1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sp2606 [1]
3 years ago
14

What sort of negative outcomes are possible for this type of risk?

Computers and Technology
2 answers:
Harlamova29_29 [7]3 years ago
6 0
More details please?
rjkz [21]3 years ago
4 0

Answer:

not enough to go on

Explanation:

You might be interested in
Harry needs to use a type of graph in a spreadsheet to show variations in data over a specific period. What type of graph or cha
stealth61 [152]
Bar graph!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
5 0
3 years ago
Read 2 more answers
20. Which of the following describes an acceptable print resolution?
vodka [1.7K]
The correction is C.
One of the major factors that determine the quality of a printer is the resolution of that printer. The resolution is also called DPI [Dots Per Inch]. The DPI refers to amount of ink that an inkjet printer can place in a one inch line of a printed document. The higher the DPI of a printer, the higher the resolution.
6 0
3 years ago
Read 2 more answers
Can you call a mobile a computer. It Yes<br>why? If No why​
Lera25 [3.4K]

Answer:

Yes

Explanation:

You can call mobile a computer because it come under one of the categories of the computer.

That category being microcomputers.

6 0
4 years ago
Read 2 more answers
What kind of physical device is an evil twin access point? What does the evil twin do after initial association when the victim
Rufina [12.5K]

Answer:

A PC such as a notebook computer.The evil twin gets the encrypted frame from the affected host,A VPN  encrypts a  frame with its own VPN key.

Explanation:

The evil twin after initial association when the victim client will establish a secure wireless connection with the victim client. The connection uses a key client-EF for encryption such that when the host transmits an encrypted frame it is transmitted to the evil twin. A VPN is an encrypted virtual private network used to access networks that are not trusted. The client encrypts a frame with a VPN key (Key Client-Server) which it shares with the server. The frame is further encrypted by the key it shares with the evil twin (Victim Client-ET) The evil twin will then receive a double encrypted frame. However, it will only be able to decrypt the Victim Client-ET key but not the VPN key hence it will not be able to read the message sent through the frame.

7 0
4 years ago
Based on current and upcoming gaming technologies, what changes do you expect to see in the next generation of gaming consoles?
damaskus [11]
Better graphics getting 1080 p easily running on 240 frames and a higher storage so then you could have more games on the console
4 0
3 years ago
Other questions:
  • A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
    11·2 answers
  • A ___ is the basic collective unit of data in a computer.
    12·1 answer
  • A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But af
    11·1 answer
  • Which statement best represents the denotation for the word “woman”? A woman is an adult human female. Both man and woman are re
    11·2 answers
  • Write a function named get_my_age that returns your age as an int (this is YOUR age, so if you were 21 you would return the numb
    11·1 answer
  • In the space below, write the formula that needs to be added to the blank cells under the fourth column of the table.
    13·1 answer
  • Write an application named EnterUppercaseLetters that asks the user to type an uppercase letter from the keyboard. If the charac
    5·1 answer
  • Help! I’ll mark you brainly! Please help me.
    15·1 answer
  • What happens when you apply a theme to a form?
    14·1 answer
  • What two functions does tcp/ip perform?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!