1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
3 years ago
5

Is prediction harmful or not , why​

Computers and Technology
1 answer:
Marrrta [24]3 years ago
8 0

Answer:

It's Not At All Because It's Just Like Yku Thinking Of Something

Explanation:

not at all

You might be interested in
Which activities below might have a negative effect on your online reputation?
Zepler [3.9K]

Answer:

I believe the last 2 maybe even the one above the second to last answer

Explanation:

3 0
3 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
lesya692 [45]

Answer:

True

Explanation:

In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key requirements includes certification and accreditation, which is a process that occurs after the system is documented, controls tested, and risk assessment completed. It is required before going live with a major system. Once a system is certified and accredited, responsibility shifts to the owner to operate the system is a true statement.

8 0
3 years ago
How does microsoft label mac addresses in the windows utilities that show you the mac address?
statuscvo [17]

Based on computer analysis, Microsoft labels mac addresses in the windows utilities "<u>by showing the MAC address in the 'Physical Address' field."</u>

<h3>What is MAC Address?</h3>

MAC Address is the acronym for media access control address. A distinct identifier is allocated to a network interface controller (NIC).

MAC address is used as a network address in communications within a network component.

There are two ways to check for a MAC address in the Windows Utilities which is either through Command Prompt or Network Setting.

Hence, in this case, it is concluded that the correct answer is "<u>by showing the MAC address in the 'Physical Address' field."</u>

Learn more about MAC Address here: brainly.com/question/24812654

6 0
2 years ago
5 of 10
DaniilM [7]

Answer:

what

Explanation:

3 0
3 years ago
A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from
zhenek [66]

Answer: B. Perform a hash on the file for comparison with the vendor’s hash.

Explanation:

Before installing the firmware update, the step that the technician should perform to ensure file integrity is to perform a hash on the file for comparison with the vendor’s hash.

Hashing refers to the algorithm that is used for the calculation of a string value from a file. Hashes are helpful in the identification of a threat on a machine and when a user wants to query the network for the existence of a certain file.

5 0
3 years ago
Other questions:
  • Select the correct answer.
    8·2 answers
  • Why isn't my rank move from ambitious to virsto i met all the requirements
    8·2 answers
  • What does subscribing to a website’s RSS feed provide to a subscriber?
    10·1 answer
  • A(n) ________ is a variable that receives an argument that is passed into a function. global argument scope parameter
    15·1 answer
  • Explain the use of keyboard shortcuts and key combinations. You are at the tenth page of a 20-page document. You need to make ch
    14·1 answer
  • What would be an ideal scenario for using edge computing solutions?
    10·1 answer
  • Describe how data is transmitted using half-duplex serial data transmission.
    9·1 answer
  • Match the elements used in web searches to their functions.
    12·1 answer
  • WILL GIVE BRAINLIEST! The command simplify is used if you only want the first two digits of a decimal to appear in the interpret
    13·1 answer
  • Please help ASAP! will mark brianliest! 30 points!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!