1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pashok25 [27]
3 years ago
10

You understand the different standards around cabling and how to terminate your own Ethernet cables. Let’s discuss the pros and

cons of making your own cables versus buying premade cables.
Computers and Technology
1 answer:
mina [271]3 years ago
3 0

Answer:

hi

Explanation:

because I am new gggg and I will be

You might be interested in
Adding Calculator Write a program that simulates an adding machine. Input to the program will be integers, submitted one per lin
Marysya12 [62]

Answer:

This is really hard. I tried doing this problem but of was a real pain. I honestly can't help. I tried. sorry mate.

7 0
4 years ago
6. What is the correct way to write 340,000,000 in scientific notation? (1 point
givi [52]

Answer:3.4X10^8

Explanation:

4 0
3 years ago
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
vodomira [7]

Answer:

Phishing.

Explanation:

Networks and computer systems in a network are susceptible to cyber attacks. A cyber attack is a networking term that describes a situation where a network is penetrated by a malicious process or program induced by an attacker or attackers.

A cyber attacker's sole intention is to steal information needed to achieve a malicious and devastating action to a client's personal assets. An example of such attacks is phishing.

Phishing is an attack that collects client's personal information at an imposter website after receiving an email from a person masquerading as an employee from a bank.

5 0
4 years ago
You are the information security officer at a medium-sized company (1,500 employees). the cio asks you to explain why you believ
Ivahew [28]
If your CIO asks such a stupid question run for the hill, he should not hold that title.
Every company, small, medium or large should have Firewalls, Intrusion Detection, Managed Virus Protection Software at the very least. Windows is the most deployed OS in the world and of course the main target of hackers i.e Viruses. MAC's to a lesser extent and Unix while probably the least vulnerable are still not immune to Viruses/Trojan and other Malware.

Users can still be the victims of trojan horses, phishing scams, and other online fraud. There<span> is no such thing as a 100% safe computer, a </span>Mac<span>, Windows, and even Linux are all capable of being infected with a </span>virus<span> or other malware.
</span>
Lastly, physical access to any computer that is not encrypted is vulnerable.
5 0
3 years ago
A balance is used to measure
Sindrei [870]
The mass of an object or objects. A balance<span> scale </span>measures<span> weight, but not in pounds or ounces, it </span>measures<span> in grams.</span>
6 0
4 years ago
Other questions:
  • In the excerpt above, what can be inferred by the statement, “The Dillingham had been flung to the breeze during a former period
    13·2 answers
  • Which qualifications are typical for someone working in Marketing Information Management and Research?
    6·1 answer
  • You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how
    7·1 answer
  • Which of the following Wi-Fi chalking method refers to drawing symbols in public places to advertise open Wi-Fi networks?
    13·2 answers
  • The Many–Hands Problem makes it difficult to determine who should be held accountable for mistakes since:
    7·1 answer
  • What is the value stored at x, given the statements:
    11·1 answer
  • Does any body know the name of this sensor? ​
    11·1 answer
  • Please help!!!! will mark brainliest!!
    7·2 answers
  • What is said to be the first mechanical calculator​
    7·2 answers
  • shayne keeps his home office computer on his desk. he wants to use a wireless keyboard and mouse, and to send output to his prin
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!