1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
2 years ago
10

When would it be appropriate to run MS Office or Adobe on the Windows OS server ?

Computers and Technology
1 answer:
dem82 [27]2 years ago
7 0

It will be absolutely appropriate to run a MS Office or Adobe on the Windows OS server at any time the server is active.

<h3>What is the Windows Server OS?</h3>

The Micro-soft Windows Server OS is a server-based operating system which is designed to share the services with multiple users

The Micro-soft Windows Server OS provide conventional administrative control on:

  • data storage
  • applications
  • corporate networks etc.

Therefore, It will be absolutely appropriate to run a MS Office or Adobe on the Windows OS server at any time the server is active.

Read more about Windows Server OS

<em>brainly.com/question/4325836</em>

You might be interested in
Which activity does not allow a person to perform any work while at the shop
polet [3.4K]

Is it apprenticeship???:D

5 0
3 years ago
Rerouting traffic using arp poisoning is an attack on ________ of a network.
Arada [10]
Rerouting traffic using ARP poisoning is an attack on both the functionality  and confidentiality of a network. This is also known as ARP spoofing. This type of attack takes a legitimate IP address of another host and causes traffic redirection to an infected page. 
5 0
3 years ago
A(n) _____ allows a user to choose specific files to back up, regardless of whether or not the files have been changed.
Anna35 [415]
<span>A selective backup allows a user to choose specific files to back up, regardless of whether or not the files have been changed.</span>
7 0
3 years ago
a. Do you think the U.S. government should censor information on the Web, such as instructions for making weapons, to protect th
MrRissso [65]

Answer:

The answer is YES.

Explanation:

<em>Things pertaining to weapons, destructive materials should be shared with precautions or much better if these things should not be put online. Since internet is widely available to almost all types of users and almost to all places, we cannot be sure of who will get hold of these information. Kids could easily see this and gain knowledge and out of curiosity will try these dangerous things. Terrorist groups will also have access to these information and who knows might happen to poor innocent souls around.  </em>

<em> </em>

<em>I don't think it would violate the right of First Amendment regarding freedom of speech. Freedom should be granted on matters that are most sensible. And this time, we are just protecting the rights of children and other innocent people who can be a victim including you. We are talking about weapons and destructive materials here which is non beneficial if one could get hold of this information, in my opinion. If there is really a need to construct these things, it is better to consult an expert or an authority to ensure that nobody gets harm.</em>  

5 0
3 years ago
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
Other questions:
  • In this code, identify the repeated pattern and replace it with a function called month_days, that receives the name of the mont
    14·1 answer
  • A ____ is text and graphics that print at the bottom of every page.
    12·1 answer
  • Which does an icon on the desktop signify?
    12·1 answer
  • What is an activity that can help you enhance the appearance of your computer’s desktop?
    13·1 answer
  • 1. The global economy involves trading between people from different _____
    8·1 answer
  • Why is the cyber community important???
    8·2 answers
  • The NVCC college professor receives frequent emails disguised as official business emails. They may be requests to reset a passw
    10·2 answers
  • Computer software is regarded a bridge between the hardware and software.elaborate the statement outlining types and functions o
    10·1 answer
  • 1. Write a 400-500 word research report about Burke High School.
    6·1 answer
  • You are an IT technician for your company. One of your employees has a computer that continually reboots when it is powered on.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!