1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkasestr [34]
3 years ago
11

Why is it important to isolate evidence-containing devices from the internet?

Computers and Technology
1 answer:
stiks02 [169]3 years ago
8 0

Answer:

C.

Devices can be remotely locked or wiped if connected

Explanation:

You might be interested in
How is this fictional tex in the people could fly different from the nonfictional text​
jenyasd209 [6]
The answer to this is C.
6 0
3 years ago
Read 2 more answers
Helena purchased a security software package to protect her new laptop against threats such as spyware and computer viruses. she
Ksivusya [100]
If you regularly use the Internet, then you will have to run a virus scan more  than once per week. More regular scans can vary based on your Internet usage. You can run scans as often as two to three times per week or even daily if you are concerned about a virus getting onto your computer.  Updating the security software is a must.
3 0
3 years ago
A company is utilizing servers, data storage, data backup, and software development platforms over an Internet connection.
Anarel [89]

Answer:

The answer is A. Cloud computing

Explanation:

Cloud computing is the process of using the internet to store, mange and process data rather than using a local server or a personal computer.

The term  cloud computing is generally used to describe data centers available to many users over the Internet.  

Therefore the company's approach to computing resources can be said to be cloud computing because it uses the internet  for data storage, data backup, and software development  

8 0
3 years ago
Identify the true statements about the approach to privacy around the world. a. Uncertainty concerning the nature, extent, and v
Thepotemich [5.8K]

Answer:

a. Uncertainty concerning the nature, extent, and value of privacy is widespread.

d. Significant disagreement about privacy exists within the United States.

6 0
2 years ago
Identify three best -selling tablet on the market, and decide on the one that you would like to buy? justify your respone
Talja [164]
Apples ,oranges, mangos .popular
4 0
3 years ago
Other questions:
  • You bought a monochrome laser printer two years ago. The printer has gradually stopped feeding paper. Which printer component sh
    14·1 answer
  • To display measurements on the ruler while changing column widths, hold down the ________ key while dragging the marker.
    13·1 answer
  • A snail goes up A feet during the day and falls B feet at night. How long does it take him to go up H feet? Given three integer
    8·1 answer
  • Which of the following is not an advantage of using asynchronous data transmission
    15·1 answer
  • Which option in presentation software can you use to apply a “fly in” effect to the objects on a slide? A)flowchart B)shapes C)
    11·2 answers
  • What makes a distributed denial of service attack "distributed"? It involves many ip addresses. It attacks multiple systems. It
    9·1 answer
  • A member function of a derived class may not have the same name as a member function of a base class
    9·1 answer
  • Which of these is an online presentation tool?
    9·2 answers
  • What are the trinity of the computer system
    10·1 answer
  • GIVING OUT BRAINLIEST AND I AM ALSO WARNING EVERYONE TO NOT ANSWER A BUNCH OF rubbish just to get the points!
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!