1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notka56 [123]
3 years ago
5

In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for

attempted logon retries.True/false
Computers and Technology
1 answer:
Reptile [31]3 years ago
8 0

Answer:

False

Explanation:

You might be interested in
What are the four components of the Universal Systems Model?
kakasveta [241]

Answer:

output, process, input, and feedback

Explanation:

5 0
3 years ago
REEEEEEE I STILL NEED MORE AESTHETIC USERNAMES TO GO OFF OF PWEASE HELP IMA HAVE A PANIC ATTACK!!!... next post ima do a vote :&
aev [14]

StrawberryTeaa (could be any fruit: blueberry, peach, etc)

potatoxchip

pastelsquid

SquishyPeach

GummiBear

ElegantFlaws (could add an e and remove the s: EleganteFlaw)

hunnie_b (or honee, honnie, hunni, etc)

agonyisheree

It's cool if you don't like these. I had trouble when I changed my user too. But you'll find your perfect username eventually. :)

7 0
3 years ago
Write the steps to create labels in OpenOffice writer
jenyasd209 [6]

1. Start up Open Office.Org.

2. Click on File >> New >> Labels.

3. In the label dialog box, click on the brand box. This will allow you to choose the type of paper that you use.

4. Select the type of document that you want. The usual standard is Avery, but feel free to explore and discover what you like.

5. Select if you want a single label, a document, and any other options. Some of the things you might want to do are:

- Create a variety of labels for folders or drawers

- Create a sheet of address labels

-  Create decorative labels

6. Click New Document. Here, you see a sheet of blank labels.

7. Create the type of format/placement that you want for your labels. Once you are happy with it, copy it to the rest of the labels.

8. Fill your labels with necessary information.

9. Print them out.

3 0
3 years ago
Jim has excellent oral and written communication skills. He enjoys public speaking and wants a job in which he will interact wit
fredd [130]
The best job for Jim would be public relations specialist.
7 0
3 years ago
Read 2 more answers
2. Imagine that the user at computer A wants to open a file that is on computer C's hard disk, in a peer-to-peer fashion. What p
Elis [28]

Answer:

Since there is no server in a peer-to-peer network, both computers will share resources through the network component used in linking them together such as a cable or a switch.

Explanation:

In its simplest form, a peer-to-peer (P2P) network is created when two or more computers (in this case computer A and C) are connected and share resources without going through a separate server computer. A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files or through an Ethernet cable. A P2P network also can be a permanent infrastructure that links a half-dozen computers in a small office over copper wires using switches as a central connector. Or a P2P network can be a network on a much grander scale in which special protocols and applications set up direct relationships among users over the Internet.

Please find attached the diagram of the peer-to-peer network of the two computers, computer A and computer. We have two network connections in the diagram.

The first one was implemented using a crossover Ethernet cable to connect both computers through the RJ45 LAN port on their network interface card.

In this network configuration, that will go through the NIC card from Computer C, through the cable to the NIC on computer A and vice versa.

In the second implementation, we used a switch to connect both computers using a straight Ethernet cable.

In this connection, data will go through the NIC card in computer C, through the cable connecting Computer C to the switch, through the switch, then through the cable connecting the switch to computer A and finally through the NIC card on computer A and vice versa

4 0
3 years ago
Other questions:
  • Which of the following refers to special eyeglasses from Google that provide the user with visual information directly in front
    5·1 answer
  • What are motion graphics?
    9·1 answer
  • Potatocat2UwU da best
    12·1 answer
  • What is the benefit of an arch in a building design? It permits architects to build taller structures. It allows architects to c
    14·1 answer
  • I love dog my is 16 weeks old how old is yours
    12·1 answer
  • How do you customize Track Changes in a text document?
    11·1 answer
  • The closing of the letter should have at least
    12·1 answer
  • Please help me very important
    7·1 answer
  • Which type of computer is used to process large amount of data​
    15·2 answers
  • Just help :(((((((((((((((((((((((((((((((((((
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!