1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serg [7]
3 years ago
7

When purchasing a security program, you must make sure that _____. Select 2 options.

Computers and Technology
1 answer:
Oliga [24]3 years ago
3 0

Answer:

1 ans 3

Explanation:

You might be interested in
1. Open the start file EX2019-ChallengeYourself-9-3. The file will be renamed automatically to include your name. Change the pro
lara [203]

Answer:

Omg what is this

soooo long questionn

i am fainted

7 0
3 years ago
Read 2 more answers
You can add a new slide to a presentation by
jeka94
Clicking add slide to make more slides for your project
6 0
3 years ago
Which of the following are considerations in e-commerce and e-government Internet sites? Check all of the boxes that apply.
vovangra [49]

Answer:

protection of sensitive information

Explanation:

6 0
3 years ago
I will give Brainliest to the best answer, I need urgent HELP
laila [671]
The answer is B. Range
4 0
3 years ago
Which device makes computers that are connected to separate segments appear and behave as if they're on the same segment? (Pleas
Mashcka [7]

Answer: Switch

Explanation:

 The switch is the device that is basically use for the connection for separate segment that basically appear in the similar segment in the computer network.

Switch is the ethernet that is based on the  LAN peruses approaching TCP/IP information packets containing goal data as they go into at least one info ports. The goal data in the bundles is utilized to figure out which yield ports that will be utilized to sending the information on to its proposed goal.

Therefore, Switch is the correct options.

 

4 0
4 years ago
Other questions:
  • You work for a large enterprise company that handles time-sensitive information. Your supervisor has asked that you set up a con
    8·1 answer
  • Hannah had been a newspaper carrier for four years. Each year she delivered more papers then the year before. The first year she
    13·1 answer
  • If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
    11·1 answer
  • If an app needs to perform a derived-class-specific operation on a derived class object reference by a base class variable, the
    9·1 answer
  • What is the differnce between ''P4 and 4P''
    12·2 answers
  • Extend to also calculate and output the number of 1 gallon cans needed to paint the wal. Hint: Use a math function to round up t
    12·1 answer
  • What happens if the user sysadmin invokes the mail command interface and there are no unread mail messages?
    13·1 answer
  • Which data type is 2.5?
    5·1 answer
  • What is netiquettes?. Mention any 4 netiquettes. (for class 6)​
    5·1 answer
  • Points! taga pilipinas ba kayo?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!