1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
3 years ago
6

1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your

organization’s IT infrastructure?
Computers and Technology
1 answer:
enyata [817]3 years ago
4 0

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

You might be interested in
Hot components or sharp edges of computer is an example of what hazard​
Alexxandr [17]

Answer:

hot components or sharp edges of computer is an example of a mechanical hazard

6 0
3 years ago
Jennifer stays fit by playing games that track the movement of her body. Which platform features such a physical interface featu
Usimov [2.4K]

Answer:

kinect xbox 360.

Explanation:

for example- just dance

7 0
3 years ago
Shannon has been a member of her schools newpaper club for 2 years and attends writing workshops in her free time. Which career
kkurt [141]

D) Web content developer

Explanation:

A content developer writes a well-researched content for websites, publications, and television. They also write sales copy and other marketing material for online and offline marketing. They develop text, graphics, audios, and videos.  

Skills that help web content developer:

  1. Reading news every day  
  2. Write regularly
  3. Study end audience
  4. Develop original and unique content
  5. Research; reading other people's content as well
  6. Provide solutions through your content

Besides these, a web content writer must possess technical skills like front-end web development. They must know basic HTML formatting and search engine optimization.  

7 0
3 years ago
Write a paragraph expressing how you'd use the computer to enhance your place of work.​
Charra [1.4K]

Answer:

Have water by, have it organized, and have notes by you welcome.

Explanation:

4 0
4 years ago
PLEASE HELP ASAP!!!
Studentka2010 [4]

If you are using CSS :

table {

   border-collapse: collapse;

   border: 5px solid black;

   width: 100%;

}

td {

   width: 50%;

   height: 2em;

   border: 1px solid #ccc;

}

HTML

<table>

   <tbody>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

   </tbody>

</table>

for HTML:

<!DOCTYPE html>

<html>

<head>

<meta charset="UTF-8">

<title>Sample table</title>

<style>

table {

   border-collapse: collapse;

   border: 5px solid black;

   width: 100%;

}

td {

   width: 50%;

   height: 2em;

   border: 1px solid #ccc;

}

</style>

</head>

<body>

<table>

   <tbody>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

   </tbody>

</table>

</body>

</html>

3 0
3 years ago
Other questions:
  • 1. A video card on a modem motherboard would run best in which type of slot?
    10·1 answer
  • It is better to know the main components of all computer programming languages
    9·1 answer
  • One gigabyte can be expressed as: a.) 1,000 kilobytes b.) 1,000 bytes c.) 80,000 kilobytes d.) 1,000 megabytes e.) 8,000 bits
    5·1 answer
  • The loss of privacy data has implications:
    5·1 answer
  • A(n) ________ software installation copies all the most commonly used files to your computer's hard drive.
    10·1 answer
  • The process of identifying and eliminating bugs in a software program is most generally called
    5·1 answer
  • The data-mining technique that creates a report or visual representation is _____.
    13·1 answer
  • Difference between private and confidential data?​
    5·1 answer
  • In binary, the second digit from the right is multiplied by the first power of two, and the _____ digit from the right is multip
    10·2 answers
  • Which browser feature will delete your history, cache, and cookies the moment you close the special window
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!