1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
3 years ago
6

100 POINTS!!!!!!!!

Computers and Technology
2 answers:
dlinn [17]3 years ago
7 0

Answer:

A, B and E

Explanation:

Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.

Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.

Option C is not correct as it is simply not possible.

Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.

Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).

Hope this helps!

raketka [301]3 years ago
3 0

Answer:

Option B

Securing Unattended Equipments

You might be interested in
What is required to become a good critical thinker? Use a process when dealing with a big issue. Practice the right skills over
Damm [24]

Answer:

Evaluate issues based on logic and reason

Explanation:

Critical Thinking is the ability to think scientifically & logically, analysing based on both formers - rather than rule of thumb.

Critical thinker engages clearly in conceptual, rational thinking. So, an important desirable characteristic of a critical thinker is 'evaluating issues based on logic and reason'.

6 0
3 years ago
11111 Power 2 sovle ​
erastovalidia [21]
123,454,321. you just multiply 11111 by itself
4 0
3 years ago
Every workplace should have an emergency plan of action.
pochemuha

Answer:

yes i agree with that the answer is in fact true

Explanation:

follow my in sta gram at grac.ehihi

6 0
3 years ago
Read 2 more answers
If an application written for an earlier version of Windows doesn't run correctly the operating system can emulate its own older
n200080 [17]

Answer:

The answer is b) Right-clicking the program icon, clicking Properties, and then applying the required settings on the Compatibility tab.

Explanation:

If you have to run an application on a specific operating system, you have to configure the compatibility by accessing in its Properties, then Compatibility tab, and configure the operating system properly.

7 0
3 years ago
. :
Rudik [331]

Answer:

Yes.  I completely agree.

Explanation:

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

Yes.  I completely agree.

7 0
3 years ago
Other questions:
  • True False The explicit location always tells you where users are located when they type the query.
    10·2 answers
  • Text, numbers,graphics, sounds entered into a computer's memory during input operations are referred to as
    11·1 answer
  • Use the Internet and other sources to research the two disadvantages of standard biometrics: cost and error rates. Select one st
    10·1 answer
  • Why do contour lines never cross?
    5·1 answer
  • The practice of using similar but not identical domain names is called _____. domain spoofing domain masquerading domain tasting
    13·1 answer
  • Complete the sentence to identify advantages of top-down programming design. Choose all that apply.
    15·2 answers
  • If you wanted to have wireless connectivity in your home or​ apartment, you would need a​ _________________ to move packets of d
    11·1 answer
  • How do i move a file in python3
    10·1 answer
  • Which of the following is not a type of Internet Job Board? Options Resume Blaster Professional Association Target Applicants We
    8·1 answer
  • Which should be addressed by stakeholders when reviewing the problem statement? Select all that apply. All possible outcomes hav
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!