1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
romanna [79]
3 years ago
8

I'm surprised I haven't even got a single warning yet lol

Computers and Technology
1 answer:
dangina [55]3 years ago
7 0

Answer:

Thats good

Explanation:

Thanks for the points~! ;)

You might be interested in
Why would someone need to use tools like IECacheView or MyLastSearch on a system? Do companies have the right to search a workst
natali 33 [55]

IECacheView helps a user quickly and easily access and read the cache folder of Internet Explorer. Information such as filename, content type, number of hits, expiration time, and the full path of cache filename can be accessed. With all this information, investigators can look at what users are accessing on the web. Anything accessed on IE by an employee at his or her workstation can be searched by the company. This brings us to the question; do companies have the right to search a workstation they issued to their employees using IECacheView?

In my own opinion, I honestly think that it is not right to search an employee’s workstation using IECacheView or any other tool whatsoever. Under the law, employees have reasonable rights to privacy. These rights prevent employers from searching their employees. Unless there is evidence of computer crimes or misconduct, employees have a greater expectation of privacy

6 0
4 years ago
Which layer includes the physical transmission medium (cables or wireless media) that any network must use to send and receive t
Yuliya22 [10]

Answer:

The correct answer to the following question will be "Physical Layer".

Explanation:

  • The lowest layer of the OSI reference model is the physical layer. It's in charge of having to send bits from one desktop to the next.
  • This layer isn't acquainted with the interpretation of the parts and is concerned with setting up a physical wireless connection and sending and receiving signals.
  • This layer relies on aspects of the hardware, such as wires, transmitters, and network interface tokens.

Therefore, it will be the right answer.

4 0
3 years ago
What number is represented as a binary code of 101110
mariarad [96]

Answer:

46 i think

Explanation:

sorry if thats wrong

4 0
2 years ago
Read 2 more answers
________ is a technique where the general characteristics are kept and the details are hidden.
valentinak56 [21]

Abstraction is a technique where the general characteristics are kept and the details are hidden.

<h3>What is abstraction?</h3>

Abstraction is the way a person used in  hiding information that are not needed or unwanted.

Note that one can use abstraction when using abstract class and interfaces and as such, Abstraction is a technique where the general characteristics are kept and the details are hidden.

Learn more about abstraction from

brainly.com/question/7994244

#SPJ1

5 0
2 years ago
Why is the rate of increasing performance slowing down? Please help
Tcecarenko [31]
What are you trying to say? 

6 0
3 years ago
Other questions:
  • Write a java program called allDigitsOdd that returns whether every digit of a positive integer is odd. Return true if the numbe
    6·1 answer
  • A user is claiming a host can be reached via the IP address but not through the name. What should a technician do first to resol
    13·1 answer
  • Why do most programmers indent the conditionally executed statements in a decision structure?
    7·1 answer
  • There are _______ pints are in 8 cups.
    10·2 answers
  • What is the best game of 2020 in pc​
    12·2 answers
  • Page Up and Page Down keys fall under the ? keys category.
    14·2 answers
  • What occurs when a website can know enough about a person's likes and dislikes that it can fashion offers that are more likely t
    9·1 answer
  • A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than t
    12·1 answer
  • Test unit 8 edhesive answers ​
    15·1 answer
  • Alguien que me pueda ayudar diciéndome las características de Visual Object en programacion porfavor?!
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!