100 POINTS!!!!!!!!
To safeguard against losses of computer equipment and important information, businesses should train their employees about _____. Select 3 options.

A. not using unknown devices

B. securing unattended equipment

C. avoiding natural disasters

D. monitoring colleagues

E. not using free WiFi

Answers

Answer 1

Answer:

A, B and E

Explanation:

Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.

Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.

Option C is not correct as it is simply not possible.

Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.

Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).

Hope this helps!


Related Questions

please help ASAP

Explain SQL and how is it now Oracle? Make sure you respond in 2-3 sentences.

Answers

Answer:

I think what

Explanation:

because I'm not sure my ok

25 POINTS!!!!!!!!!!!!!
When search engines republish content, it refers to _____.

A. a passive digital footprint

B. a leaking data exhaust

C. an active digital footprint

D. an active data exhaust

Answers

Answer:

im pretty sure its digital footprint

Explanation:

what tool should be used to remove fields and format data when importing?

Answers

Answer:

Power Query editor

Explanation:

Power Query editor is a Microsoft Office application, it can be utilized to remove fields and format data when importing files.

What happens if you try to open a file for writing, but the file or device is writeprotected (sometimes called read-only)

Answers

Answer:

If it is for read-only, an exception is thrown.

Explanation:

Which tab can be used to change the theme and background style of a presentation?

Answers

Answer:

Design IS the correct answer

Explanation:


What happen when a beginning programmer forgets that array subscripts start with 0?

Answers

Answer:

They failed to be a beginner.

The first element of the array is exactly contained in the memory location that array refers (0 elements away), so it should be denoted as array[0] . Most programming languages have been designed this way, so indexing from 0 is pretty much inherent to the language.

What is the second argument in the header of a for loop?


A. Initialization

B. Equalization

C. Boolean expression

D. Update statement

Answers

Answer:

if im correct i think it would be B

Explanation:

to ensure a smooth transfer the outgoing incident commander should provide

Answers

Explanation:

To ensure a smooth transfer, the outgoing incident commander should provide a transfer of command briefing to the new incident commander. This should be done in a scenario in which the Deputy Incident Commander will be replacing the current Incident Commander.

Which principle states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally? a. Net neutrality b. Internet security c. Free Basics d. Internet censorship

Answers

Answer

A : Net neutrality

Can someone please help me with this .

Answers

Answer:

whether or not it is raining outside

if the first letter of your name starts with A

whether or not you were on time to school today

the answer to a yes or no question

whether or not it is monday

Explanation:

notice how all of them are "Whether" or "if" or "yes or no" or "1 or 0"

Which of the following symbols comes first when a formula or function is written in a spreadsheet?()+=*

Answers

Answer:

Order of Evaluation in Computer:

()

Arithmetic Operators ( * / % + - ) IN THIS ORDER

Relational Operators (< ,<= , >,  >=,  ==,  !=)

NOT

AND

OR

Explanation:

So to answer the question. Here is the order in which they will be written

()

*

+

=

What is a Word document? How do you use Word documents?

Answers

Answer:

Word document is a word processor developed by Microsoft in 1983.It is used for various purpose,some of this are Creating Document such as letters, brouchers, learning activities, pamphlets, books, newspaper, comics and many more such documents For sending multiple mails with personalized format with the help of mail merge a option in word Permanently storage of document

Hope this Helps :D

Please mark Brainliest :D

Let's assume there are 500 items in a sorted list. In the worst case, about how many checks would Binary Search make to find a target value

Answers

Answer:

500?

Explanation:

I'm assuming the search will either check from the beginning or the end. If the the item is the 499 and the search starts at 0 than it will do 500 checks right? Same way if the item is at index 0 and the search starts from the 499.

In a computer network, a _____ is an expansion card located within the system unit that connects the computer to a network.

Answers

Answer:

Explanation:

Technically, a NIC is a physical card that connects to an expansion slot in a computer. Many computers and wireless devices now include an integrated networking component called a network adapter. This may be an Ethernet controller and port attached to the edge of a motherboard or a small wireless networking chip located on the motherboard.

Database performance is one of the least important factors in all database implementations. Group of answer choices True False

Answers

False
Hope this helps

A component that causes something to happen in a circuit due to the input component.​

Answers

The component that causes something to happen in a circuit due to the input component is CPU aka microprocessor

Question:
Which file type uses equations instead of pixels to create the image?

A.PDF
B.GIF
C.TIFF
D.EPS

Answers

Answer:

The file type that uses equations instead of pixels are D.EPS or vector files

Explanation:

100 POINTS!!!!!!
In RSA encryption, the pubic key is ______.

A. generated by the server

B. two prime numbers

C. known only by the server

D. known only by the user's computer

Answers

Answer:

Explanation:

it would be C. sent to the user's computer from the server

now if its private its A.  known only by the server

this is on edg i hate this class, these answers i got right

Its known only by the server. Thus the option C is correct.

What is the RSA encryption?

The RSA is the Rivest and Shamir and Adlemana encryption format where the message is sent with a code called as public key and is shared openly.

The encryption is an algorithm and is decrypted with a another key called as  the private key.

The algorithm is used for the encryption of the messages and was forest developed in 1977.

Find out more information about the RSA encryption.

brainly.com/question/17486027.

which method is useful for dimensionality reduction especially for small data-sets?

Answers

Independent Component Analysis (ICA) is based on information-theory and is also one of the most widely used dimensionality reduction techniques.

how have computer affected education​

Answers

Answer:

It encourage students to procrastinate, and reduces the efficiency of the time they spend in class. Regarding students' belief in their aptitude to multitask

What is the first thing to check for with any general connection problem?
A. See if you have the most updated browser.
B. Update your operating system.
C. Run anti-spyware programs.
D. Check the power source of all relevant devices.
SUBMIT

Answers

Answer:

D-check the power source of all relevant devices

A technician is working on a laptop and GPS is not functioning. What is a possible solution for this situation

Answers

A possible solution to a laptop whose global positioning system (GPS) is not functioning is to: verify that airplane mode is not activated on the laptop.

A laptop can be defined as a small, portable computer that is embedded with a keyboard and monitor, which is light enough in terms of weight, to be placed on the user's lap while working.

Assuming, the technician has verified that all the wireless settings on the laptop are correct.

Hence, the most likely problem for the laptop's global positioning system (GPS) not to function is that it is in airplane mode.

Generally, when an airplane mode is activated (turned on) on a laptop, all the software programs that uses wireless technology would not function, until it is disabled (turned off)

In conclusion, a possible solution to a laptop whose global positioning system (GPS) is not functioning is to verify that airplane mode is not activated (turned on) on the laptop.

Read more: https://brainly.com/question/20347476

In Oracle, the ____ command is used to change the display for a column, for example, to place a $ in front of a numeric value.

Answers

Answer:

FORMAT

Explanation:

In the previous activity the learner developed an idea for a game, this included the game plot, storyline, characters, interaction, and so on. In this activity, the learner should adapt the game concept and create a game to run on a mobile platform. Create a game for smartphones featuring the characters you created in the previous activity. You may visit video game websites and research online to find out how creating games for smartphones differs from creating games for other platforms. Specify for which mobile operating system you will create the game and give reasons for your choice. Your response should include the following points:
NEED HELP ASAP! Game development question.
State the basic game concept, the game genre, and game rules and objectives.
Explain how you will adapt the game for the smartphone: include descriptions of the smartphone’s features and restrictions and how they will enhance or hamper the playing experience.
Describe the pros and cons of developing games for various mobile platforms, including your choice of platform.

Answers

Answer:

I hope this helps, this is my first time doing an answer in Brainly.

Explanation:

The game concept will be this, your character, being a green lizard, will jump from platform to platform. Constantly scrolling up with the character, but if you fall behind, it's game over.

If I know anything about smartphones is the the screens are usually tiny, and are very hard to play on. So I will impliment motion controls. If you tilt the screen in the direction you want the lizard to go, it will follow that tilt.

The pros is that it's a lot more easy when developing the game, the cons is that the games are usually super small.

Step 4: Write your GDD THE GAME IS ABOUT FLAPPY BIRD
Now that we’ve brainstormed a bit, set up a Game Design Document with the following headers, then complete each section. It may be helpful to complete this Activity at the same time as you are reading through the Unit.

Title
Description
Purpose
Audience
Genre
Gameplay Narrative
Gameplay Style
Player State
Character Descriptions
Objectives, Operation, Obstacles, Outcome
Game Mechanics
Game Interface
A Game Design Document is called a “living document” because it gets updated as you go along in the game design process. So, think about what you write as a draft. As you continue into the second part of the course, you might find that you want to adjust your ideas and goals for your game, and this is totally okay! Writing it down now allows you to do some good goal-setting and get all your ideas out into one place that you can refer to later.
100 POINTS AND BRAINEST FOR FIRST ANSWER
Submit your brainstorming work and your Game Design Document.

Answers

IAnswer:

I am not sure

Explanation:

i think game mechanics

Answer: it might be game mechanics

Explanation: im not sure

fast help me Behaving safely and ethically online involves _____.

agreeing to all online third-party agreements
agreeing to all online third-party agreements

always telling the truth about others, even negative things
always telling the truth about others, even negative things

educating yourself and others about cybersecurity
educating yourself and others about cybersecurity

always saying exactly what you think and feel

Answers

Based on online ethics and standard practice, behaving safely and ethically online involves "educating yourself and others about cybersecurity."

What is online ethics?

Online ethics is a contemporary term that is used to cover all the standard practices of online users which seek to protect private information, allow freedom of expression, prevent libel, etc.

Some of the Online Ethics

Private stays privateAvoid misquotingAvoid plagiarismProvide reference where possibleBe civil Never go overboard, etc.

Hence, in this case, it is concluded that the correct answer is "educating yourself and others about cybersecurity."

Learn more about online ethics here: https://brainly.com/question/8348173?section=similar

Answer:

educating yourself and others about cybersecurity

A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

Answers

Answer:

A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability 2. A cybercrime is an online or Internet-based illegal act 3.

A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

It should be noted that a computer security risk is an action that could cause damage to software or hardware.

A computer security risk can result from unpatched software, misconfigured hardware, software and bad habits.

Read related link on:

https://brainly.com/question/21507976

A(n) _______ is a set of colors that complement each other and are designed to work well in a presentation.

Answers

Answer: color theme

Explanation:

_____ suites provide a collection of utility programs designed to alert users when certain kinds of viruses and worms enter their system.

Answers

Anti-virus software.........

come on i need help asap!!

Answers

Answer:

human resources

information technology

production

finance

Other Questions
6 times the sum of a number n and 4 is 54 pls show work for meh Goals should beRealistic Tim consuming DreamsReally hard to reach Can someone please help me_____ All the students are exited about the Valentines Day dance_____ many of the girls have already bought their dresses_____ sentence structure The options are:Independent Compound ComplexCompound-complexSimple How many 3 card hands are possible with a 36-card deck? A new drug Selttiks is proposed to treat sadness. Doctors are worried it also causes nausea. The proportion of 560 people who got sick while taking Selttiks was 13%. The proportion of 560 people who got sick while taking a placebo was 16.6%. Find a 89% confidence interval for the difference in the proportions that get sick with Selttiks vs the placebo. Roger works as a sales manager for Hi-Tech Solutions, a company that performs software consulting services. While working for Hi-Tech, Roger started a side business doing software consulting work and made $50,000 in it over the course of three years. Roger never informed Hi-Tech of his lucrative side business. If a court finds that Roger breached his duty of loyalty and orders him to pay Hi-Tech the $50,000 in profits he earned from his secret business, this is known as :____________a. reinstatement. b. disgorgement. c. restoration. d. replenishment. If no preliminary study is done, what size sample must be taken if the director is to say with 90% confidence that the sample estimate is within 2% of the population proportion Mallory works at a lifeguard at a local pool on Saturday she worked 6.5 hours and earned $61.75 how much Mallory does earn per hour Explain, how can we say it is a haiku?Mahirap palaAng lima-pito-limaPantig na tula Give two examples of someone who comes from an individualistic culture. (Check all that apply) Como se describe al pdrino de chela en el cuento del puente de carlos salazar herrera how do I convert these probs? into base 10 4120_7, A3B_12, WXYZ_36 A biologist has two brine solutions, one containing 10% salt and another containing 25% salt. How many milliliters of each solution should she mix to obtain 1 L of asolution that contains 23.5% salt?a. 50 milliliters of the first brine solution, 950 milliliters of the second brine solutionb. 150 milliliters of the first brine solution, 850 milliliters of the second brine solutionOc. 100 milliliters of the first brine solution, 900 milliliters of the second brine solutionO d. 200 milliliters of the first brine solution, 1,000 milliliters of the second brine solutione. 900 milliliters of the first brine solution, 100 milliliters of the second brine solution The sale price of an item is four-fifths the original price of the item, x.Which statement explains why both 45x and 0.8x can find the sale price of the item? Imagine you get pulled into a meeting in 30 minutes with a CFO of a $5 billion market cap company. What 3 things would you look at beforehand Using the five types of relationships discussed in this Lesson, write a paragraph showing these types of relationships with humans. For example, two people might be in competition for the same job. plzzz Help Which of these excerpts from The Time Machine creates a mood of foreboding?Group of answer choicesFor some way I heard nothing but the crackling twigs under my feet, the faint rustle of the breeze above, and my own breathing and the throb of the blood-vessels in my ears. Then I seemed to know of a pattering behind me. I pushed on grimly. The pattering grew more distinct, and then I caught the same queer sound and voices I had heard in the Underworld. There were evidently several of the Morlocks, and they were closing in upon me. Indeed, in another minute I felt a tug at my coat, then something at my arm. And Weena shivered violently, and became quite still.Within the big valves of the doorwhich were open and brokenwe found, instead of the customary hall, a long gallery lit by many side windows. At the first glance I was reminded of a museum. The tiled floor was thick with dust, and a remarkable array of miscellaneous objects was shrouded in the same grey covering. Then I perceived, standing strange and gaunt in the centre of the hall, what was clearly the lower part of a huge skeleton.It was after that, I think, that we came to a little open court within the palace. It was turfed, and had three fruit-trees. So we rested and refreshed ourselves. Towards sunset I began to consider our position. Night was creeping upon us, and my inaccessible hiding-place had still to be found. But that troubled me very little now. I had in my possession a thing that was, perhaps, the best of all defences against the MorlocksI had matches! I had the camphor in my pocket, too, if a blaze were needed.Looking at these stars suddenly dwarfed my own troubles and all the gravities of terrestrial life. I thought of their unfathomable distance, and the slow inevitable drift of their movements out of the unknown past into the unknown future. I thought of the great precessional cycle that the pole of the earth describes. Only forty times had that silent revolution occurred during all the years that I had traversed. i need help please help Simplify Write the equation of the line shown in the graph. Write the equation in slope-intercept form.y = ________ A woman who postpones pregnancy until she is over the age of 35 will likely find that her chances of conceiving _____, whereas her risk of having a live baby with chromosomal problems will _____.