1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
2 years ago
6

100 POINTS!!!!!!!!

Computers and Technology
2 answers:
dlinn [17]2 years ago
7 0

Answer:

A, B and E

Explanation:

Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.

Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.

Option C is not correct as it is simply not possible.

Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.

Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).

Hope this helps!

raketka [301]2 years ago
3 0

Answer:

Option B

Securing Unattended Equipments

You might be interested in
Assume the variable sales references a float value. Write a statement that displays the value rounded to two decimal points.Assu
romanna [79]

Answer:

The statement is as follows:

print("{0:,.1f}".format(number))

Explanation:

Required

Statement to print 1234567.456 as 1,234,567.5

To do this, we make use of the format keyword, and we set the print format in the process.

To round up number to 1 decimal place, we use the following format:

"{0:,.1f}"

To include comma in the thousand place, we simply include a comma sign before the number of decimal place of the output; i.e. before 1

"{0:,.1f}"

So, the print statement is:

print("{0:,.1f}".format(number))

3 0
3 years ago
Guys I need help I cant download anything in the app store I restarted my phone and I know it's not the space on my phone I have
Simora [160]

Can you give me further explanation? For example, how is your phone not letting you download things? What model of a phone is it? what update is it on? and to what extent can you download something?

4 0
2 years ago
A taxi cab costs $1.25 for the first mile and $0.25 for each additional mile. Write an
Mumz [18]

Answer:

0.25x+1.25=8

Explanation:

Hope this helps

3 0
2 years ago
Provide a brief, high-level description of how the Internet’s connection-oriented service provides reliable transport.
mario62 [17]

Answer:

  Connection-oriented is the method which is implemented in the transport and data link layer. It is basically depend upon the physical connection in the network system.

Transmission control protocol (TCP) is the connection oriented and user datagram protocol (UDP) is the connection less network transport layer. The TCP and UDP both are operate in the internet protocol (IP).

It basically require connection and it can be establish before sending data. This is also known as reliable network connection service. The connection oriented service establish connection between the different connection terminal before sending any data or information. It can easily handle traffic efficiently.

7 0
3 years ago
Which e-mail netiquette rules did the student break? check all that apply.
abruzzese [7]

The e-mail netiquette rules that the student broke are:

  • Always proofread before sending.
  • Identify yourself by name.
  • Do not reveal personal information.

<h3>What are the email netiquette rules?</h3>

This is known to be the rules for email etiquette and they are:

  • The use of a clear, professional subject words.
  • Always Proofread all email that you send.
  • Compose the email before entering the recipient email address and others.

The e-mail netiquette rules that the student broke are:

  • Always proofread before sending.
  • Identify yourself by name.
  • Do not reveal personal information.

Learn more about etiquette from

brainly.com/question/2528165

#SPJ1

6 0
2 years ago
Other questions:
  • On the pie chart below, which “slice” represents 30% of the budget?
    8·1 answer
  • Universal Containers has a requirement to integrate Salesforce with an external system to control record access.
    12·1 answer
  • Find the word-length 2's complement representation of each of the following decimal numbers:a. 845b. 15000c. 100d. -923
    8·2 answers
  • What are the advantages of upgrading computer hardware?
    13·2 answers
  • In Java an abstract class cannot be sub-classed<br><br> ?? True<br><br> ?? False
    8·1 answer
  • Ivy is a student. She is looking for some freelance assignments during her vacation. Which of the following networking sites can
    9·1 answer
  • Design a class that has an array of floating-point numbers. The constructor should accept an integer argument and dynamically al
    7·1 answer
  • A python keyword______.
    6·1 answer
  • One of the functions of an IDE is to check for: flowchart errors. Syntax errors. memory errors X input and output.​
    12·2 answers
  • HELP FAST PLEASE
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!