have to be able to perform his job.

6 0
3 years ago
Give two reasons why cloud computing could be detrimental to a company.
dimulka [17.4K]

Security/Insider threats.

As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.

Cyber-attacks.

Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.  


3 0
3 years ago
Bob works in a small office with a network of computers. Bob, along with all the other employees, is responsible for securing hi
miskamm [114]

Answer:

False

Explanation:

When an employee becomes the one responsible for the security of His own computer then the scenario does not define Network security. Network security is a usage of hardware and related software to provide protection to the underlying network architecture from unauthorized access and other anomalies related to networks.

5 0
3 years ago
Other questions:
  • Suppose that a machine with a 5-stage pipeline uses branch prediction. 15% of the instructions for a given test program are bran
    13·1 answer
  • Texture fills are available to add as a slide background true or false
    7·2 answers
  • Which button do you click to add up a series of numbers
    10·1 answer
  • Develop Swimlane Activity diagram for Assignment announcement and submission system.
    6·1 answer
  • A _ shows the end of a page . ​
    11·2 answers
  • 1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an eve
    13·1 answer
  • What is phishing?
    14·1 answer
  • Justine was interested in learning how to play the piano. She has successfully passed every level of music book and is planning
    10·1 answer
  • What impact download speeds on different computers
    13·1 answer
  • If you give someone ______ to your device, they can control it through another phone or computer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!