1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darya [45]
3 years ago
14

With working from home now becoming a norm what is an effective network for an organization to secure its internal resources acc

ess by employees working from home

Computers and Technology
1 answer:
Umnica [9.8K]3 years ago
4 0

Answer:

Always encrypt data never store anything in plain text someone could use wireshark to pull out a data packet and if the data is not encrypted, expect things to happen.

You might be interested in
If you use your computer primarily for telnet into a remote computer, will you have a large long distance telephone bill?
Nikolay [14]

If you use your computer primarily for telnet into a remote computer, a person will not have a large long distance telephone bill.

<h3>What is telnet used for?</h3>

Telnet is known to be a kind of a network protocol that is said to be used to virtually look into a computer and to give a two-way, working hand in hand and text-based communication channel that exist between two machines.

Note that, If you use your computer primarily for telnet into a remote computer, a person will not have a large long distance telephone bill because it does not apply in any way.

Learn more about telnet from

brainly.com/question/23640188

#SPJ1

4 0
2 years ago
a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style
masha68 [24]

Explanation:

Both perform almost the same function of storing data, performing numerical calculations, formating cells, and to generate reports.

However, when dealing with data that is short term (requiring less updating) Microsoft Excel is recommended as it provides easy spreadsheet functions. Access on the other hand is a more complex application for data analysis involving constantly changing data values that are long term based. Access allows for efficient data analysis using complex tools such as import module, automated queries etc.

8 0
3 years ago
A check of dorms revealed that 38% had refrigerators, 52% had TV’s and 21% had both a TV and a refrigerator. What’s the probabil
stira [4]

Answer:

a) 31%  b) 48% c) 31%

Explanation:

We have the probabilities:

P(had TV) = 0.52

P(had refrigerator)=0.38

P(had both a TV and a refrigerator)=0.21

<em>a) a TV but no refrigerator </em>

P(a TV but no refrigerator) =P(TV)- P(both a TV and a refrigerator) = 0.52 - 0.21 = 0.31

<em>(b) a TV or refrigerator but not both </em>

P(a TV or refrigerator but not both) = P(TV) + P(had refrigerator) - 2×P(had both a TV and a refrigerator) = 0.52+ 0.38 - (2×0.21) = 0.48

<em>(c) neither a TV nor a refrigerator</em>

P(neither a TV nor a refrigerator) = 1 - ( P(TV) + P(had refrigerator) - P(had both a TV and a refrigerator) ) = 1- (0.52 + 0.38 - 0.21) = 0.31

<em></em>

8 0
4 years ago
Each object that is created from a class is called a(n) ____________ of the class.
gladu [14]
Instance





-------------------------
7 0
3 years ago
Read 2 more answers
Is hacking always wrong? Creating viruses?
nalin [4]

Answer:

yes

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • The         provides access to the Internet; may also be internal
    5·1 answer
  • When a communication exchange that does not verify the identity of the endpoints of a communication and accepts any properly for
    10·1 answer
  • The main workplace of a Windows computer is called the
    14·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • Point out the wrong statement.
    10·1 answer
  • I still haven't figured out how to award someone branliest will someone help me? If you explain to me how to do it i will do awa
    14·1 answer
  • Cách soạn thảo văn bản trên word
    7·1 answer
  • What can a government use to determine your location at a specific time as long as you're using your mobile device
    6·1 answer
  • Question 3 (5 points) ✔ Saved Janice is scrolling through her feed one day and notices that Abby said some awful things about Pa
    14·2 answers
  • You recently discovered that several key files of your antivirus program have been deleted. you suspect that a virus has deleted
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!