1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreev551 [17]
3 years ago
12

!PLEASE HELP! My business office specialist class, this is about Access.

Computers and Technology
2 answers:
Over [174]3 years ago
6 0

Answer:

b

Explanation:

Mariana [72]3 years ago
3 0

Answer:

Probably late but the answers are

A: the name of the user or the initials

D: the default format for new databases

E: the default folder for storing databases

F: the folders containing trusted databases

You might be interested in
As a student, how can you sustain focus and attention with technology distracting you from things that matter (academic, persona
ki77a [65]
Technology is addicting and distracting, just take personal experience. Have you ever had a time when you were on the computer, on the phone, playing games, watching TV, etc. and time flew by? You were procrastinating and should have been doing something else? Were you ever multitasking and paid more attention to technology than what you should be doing? If so, then you have your answer, and from your own experience as well.
6 0
2 years ago
Pls someone help me with these four questions
ipn [44]

Answer:

16. Grace Hopper. 1959.

8 0
2 years ago
What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?
AfilCa [17]

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

7 0
3 years ago
A(n) ____________ is a private data network that creates secure connections over regular internet lines.
Setler79 [48]
VPN is the correct answer
5 0
3 years ago
Which option would a computer engineer most likely create? A) a programming language to run a new software program B.) the part
Zolol [24]

pogram b

Explanation:

3 0
2 years ago
Other questions:
  • The likelihood of the occurrence of a vulnerability multiplied by the value of the information asset - the percentage of risk mi
    12·1 answer
  • What 2 major agricultural inventions did jethro tull create?
    10·2 answers
  • What is cpu????????????????????????????
    12·2 answers
  • How do you know if your phone has a virus?
    13·1 answer
  • Who was the founder of the location-sharing site Whrrl
    6·1 answer
  • When you're working with a word processing document and you press the DEL Key what happens
    7·2 answers
  • The first commercially available digital camera was which of the following?
    9·1 answer
  • Determine whether the phrase below is a sentence or a fragment.
    12·1 answer
  • What is the full meaning of Internet and WiFi
    6·2 answers
  • Social media first became popular due to which development?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!