network does not provide security to us​

Answers

Answer 1

Answer:

May this answer be helpful for you

Explanation:

1.False.

1.False. 2.Network security has many policies which ensure the secure surfing of the internet.

1.False. 2.Network security has many policies which ensure the secure surfing of the internet. 3.The policies do not allow unauthorized access. 4.Thus, network does provide security to us.


Related Questions

The extension on the end of a file name will tell you what format the file is.
O True
O False

Answers

The answer is true

The .whatever tells you what format the file is

The extension on the end of a file name will tell you what format the file is True statement.

What is a file file extension?

A file extension is known to be a kind of file name extension that is said to often ends with a file that one can be able to use to identify the type of file that exist in an operating systems.

Conclusively, due to the above, that is, the extension on the end of a file name will tell you what format the file and thus it is a true statement.

Learn more about extension from

https://brainly.com/question/10713675

#SPJ2

Data is best described as

statistical details.
factual or numerical information.
calculations and conclusions.
multimedia content.

Answers

Answer:

The answer is B

Explanation:

TOOK THE TEST

Answer:

B: factual or numerical information.

Explanation:

Edge 2020

what is a Java software​

Answers

Answer:Java is a set of computer software and specifications developed by James Gosling at Sun Microsystems, which was later acquired by the Oracle Corporation, that provides a system for developing application software and deploying it in a cross-platform computing environment.

also: 'Java can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network. It can also be used to build a small application module or applet (a simply designed, small application) for use as part of a Web page.

Explanation:

What is iteration?????

Answers

Answer:

Iteration is a program repeated untill a condition is met

Explanation:

Explanation:

Iteration in programming means repeating steps, or instructions, over and over again. This is often called a ‘loop’.

Iteration is the repetition of a sequence.

Algorithms consist of instructions that are carried out (performed) one after another. Sometimes an algorithm needs to repeat certain steps until told to stop or until a particular condition has been met.

Public-key cryptography (a form of asymmetric cryptography) is an encryption method that's widely used because: 1) it is computationally infeasible to computer the private key based on the public key, 2) it's easier to share one public key than billions of private keys, 3) it's much tough to crack asymmetric encryption than symmetric, 4) it's more secure because the private keys do not even need to be transmitted or revealed to anyone.

A. 1 only
B. 2 only
C. 3 and 4 only
D. All 1-4 are correct

Answers

Answer:

C.

Explanation:

Specific keys that each finger is responsible for typing is called A. ergonomics B. Touch typing C. Key reaches D. Posture

Answers

Answer:

D

if your key positioning and posture is right, each finger would be put up to use.

In your own words explain the following about the Domain Name System
What problem does the DNS solve?
How does the DNS help the world wide web scale so that billions of users can access billions of web pages?

Answers

Answer:

Suppose you want to access brainly.com.  You type that into your favorite browser and hit enter.  Your computer does not know how to get to brainly.com.  This is the DNS comes in.  The DNS looks for brainly.com and maps it to an IP address (eg. 104.17.74.91).  Your computer can easily find 104.17.74.91 in order to connect you to questions and answers on a variety of topics.

30% of the mass of an objects is 24 kilograms. use this fact to find:
a) 60% of the mass
b) 10% of the mass
c) 50% of the mass
d) the whole mass of the object​

Answers

Answer:

chemați. mfvd5. fn. cfcfcfcfcfcfcf 4t

what is the easiest way not to get distracted from doing my school work?

Answers

Answer:

really you want the answer

Answer:

Find a good quiet place, Turn off your phone. put it away, wear comfy clothes, Lock your door. Dont eat, But drink water

Explanation:

Hope this helped!

Read the following scenario, and then answer the question below.

Two of the computers at work can't go online and print over the network. The computers may be trying to share the same IP address.

Which strategy is most likely to solve the problem?​

Answers

Answer:

I think they need to get different up adresses

Explanation:

They may be overloading the network if they are sharing an IP address so it doesn’t k ow what to print

Answer:

the best way is to logging off one of the computers, and then logging back on.

have a nice day.

Maria wants to create an image for a Web page. Maria should use _____. help me

Answers

graphics software
Hope it helps

Answer:

Maria wants to create an image for a Web page. Maria should use a graphics software

Explanation:

A graphics software is a tool to create images, logos and graphics. Graphic software provide different options to make and edit an image. So if someone has to create an image, he/she should use a graphic software.

Hence,

Maria wants to create an image for a Web page. Maria should use a graphics software

Anna always has a hard time finding files on her computer because she does not know where she saved them. This also affects her productivity at work. Anna is lacking good skills.

Answers

Answer:

Organization skill

Explanation:

THIS IS THE COMPLETE QUESTION

Anna always has a hard time finding files on her computer because she does not know where she saved them. This also affects her productivity at work. Anna is lacking good ______ skills.

From the question we are informed about Anna always who has a hard time finding files on her computer because she does not know where she saved them. This also affects her productivity at work. In this case, the skill she is lacking is file management skills. File management skills is a skill that is required in the setting up system that effectively handle digital data. File management gives enablement to search data in searchable database which allows the user to find data easily on the computer. Some of the advantages of file management are:

reduce storage space,better back up system, easier retrieval of file, as well as file security.

Answer:

She is lacking good Organization skills.

Explanation:

what is data modelling​

Answers

Answer:

Data modeling is a process used to define and analyze data requirements needed to support the business processes within the scope of corresponding information systems in organizations. Data modeling defines not just data elements, but also their structures and the relationships between them.

Explanation:

there ya go.

Data modeling is when you create information for a data model system. Sometimes, this data model is usually implemented into a database, which then results in database modeling

any one want to play freefire with me and my duo​

Answers

Answer:

hahahaha you thought

Explanation:

Is there a way to using Microsoft apps for iOS?

Answers

Answer:

nope there is no way ut some games or apps is also can download in ios and also in microsoft

you can fit more RAW files on a memory card than JPEG files. true or false

Answers

Answer:

true

Explanation:

please help i will give you brainlest!!!!!!!!!

Answers

Answer:

Letter C

Plagiarism is copying someone's work or stealing other original ideas.

What is the shape of a CARDIOD pick up pattern?

Answers

ayoooooo? its shaped like a butt

Which of these are examples of data sources? Check all that apply.
-central processing units
-databases
-electronic archives
-folders
-online libraries
-spreadsheets

Answers

Example of data sources include the following:

Online libraries

Spreadsheets

What is sources of data?

Sources of data is the main or primary location from where data is being obtained.

For computer programs, the main sources of data include:

File,

Data sheet,

Spreadsheet,

Online libraries

Therefore, examples of data sources are the online libraries and spreadsheets.

Learn more about data here:

https://brainly.com/question/25720881

#SPJ2

Answer:

B,C,E,F

Explanation:

Write a program to simulate a Fruit Machine that displays three symbols at random from Cherry, Bell, Lemon, Orange, Star, Skull.
The player starts with £1 credit, with each go costing 20p. If the Fruit Machine “rolls” two of the same symbol, the user wins 50p. The player wins £1 for three of the same and £5 for 3 Bells. The player loses £1 if two skulls are rolled and all of his/her money if three skulls are rolled. The player can choose to quit with the winnings after each roll or keep playing until there is no money left.

1. Write pseudo or flowchart for this task ready for it to be coded in class tomorrow - 1/12/2020
2. needs - variable, iteration - while because of some condition, selection - it's all the IFs, Sequence - be careful of sequence


please this is urgent i beg u

Answers

Answer:

please read these terms and search for Google app

A taxi cab costs $1.25 for the first mile and $0.25 for each additional mile. Write an
equation for the total cost of a taxi ride, where x is the number of miles that you can ride for
$8.00.

Answers

Answer:

0.25x+1.25=8

Explanation:

Hope this helps

How can we work together to fix our website

Answers

Answer:

you can upade the code  

make a off topic page

Explanation:

I thnk this will help with the spamers

Which is a benefit of peer-to-peer networking?

Answers

Answer:

Easy file sharing: An advanced P2P network can share files quickly over large distances. Reduced costs: There is no need to invest in a separate computer for a server when setting up a P2P network. Adaptability: P2P network extends to include new clients easily.

Ask the user for their full name (using a single input), write a section of code below that will correctly print the users first name and last name on separate lines.

Answers

name = input("Enter your name: ")

lst = name.split()

print(lst[0])

print(lst[1])

We split the name apart at the spaces and print out the object at index 0, which is the first name and at index 1, which is the last name.

I hope this helps!

Write a Python program that calculates the product of all odd numbers between 1 and 1111, using the for loop and the range function.

Answers

Answer:

answer = 1

for i in range(1, 1111, 2):

   answer *= i

print(answer)

Explanation:

The result is: 1867661487583158519937007997593731768674710592395936453814589179168970488627486922435352153202170177468180449036460330489883227953920786805094193880129176242750706494757506292242513096874889912138041641434433821228611320718319399459865627764413363015842622109227229695987391658459583021203370153652674793604946843921588657975214048903891877905278158326695472816452229608456097609116519045810867129060580585147954461081838126748579250596173066031868654116793938302170110362754673884690241925481893823673916009076351110558645412222773118927086453253674705050538434792606852567079575854841390964177213252754015145265445261542957834970632574543428225247242488955307645556148572185949820791464992259236192606284766174288372574869081003838416637821295590820946372288692264397746175279884156247638880688731656093911498376399334121390341627286952705811600644061948275361728751637451512725082376969150560038940786375629981515779279396085386198351152320090978588430101676704229895114350886499131456005886390334346220238579530541662198038029084029447261270224035584412162390327122500762501298502491940263477106501424307313102108306951120296510397274150253596249878157904612419169854362011297315737418348969961989528582716326033338095891309343771263480361729925724962879195879868448756011080612327885089033870698092857432512937836751109257833022671357201287794589267907954829015862301288301132960212133783812669550047024479011437136932727298699319362640380859375

which network topology is the cheapest?

Answers

The star and extended star are inexpensive

What is a characteristic of high-level languages?

A.
They have the fastest execution speed on computer processors

B.
They use unfamiliar English words to describe instructions and memory locations.

C.
They expect programmers to be familiar with computer architecture.

D.
They use mathematical symbols such as “+” and “-” to denote addition and subtraction operations.

Answers

Answer:

B SIR HOPE THIS HELPS (☞゚ヮ゚)☞☜(゚ヮ゚☜)

Explanation:

Answer:

B is not the answer on plato


The variable isopen is to be used to indicate whether or not a store is currently open. Which of the following is the most appropriate data type for isOpen?

Answers

Answer:

Boolean

Explanation:

Though the options are missing, the question is still answerable.

From the question, we understand that isOpen can only assume any of two values which are: open or close

i.e. whether a store is opened or currently.

When a variable can only assume any of two values, the most suitable data type of that variable is Boolean.

Hence, Boolean answers the question.

Three popular types of ____ are handheld computers, PDAs, smart phones.

Answers

Answer:

portable media players, and digital cameras

Explanation:

Three popular types of mobile devices are handheld computers, PDAs, and smart phones.

What are smart phones?

Smart phones can be defined as hybrid versions of mobile devices that are designed and developed to have more features, so as to enable them run different applications, functions and tasks with the aid of software applications such as web browsers, multimedia player, etc.

In Computer technology, three popular types of mobile devices are handheld computers, PDAs, and smart phones.

Read more on smart phones here: https://brainly.com/question/15867542

#SPJ2

please answer i will give you brainelst!!!!!!!!!!

Answers

Answer:

I think it's D

Explanation:

Hope you don't get it wrong

Other Questions
Solve the system by substitution. y = -7x. y = -5x + 10 what is the y intercept of f(x)=(1/2)x? What is the primary difference between an RN and LPN/LVN?A. RNs teach patients, and LPN/LVNs carry out routine tasks.B. RNs care for patients that are stable, and the LPN/LVN does not.C. RNs assign tasks to the nursing assistant, and the LPN/LVN does not.D. RNs do not perform patient care, and LPN/LVN does perform patient care. I need help the answers that are there are SSSSASASAAASHL and Not enough information Why is it a negative thing for Hammurabi to claim thatthe laws cannot be changed in his kingdom?I Why do some parents like to add water to their kids' juice? Why dilute it? someone help me one pls Which two numbers have decimal forms that are non teminating and non repeating? a) 1/7 b )square 2 c) square 9/144 D) E) 12/57 Here is an equation that represents a function: 72x+12y=60. Select all the different equations that describe the same function: A.120y+720x=600 B.y=5-6x C.2y+12x=10 D.y=5+6x E.x=5/6-y/6 F.7x+2y=6 G.x=5/6+y/6 While coming home from school, you were trying to cross the road at a busy traffic point. Suddenly , you observed an old man trying to cross the road. You felt sorry for him and helped him out. Pen down your feelings about the old man and hisSituation in your diary in about 100-150 words (if anyone give me a correct Answer I will give them lot of points) This is an example of which type of conflict?O character vs. selfcharacter vs. othersO character vs. societyO character vs. natureRead the excerpt from Part 2 of "To Build a Fire."He spoke to the dog, calling it to him; but in his voicewas a strange note of fear that frightened the animal,who had never known the man to speak in such a waybefore. Something was the matter, and its suspiciousnature sensed danger-it knew not what danger, butsomewhere, somehow, in its brain arose anapprehension of the man. It flattened its ears down at thesound of the man's voice, and its restless, hunchingmovements and liftings and shiftings of its forefeetbecame more pronounced; but it would not come to theman. He got on his hands and knees and crawledtoward the dog. This unusual posture again excitedsuspicion, and the animal sidled mincingly away.Mark this and returSave and Exit A. 3(x + 2) = 18B. X + 2 = 18 The value of this expression is 30.7 X 4-2+8=2If parentheses are put around 2 + 8, what is the value of the expression? A company's current stock price is $50.00 and its most recent dividend was $2.00 per share. Since analysts estimate the company will have a 5 percent growth rate, what is its expected return? PLZ ANSWER!! ONLY IF YOU ARE CORRECT (SELECT ALL THAT APPLY) In the case of a blank layout , machines , tools, equipment, and labor move toward the product, which does not move from its place 1. Is this relation a function? Explain. 2. Is this relation linear? Explain.Pls help this is due soon Thesis statment for "character is what you are in thd dark Please help me!! Please!! I have a small business with only two computers. These computers are connected directly together and share resources. What type of network is established between these computers?ExtranetPeer-to-PointInternetPeer-to-Peer