Answer:
biometrics
Explanation:
Voice and fingerprint <u>biometrics</u> can significantly improve the security of physical devices and provide stronger authentication for remote access or cloud services.
Answer:
Network bridge
Explanation:
You are an administrator of a growing network. You notice the network you have created is broadcasting but you cannot ping systems on different segments of your network. What device should you use to fix this issue?
✓ Network bridge
Answer:
In Java
import java.util.Scanner;
public class Main {
public static void main(String[] args) {
int mnth, yr;
Scanner input = new Scanner(System.in);
System.out.print("Month: "); mnth = input.nextInt();
System.out.print("Year: "); yr = input.nextInt();
boolean lpYear = (yr % 4 == 0 && yr % 100 != 0) || (yr % 400 == 0);
if(mnth == 1 || mnth == 3 || mnth == 5 || mnth== 7 || mnth == 8 || mnth == 10 || mnth == 12){
System.out.print("31 days"); }
else if(mnth == 2){
System.out.print(((lpYear) ? "29 days" : "28 days")); }
else if(mnth == 9 || mnth == 6 || mnth == 4 || mnth== 11){
System.out.print("30 days"); }
else{ System.out.print("Invalid"); }
}
}
Explanation:
See attachment for complete program where comments were used as explanation.
Answer:
B. Someone can steal the information and hurt you.
Explanation:
People can hack into your accounts using your informations and spread hurtful things that can make people hurt. The people will think that you posted this (even if you didn't) and blame you.