1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
3 years ago
6

100 POINTS!!!!!!!!

Computers and Technology
2 answers:
dlinn [17]3 years ago
7 0

Answer:

A, B and E

Explanation:

Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.

Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.

Option C is not correct as it is simply not possible.

Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.

Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).

Hope this helps!

raketka [301]3 years ago
3 0

Answer:

Option B

Securing Unattended Equipments

You might be interested in
Write a Java program that calculates and prints the monthly pay check for an employee. The net pay is calculated after taking th
ycow [4]

Answer:

  import java.util.Scanner;

public class salary{

    public static void main(String []args){

       

       System.out.println("Enter the monthly pay: ");

       Scanner scn = new Scanner(System.in);

       double salary = scn.nextDouble();

       double result = salary-(salary*0.15*0.035*0.0575*0.0275*0.05)-75;

       

        System.out.println("The net salary is: "+result);

    }

}

Explanation:

first import the Scanner class for taking the input from user.

then, create the main function and print the message for enter the salary from user.   scn.nextDouble() store the value enter by user into the result.

after that, calculate the net salary by calculating the deduction amount and then subtract with salary.

finally, print the result on the screen.

8 0
4 years ago
1. provides a list of at least five SSIDs and the
taurus [48]

One of the most important ways to provide wireless security is through:

  • The use of encryption.

<h3>What is Wireless Security?</h3>

This refers to the network authentication and use of encryption to secure a network from unauthorized access or compromise of the network by an external agent.

With this in mind, we can see that SSID is a WiFi network name and it makes use of WPA2 security encryption to protect the wireless network through wireless encryption protocol.

Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more about wireless security here:
brainly.com/question/14449935

8 0
2 years ago
The domain name is passed to a domain name server, which maps it to the correct IP address, and then the code behind the page is
maxonik [38]
It's an incomplete, therefore wrong, description of "<span>B. Browser using a URL to access a web page"

After the nameserver returns the IP address of the domain, the client machine makes the page request from the IP address. The client's browser parses (reads) the HTML code, makes calls to the server for any other files (href, img and media) and displays the HTML content according to visual specifications in the CSS (Cascading Style Sheet).
</span>
6 0
3 years ago
What is the output for the code below?
alisha [4.7K]
What is output by the code below? int[] array = {33,14,37,11,27,4,6,2,6,7}; System .out.println(array.length); ... int[] array = {5,10,3,6,9,15}; ... int total = 0; ... output by the code below? int j=1, tally=0; while(j<9) { tally++; j++; } System.out.print(tally);.
From quizlet
5 0
3 years ago
The three main types of banks (Large Traditional, Credit Union, Online or Online-Only) have many tradeoffs with respect to techn
Margarita [4]
So from a little research, this is the order:
Online Bank, Credit Union, Traditional Bank

Online bank is the highest one since it uses technology like the internet to transfer money or to pay bills easily.
Credit union is same as an online bank where it also uses internet offering mobile and online banking services.
Traditional bank is the most common type of bank. They also offer mobile banking but they still use the old procedure of banking like depositing and withdrawing money, face to face.
5 0
3 years ago
Read 2 more answers
Other questions:
  • A(n) ______ is a laptop computer that can convert into a tablet-like device.
    13·1 answer
  • Which of the following is a reason that a drug may not receive FDA approval?
    15·1 answer
  • Michael is trying to remember his friend’s new cell phone number. He repeats it in his mind until he gets the new number entered
    8·2 answers
  • You receive an offer in the mail that says you're eligible to win a cash prize if you place some stickers on a form and return i
    5·1 answer
  • The model for Diminishing Marginal Utility is ______ in nature.
    12·1 answer
  • When would it be beneficial to make a copy of a document
    10·1 answer
  • What layout manager should you use so that every component occupies the same size in the container?
    5·1 answer
  • Maya is preparing a presentation for her science class on how solar panels produce energy. Why would a
    11·2 answers
  • Is climate change a man-made problem or a natural occurrence ? Why or why not ?
    8·1 answer
  • Write any two word processing software​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!