1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
3 years ago
5

Can someone help me with this lab assignment? I really do not know what should I do?

Computers and Technology
1 answer:
blondinia [14]3 years ago
4 0

Answer:

your question is too long to read

Explanation:

try explaining it in fewer words

You might be interested in
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
frutty [35]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

7 0
3 years ago
1. What is memory mapped I/O?
anzhelika [568]

Answer:

Memory-mapped I/O and port-mapped I/O are two complementary methods of performing input/output between the central processing unit and peripheral devices in a computer. An alternative approach is using dedicated I/O processors, commonly known as channels on mainframe computers, which execute their own instructions.

5 0
2 years ago
A gamer typing their name into the computer is an example of:
vova2212 [387]

user input I think I'm not sure though

3 0
2 years ago
Read 2 more answers
Which of the following is NOT a font style?<br> Italic<br> Bold<br> Regular<br> Iconic
madam [21]

Answer:

iconic

Explanation:

iconic iconic iconic

8 0
2 years ago
Read 2 more answers
Create a query that returns School Name, School Dean Last Name, School Dean First Name, Department Name, Department Chair Last N
Zepler [3.9K]

Answer:

SELECT  School_name,School Dean Last Name, School Dean First Name,Department Name, Department Chair Last Name, Department Chair First Name

FROM table_name

ORDER BY School Name,Department Name

8 0
2 years ago
Read 2 more answers
Other questions:
  • What keyword do we use when instantiating an object _________________
    15·1 answer
  • Even though a high-level programming language
    11·1 answer
  • Concentric circles on a disk platter where data is stored;________
    8·1 answer
  • Walmart store wants to compare the sales of five of its stores. Write a complete program to ask the user to enter the sales for
    12·1 answer
  • Brake fluid should be checked __________.
    8·2 answers
  • Any device that uses light to read and write information.
    9·2 answers
  • What number will be output by the console.log command on line 5?
    9·1 answer
  • Think about the five steps to writing an algorithm. Why is each step necessary?
    6·2 answers
  • What do you do when ur grounded from all electronics and can't go outside and have t clean all day
    10·1 answer
  • What is multimedia hard ware? Write any four examples of multimedia hardware. <br>​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!