1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
11

Many companies ban or restrict the use of flash drives

Computers and Technology
1 answer:
zheka24 [161]3 years ago
4 0

Answer:

Companies do not allow flash drives because of any sort of virus, corrupted file, or anything that could hack into the companies' data base, which can ruin they're entire company!

Explanation:

You might be interested in
Which of the followings is design tool?[2 marks]
aalyn [17]

Answer:

Data Flow Diagram

Explanation:

Data flow diagram is representation of data which is processed in terms of input and output.It is a tool for designing the structure for a software.Rectangles,square and circles are used in representing the flow of information.

DFD consists two components

  • Layers-It consist many layers,the top layer is called context diagram.
  • Levels-The first level shows the main process of the system.
6 0
3 years ago
Need help with 3.2 lesson practice questions (edhesive)​
Vinvika [58]

Answer:

<h2>Doesn't have a question</h2>

Explanation:

<h2 /><h2>THANK YOUU</h2>
7 0
3 years ago
52 is same as 5x5 or 25
poizon [28]

Answer:

25

Explanation:

5 0
3 years ago
Read 2 more answers
In a traditional systems development environment, security issues usually are less complex than with web-based systems, because
NikAS [45]

Answer:

The answer is "True".

Explanation:

Traditional techniques of application development were focused on pre-development stages. These control system flows through claims to design and upgrades and will then tests and repair are directional there.

  • It enables the user to create and run a machine-based data system.  
  • It uses program and device, that specifically the solutions, that enable manual information to be processed.
6 0
4 years ago
Which is an example of oversharing using GPS?
sergij07 [2.7K]
I believe it is D


Social media networks make it easy to help share what’s going on in your life. The problem is when the wrong people get hold of that information. Criminals are smart. They’re connected, and they know how to use the Internet to their advantage. Stalking a victim, getting to know their routines and the times they’re home (and when they’re not) is as easy as opening a web browser and checking an open account. This excellent infographic from Credit Sesame helps illustrate exactly how your social media info can be misused. Last week, Cult of Mac ran a story that went viral about an app called Girls Around Me which aggregated public profiles of women in an area. Everything from check-ins, status updates, profiles and photo albums were aggregated for app users to see. As a result of the article, Foursquare has since revoked the app’s API access, disabling many of the app’s features. Scary stuff. While the app is hopefully mothballed, it highlighted a lot of security risks that are associated with being on social media. The safest option is to simply not use social media. But I’ll be honest: I can’t imagine deleting my social profile. Luckily, you don’t have to. Being vigilant about safeguarding your profile – and being selective about what you share and who you share it with – can help reduce the risk of using social media.


If you need more info LMK. If this is incorrect please comment that it is, along with the correct answer so I can figure out my error, have a great day TPWK
7 0
3 years ago
Read 2 more answers
Other questions:
  • What does the “Rooms” feature of FriendFeed do? Allows users with common interest to share their views and streams Allows users
    10·1 answer
  • Is it true or false for this question?
    8·1 answer
  • Write a program that calculates and displays a person’s body mass index (BMI). The BMI is often used to determine whether a pers
    11·1 answer
  • What is the binary number system? ​
    15·1 answer
  • Which one of the following items would you be most likely to keep in a database? A. Payroll records B. Address book C. Financial
    7·1 answer
  • Monster Collector
    7·1 answer
  • There are two common computer platforms for both PC and MAC users. Which term best describes this function?
    15·1 answer
  • How do you code to find the surface area 6 s2, volume s3 in python
    6·1 answer
  • 3. Find the best.
    13·1 answer
  • True or false, the total number of clock cycles (cc) for a delay loop of 10 ms for 2-mhz 8086 clock is 10,000 cc.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!