1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
2 years ago
13

Threats are:_____.

Computers and Technology
2 answers:
viktelen [127]2 years ago
8 0
C - Capabilities, intentions, and attack methods of adversaries to cause harm to assets
ioda2 years ago
5 0
Threats are valid my main br
You might be interested in
What two benefits are a result of configuring a wireless mesh network? Check all that apply.
Andrei [34K]

Answer:

1)PERFORMANCE

2)RANGE

Explanation:

A mesh network can be regarded as local network topology whereby infrastructure nodes connect dynamically and directly, with other different nodes ,cooperate with one another so that data can be efficiently route from/to clients. It could be a Wireless mesh network or wired one.

Wireless mesh network, utilize

only one node which is physically wired to a network connection such as DSL internet modem. Then the one wired node will now be responsible for sharing of its internet connection in wireless firm with all other nodes arround the vicinity. Then the nodes will now share the connection in wireless firm to nodes which are closest to them, and with this wireless connection wide range of area can be convered which is one advantage of wireless mesh network, other one is performance, wireless has greater performance than wired one.

Some of the benefits derived from configuring a wireless mesh network is

1)PERFORMANCE

2)RANGE

7 0
2 years ago
Hi i need help with something:(
AleksandrR [38]

Answer: what do  you need help with?

Explanation:

4 0
2 years ago
Read 2 more answers
Consider the following code:
Elis [28]

Answer:

return tmp;

default:

tmp . token_type = ERROR;

return tmp;

1. In the code, input.GetChar() gets the next character from standard input. If GetToken() is called four times, which of the following inputs will return a token whose type is ERROR?

A. ========

A. =<======

B. ===>====

C. =====<==

D. ======<=

5 0
3 years ago
Match the correct pairs of column A and B to prove your computer
ohaa [14]

Explanation:

1 Ms word - b. Word processing software

2 Pagemaker - c desktop publishing

3 Ms excel - f finance and data analyses

4 dbase - a database management system

6 Mcafee/Norton - d anti-virus software

7 virus - h computer program that can replicate itself

8 inbox, compose,.............. - parts of an email account

5 0
2 years ago
Sites on the surface web are _____.
Westkost [7]
It’s A because surface website’s are available for everybody but the dark web is opposite

3 0
2 years ago
Read 2 more answers
Other questions:
  • Plz answer and dont put a random thing for the points
    11·1 answer
  • CHANGE POSITION OF SONG Enter song's current position: Enter new position for song: "Peg" moved to position 3 JAMZ PLAYLIST MENU
    9·1 answer
  • A company uses the account code 669 for maintenance expense. However, one of the company's clerks often codes maintenance expens
    15·1 answer
  • Downloading files is safe for most types of files except Select one: a. documents. b. pictures. c. executable files. d. music fi
    7·1 answer
  • If E=mc2 then what does F equal?
    10·1 answer
  • List the three control problems associated with competingprocesses and briefly define each.
    7·1 answer
  • HELP PLEASE!!!! Which type of prototyping is most often associated with the rapid prototyping development method?
    11·1 answer
  • You and a friend have just started a small business. How could you use the Internet to make your business successful?
    15·2 answers
  • Which engineer may design a GPS for a vehicle?
    15·1 answer
  • To use the replace feature we can simply just press Carl+h,Carl+c,Carl+r
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!