1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
3 years ago
6

100 POINTS!!!!!!!!

Computers and Technology
2 answers:
dlinn [17]3 years ago
7 0

Answer:

A, B and E

Explanation:

Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.

Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.

Option C is not correct as it is simply not possible.

Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.

Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).

Hope this helps!

raketka [301]3 years ago
3 0

Answer:

Option B

Securing Unattended Equipments

You might be interested in
On laptops, wireless cards tend to be attached to which panel?
Arada [10]

Answer:

NONE of the above   to fix  wireless  cards to be attached to any panel

Explanation:

Basically, the WiFi receiver and transmitter are fixed in the mother of the laptop and fixed. In case if we   open the laptop if PCI slot is   available   and suitable WiFi card and able fit it  to size then   end user he or she  can fixed and  try

The hard drive is the backside of the laptop. If e place the WiFi system will able to boot.

LCD panel it is just displayed out the unit and  its  fixed in a different  place and connected to led or LCD panel

Palm rest it places where there is no slot available  

Ram panel if we fix WiFi card then the laptop will not start.

Better by USB dongle and use it.

5 0
3 years ago
The blank one is a close up of what logo?
fredd [130]

Answer:

These are company brand logo

Explanation:

These are company brand logo, and you will find it on all products of that company, plus generally you will find them on each page of their website as well as mobile application.

6 0
3 years ago
A teacher is writing a code segment that will use variables to represent a student's name and whether or not the student is curr
SIZIF [17.4K]

Complete Question:

A teacher is writing a code segment that will use variables to represent a student's name and whether or not the student is currently absent. Which of the following variables are most appropriate for the code Segment?

Group of answer choices.

А. A string variable named s and a Boolean variable named a.

B. A string variable named s and a numeric variable named A.

С. A string Variable named studentName and a Boolean variable named isAbsent.

D. A string Variable named studentName and a numeric variable named absences.

Answer:

C. A string variable named studentName and a Boolean variable named isAbsent.

Explanation:

In Computer programming, a variable stores information which is passed from the location of the method call directly to the method that is called by the program.

In this scenario, teacher is writing a code segment that will use variables to represent a student's name and whether or not the student is currently absent.

Hence, the variables which are most appropriate for the code segment are a string variable named studentName and a Boolean variable named isAbsent.

Basically, the string variable named studentName would only accept or hold values that are alphabetic but not numerical value. Thus, the variable studentName would represent the name of a specific student.

Also, the Boolean variable named isAbsent would accept values that are either "True" or "False" because it works on the principle of Boolean logic (0 for false and 1 for true).

4 0
3 years ago
Which telecommunications device is widely used in industries that require closed communication?
Stella [2.4K]

The telecommunications device that  is widely used in industries that require closed communication are walkie-talkies. Correct answer: D

Walkie-talkies are hand-held, portable, two-way radio transceivers which enable secure communication between the two points, without being part of a network.

3 0
3 years ago
Read 2 more answers
I think its c but doubt it highly
tino4ka555 [31]

Answer:

it's actually c . Im not sure why I require so many characters to answer this

7 0
4 years ago
Other questions:
  • What is the highest decimal value we can represent with a byte?
    12·2 answers
  • Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet
    11·1 answer
  • Create an instance of your queue that accepts java.lang.String Objects. Starting with an empty queue, use the enqueue(E e) metho
    15·1 answer
  • What are some short term goals for getting a bachelors degree
    10·1 answer
  • What are 4 ratios equal to 60%?
    15·2 answers
  • Carl wants to add a new slide to his PowerPoint presentation. Which option should he use?
    6·2 answers
  • Which of the following is the most effective password?
    6·2 answers
  • Hey! PLEASE HELP!!!
    12·1 answer
  • What is a data source in OLE?​
    15·1 answer
  • Question 1
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!