1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
3 years ago
14

Which of the following is not hardware?

Computers and Technology
1 answer:
Pachacha [2.7K]3 years ago
6 0

Answer:

A

Explanation:

I think it would be A because i have never heard of a virus scanner

You might be interested in
A company's computers monitor assembly lines and equipment using ________ communications.
mr_godi [17]

Answer:

Machine to machine communications

Explanation:

Machine to machine communication is a type of communication that exists among the technical devices. The communication is linked either with the help of wire or through wireless. The information is communicated and transmitted with this form of communication. Human involvement or intervention is not required during the transfer of data.

6 0
4 years ago
3. You are a network administrator responsible for all network platforms and services. The Teta Company currently has only one b
solniwko [45]

Answer:

1. Wired networks may give the appearance of a busy office full of the latest equipment, but in reality, wires can be an inefficient networking medium. They can limit signal strength as well as make it more difficult to expand and reorganize your network configuration.  Wireless networking is a viable and affordable alternative that offers the benefits of making your environment more flexible. A wireless infrastructure allows you to effortlessly reconfigure your office space as your company grows and changes, easily extend connectivity and also allows employees to be mobile more easily.

2. Review the advantages and consider the benefits to your organization:

Reduced cost of installation. It may be significantly less expensive to install wireless access points compared to wiring your office with Ethernet capabilities.

Flexibility. If you regularly expand or reorganize your office space, or need to accommodate a variety of network configurations, the rapid transition time from one configuration to another that wireless provides can help reduce your network downtime. In addition, you won't have to incur the costs associated with physically rewiring office space.

Convenient information access. With wireless, you'd have the ability to extend access to key information to anyone on your staff, from anywhere in the office, even when they aren't physically connected to your wired local area network (LAN) connection. Do members of your staff regularly work away from their desks or stations, but could benefit from anytime, anywhere access to important data? Could you improve productivity by increasing access to important company systems? Do you have business processes you could streamline by reducing the number of times employees have to go back to their wired connections?  Wireless LANs are the way to go, especially where there's no existing wired network. This is especially true in leased offices, where you can't go knocking holes in walls.

Your next step is to actually build a wireless LAN, which you'll do just like this:

Identify the equipment you want to buy, such as wireless notebooks, access points, wireless LAN adapters and wireless cards.

Determine the number of users who need to have access to the network. This will help you determine the number of access points you'll need.

Plan for the connection to your wired LAN, probably in a central location and in an open environment. Your goal is to maximize the access point's wireless range. The quoted range is a maximum of 300 feet, but that's very dependent on the existing environment--walls, water pipes, cables and so on all could decrease the range. The best thing to do is complete a site survey first; if that's not possible, assume a maximum range of 150 feet, as 300 could decrease throughput.

8 0
4 years ago
Read 2 more answers
The PATH environment variable.
enot [183]

Answer:

Answer explained below

Explanation:

Yes, you can let Set-uid program that is owned by root to run your code instead of /bin/ls but it has it's own drawbacks and is actually not safe.

As you can not rely on that since some of the shells if different from the ruid drop an euid which is actually not safe.

execl("/bin/ls", "ls",(char *)0);  

run this under your main program.

Since it can have a root previlege,

-$ cd /tmp/

/tmp$ sudo su

:/tmp# gcc -o system system.c

:/tmp# chmod u+s system // changing file permissions

:/tmp# exit

exit

:/tmp$ cp /bin/sh /tmp/ls

:/tmp$ ./system

<u>Steps: </u>

1. The first thing you need to do is copy /bin/sh to /tmp.

2. After copying /bin/sh to /tmp set a new name ls but make sure your sh ->.zsh.

3. Set PATH to current directory. /tmp.

4. Compile

5. Run the program system and you can get your root previledge.

Now, with the above exmaple if you change /bin/sh soo that it points back to /bin/bash and repeat all the previous steps, you will not be able to get your root previledges.

8 0
4 years ago
What is the indication when a student conducting an electronic search of the literature is simultaneously using two databases, p
aivan3 [116]

Generate more than 2000 citations is The keywords were not sufficiently narrowed.

<h3>Why utilize PubMed as a database?</h3>

PubMed is the standard database that is used in the healthcare profession. It has the ability to link to full-text articles, provides advance researching including filtering and superior queries and links to related articles.

<h3>What are the restrictions of PubMed?</h3>

The newest articles in PubMed may not yet be indexed for MEDLINE. There is a short lag time (a few days to many weeks) between when authorities enter the PubMed database and when they are described with MeSH terms. An article you require is not indexed for MEDLINE

To learn more about PubMed , refer

brainly.com/question/602370

#SPJ4

A. There has been a great deal of research in this area.

B. CINAHL and MEDLINE duplicate the literature.

C. The keywords were not sufficiently narrowed.

D. A third database is necessary to limit the search.

5 0
2 years ago
Which of the following best explains the different between Cut and Copy? a. When you copy text you are permanently deleting it,
Vilka [71]
B. When you copy text it remains in its original location and places it on the clipboard. Cutting text removes it from its original location and places it on the clipboard

5 0
3 years ago
Read 2 more answers
Other questions:
  • For each of the following data storage needs, describe which abstract data types you would suggest using. Natural choices would
    15·1 answer
  • Why is Market Equilibrium unique and important?
    13·1 answer
  • Attempting to determine a password that is not known to the attacker is often called ____.
    13·1 answer
  • 6) Sometimes it is difficult to read a piece of code and understand what the code will do. For this reason, you may want to add
    9·1 answer
  • Which allows for saving a setting on one device and having the setting synchronize to other devices? Choose two answers.
    12·1 answer
  • Use the ______ attribute to configure the browser to render default table and table cell borders.
    12·1 answer
  • Jackson is teaching a class the concept of the binary number system. Which term will he use to refer to the leftmost bit of a bi
    11·2 answers
  • Which of the selection below does not represent a workable IP address?
    9·1 answer
  • Provide an example of making multiple paragraphs tags using html and at least 3 sentences.
    13·1 answer
  • 1
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!