Which of the following are disadvantages of networks? Check all of the boxes that apply.
Network intruders can access all computers on a network.
Networks are costly to set up.
Setting up networks does not require special knowledge.

Answers

Answer 1

Answer:

• Network intruders can access all computers on a network.

• Networks are costly to set up.

Explanation:

A network can be defined as a connection between the internet and the computer. A network is a means by which information or data are transmitted from one computer to another.

We have various types of networks and some of them are:

a) Local Area Network (LAN)

b) Wireless Local Area Network (WLAN)

c) Wide Area Network (WAN)

d) Campus Area Network (CAN)

e) Metropolitan Area Network (MAN)

f) Personal Area Network (PAN) e.t.c

The disadvantages of network are:

a) Network intruders such as computer hackers can easily access all computers on a network.

b) Networks are costly to set up.

It is of outermost importance that a network used by a computer is secured using security such as encryption in other to prevent data loss , hackers and exposure of information that are sensitive to computer users.

Answer 2

Answer:

A and B

Explanation:


Related Questions

uncomment each where statement one at a time and *; * run the step to observe the rows that are *; * included in the results.

Answers

The step to observe the rows that are statement one at a time are --  city = 'New York';population > 5000000;New York' AND population > 5000000.

What is the population ?

The population refers to the total number of people inhabiting a certain area. It can be measured by taking into account a variety of factors, such as the number of people living in an area, their age, gender, and other factors. Population size can vary dramatically from one place to another. In some areas, the population may be very small, while in others, it may be quite large. Population size is an important factor to consider when looking at a region's economic and social development.

To learn more about population

https://brainly.com/question/23275071

#SPJ4

write the definition of a subclass, named window with the following: a constructor that invokes the desktopcomponent constructor passing it that value "window" for the type. an onclicked method that prints out the message "window selected" to system.out

Answers

Here's a step-by-step explanation:

1. A subclass is a class that inherits from another class, called the superclass. In this case, the Window class will inherit from the DesktopComponent class.

2. To create a subclass named Window, you will use the "extends" keyword followed by the superclass name DesktopComponent:

```java
public class Window extends DesktopComponent {
}
```

3. Next, we need a constructor that invokes the DesktopComponent constructor and passes the value "window" for the type. We can achieve this using the "super" keyword:

```java
public class Window extends DesktopComponent {
   public Window() {
       super("window");
   }
}
```

4. Finally, we need to add the onClicked method that prints the message "window selected" to System.out. We'll include this method within the Window class:

```java
public class Window extends DesktopComponent {
   public Window() {
       super("window");
   }

   public void onClicked() {
       System.out.println("window selected");
   }
}
```

Now you have a Window subclass that inherits from DesktopComponent, has a constructor that passes the "window" type, and includes the onClicked method to print "window selected".

To know more about superclass visit :

https://brainly.com/question/14959037

#SPJ11

write down the output of the following program by showing dry down

write down the output of the following program by showing dry down

Answers

The output of the given program will be:

"CPE"

What is the explanation for the above?

This is because the program defines a subroutine named RESULT which takes a string parameter A$. The RESULT subroutine first calculates the length of the string A$ using the LEN() function and stores it in variable B. It then initializes a counter C to 1 and enters a loop that runs as long as C is less than or equal to B.

In each iteration of the loop, the program takes the character at the position specified by C in the string A$ using the MID$() function and appends it to a new string B$. The program then increments the counter C by 2 and continues with the next iteration of the loop.

Once the loop has been completed, the program prints the final value of B$, which will contain every other character of the input string A$. In this case, since the input string is "COMPUTER", the output will be "CPE".

Learn more about program at:

https://brainly.com/question/11023419

#SPJ1

1.21 lab: divide by x write a program using integers user_num and x as input, and output user_num divided by x three times. ex: if the input is:_________

Answers

A program using integers user_num and x as input, and output user_num divided by x three times is given below:

The Program

#include <stdio.h>

int main(void) {

  int userNum;

  int x;

  int ans1;

  int ans2;

  int ans3;

 

  scanf("%d", &userNum);

  scanf("%d", &x);

 

  ans1 = userNum/x;

  ans2 = ans1/x;

  ans3 = ans2/x;

 

  printf("%d %d %d\n", ans1, ans2, ans3);

  return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

COURSE HERO In this project you have been asked to create a Python program that will help plan and manage an upcoming dinner party for over 100 people put on by a non-profit club as a fund raiser. The Python program needs to track members attending and their guests, menu options, and party fees to attend. . The program should be designed to run in a console without any error messages or exceptions. All input data must be validated and output to the console must be neat and professional.

Answers

To create a Python program for managing the dinner party, you can follow these steps: Start by defining the necessary variables, such as lists to store the members attending, their guests, menu options, and party fees.
Prompt the user for input to add members, their guests, menu options, and party fees.

Validate the input to ensure it meets the required criteria, such as ensuring the number of guests doesn't exceed the maximum allowed. Implement a loop to continuously prompt for input until the user decides to stop adding members.

Display a menu to allow the user to perform different actions, such as adding members, updating guest details, removing members, displaying the menu options, and calculating the total party fees collected.

To know more about Python visit:

https://brainly.com/question/30391554

#SPJ11

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that  input N numbers from the user in a Single Dimensional Array .

Writting the code:

class GFG {

   // Function to reverse a number n

   static int reverse(int n)

   {

       int d = 0, s = 0;

       while (n > 0) {

           d = n % 10;

           s = s * 10 + d;

           n = n / 10;

       }

       return s;

   }

   // Function to check if a number n is

   // palindrome

   static boolean isPalin(int n)

   {

       // If n is equal to the reverse of n

       // it is a palindrome

       return n == reverse(n);

   }

   // Function to calculate sum of all array

   // elements which are palindrome

   static int sumOfArray(int[] arr, int n)

   {

       int s = 0;

       for (int i = 0; i < n; i++) {

           if ((arr[i] > 10) && isPalin(arr[i])) {

               // summation of all palindrome numbers

               // present in array

               s += arr[i];

           }

       }

       return s;

   }

   // Driver Code

   public static void main(String[] args)

   {

       int n = 6;

       int[] arr = { 12, 313, 11, 44, 9, 1 };

       System.out.println(sumOfArray(arr, n));

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display

A nurse has forgotten the computer password and asks to use another nurse's password to log on to the computer. which response by the coworker demonstrates safe computer usage?

Answers

A response by the coworker which demonstrates safe computer usage is: B) telling the nurse that she may not use the password.

What is a password?

A password can be defined as a string of characters, phrase or word that is designed and developed to distinguish an unauthorized user from an authorized user, especially through an identification and authentication process.

What is a password policy?

A password policy can be defined as a set of rules and standard that are designed and developed by the data security or networking team of an organization, so as to enhance computer security and ensure all password meet the minimum requirements such as:

Password maximum age.Password minimum length.Password combination

In this context, we can reasonably infer and logically deduce that a response by the coworker which demonstrates safe computer usage is telling the nurse that she may not use the password because it should never be shared..

Read more on password here: brainly.com/question/19116554

#SPJ1

Complete Question:

A nurse says she's forgotten her computer password and asks to use another nurse's password to log on to the computer. Which response by the coworker demonstrates safe computer usage?

A) writing down the password so the nurse won't forget it

B) telling the nurse that she may not use the password

C) telling the nurse that she may use the password

D) telling the nurse to ask someone else for their password

que es eset internet security???

Answers

Answer:

Antivirus y Antiespía

Explanation:

ESET Internet Security ofrece protección contra todo tipo de amenazas, incluso de las más recientes, gracias a su protección proactiva, y evita que éstas puedan robar información o se propaguen a otros equipos.

I have no clue but que pasa 6 x8 = 647
666+56+8#9+

you are having trouble installing Node and Express on
your machine, you may use an online Node/Express development
environment to complete the assignment. Please download the files
and submit what you

Answers

If you are having trouble installing Node and Express on your machine, you may use an online Node/Express development environment to complete the assignment.

Below are the steps to follow:

Step 1: Create a new project in an online Node/Express development environment, for example, Repl.it.

Step 2: Download the necessary files for the assignment and add them to the project. You can usually download the files from your course's learning management system or from a link provided by your instructor.

Step 3: Open the necessary files and modify them as needed to complete the assignment.

Step 4: Once you have completed the assignment, save your changes and download the modified files.

Step 5: Submit the modified files to your instructor according to the instructions provided. Make sure to follow any specific naming conventions or file formats that are required for the submission.

To know more trouble installing Node visit:

https://brainly.com/question/31842159

#SPJ11

Select the PowerShell cmdlet below that can be used to create a new volume.​
-New-StoragePool
-NewVirtual-Disk
-​New-Partition
-Format-Volume

Answers

The PowerShell cmdlet that can be used to create a new volume is the New-Volume cmdlet. It is used to create a new volume, assign a drive letter to it, format the volume with a file system, and enable compression if necessary.

Here's an explanation of how to use the cmdlet in PowerShell to create a new volume:Step-by-Step explanation:1. Open PowerShell on your computer.2. Type the following command to create a new volume:New-Volume -DriveLetter E -FileSystem NTFS -Size 500GB3. This command will create a new volume with the letter E, a file system of NTFS, and a size of 500GB. You can change the parameters as needed for your specific needs.4. Once you have run the command, the new volume will be created and will appear in File Explorer as a new drive letter. You can then use the drive letter to store files and data as needed.5.

Note that you may need to run PowerShell as an administrator to create a new volume, depending on the security settings on your computer. You may also need to initialize the disk before creating a new volume if it has not been initialized yet.

To know more about PowerShell visit:

https://brainly.com/question/30410495

#SPJ11

30 POINTS!!

Select the correct answer.

Josef wants to pursue a career as a user experience developer. How should he acquire knowledge to pursue this career?

A. by obtaining a bachelor’s degree

B. by obtaining a master’s degree

C. by earning work experience

D. by getting a high school diploma

E. by using books and online courses

Answers

Answer:

This is by earning work experience.

Explanation:

This is any experience that a person gains while working in a specific field.

Answer:

I think it is E

Explanation:

blank uses computer resources from multiple locations to solve a common problem.

Answers

Answer:

Grid computing

Explanation:

what is a scratch application pls help me build a game through scratch step by step​

Answers

Answer:

Scratch is the a coding community and a coding language with simple visual interface that allows people to create digital stories, games and animeations ect.

Explanation: Migth be able to help depending on waht you are making

what type of messages does a router send to the sender when it knows a better first-hop for a particular destination address?

Answers

When a router knows a better first-hop for a particular destination address, it sends a message called a "Redirect" to the sender. This message informs the sender that there is a more optimal first-hop router to reach the desired destination address, allowing the sender to update its routing table and improve the efficiency of its network communication.

A redirect message is used by a router to inform the sender that a better route to the destination exists through a different next-hop router. This can occur when a router receives a packet from a sender that is destined for a network that can be reached through a better next-hop router than the one the sender is using.

The redirect message contains the IP address of the new next-hop router, and the sender is expected to update its routing table accordingly. This helps to ensure that packets are forwarded to the correct next-hop router, improving the efficiency and reliability of the network.

To know more about IP address visit:

https://brainly.com/question/16011753

#SPJ11

¿Cuanto cuesta un procesador de textos?

Answers

Answer:

Too Much

demasiado

Explanation:

State one criteria that makes a piece of malware a virus.

Answers

Answer: Self replication

Explanation: Malware is a catch-all term for any type of malicious software, regardless of how it works, its intent, or how it's distributed. A virus is a specific type of malware that self-replicates by inserting its code into other programs.

When information never enters memory _____ failure has occurred. reversal
retrieval
storage
encoding

Answers

When information never enters memory, encoding failure has occurred.

Encoding refers to the process of converting information into a format that can be stored and later retrieved from memory. Encoding failure happens when information is not successfully processed or encoded into memory. This can occur due to various reasons, such as insufficient attention or distraction during the encoding process. When encoding failure happens, the information is not effectively stored in memory, making it difficult or impossible to retrieve later.

Learn more about Encoding failure here:

https://brainly.com/question/28148870

#SPJ11

What is the final value of x (after this code has executed)?

int x = 0;

for (x = 0; x < 200; x++)

{

System.out.println(x);

}

Answers

Answer:

199

Explanation:

i starts at 0. One more than 0 is one. Until you get 199.  

The computer is counting as seen below:

0

1

2

....

199

What is the size of the following array? int num[10] = {88, 92, 75, 95, 82); O 9O 0O 10 O 5

Answers

The size of the array of the group of elements is 5.

What is an Array?

A data structure called an array is made up of a number of items, each of which is identifiable by an array index or key.

The size of an array in C/C++ is determined by the number of elements in the array between the curly braces {}.

In this case, the array "num" has 5 elements: 88, 92, 75, 95, and 82. So the size of this array is 5.

Read more about arrays here:

https://brainly.com/question/24275089

#SPJ1

in cell D19, write a formula that contains the difference between cells D18 and E18

ans the numbers in D18 and E18 are 9 and 7

in cell D19, write a formula that contains the difference between cells D18 and E18ans the numbers in

Answers

In the Microsoft Excel sheet,  cell D19, you can write the formula =D18-E18 to calculate the difference between cells D18 and E18.

What is the rationale for the above response?

The rationale for this formula is that it subtracts the value in cell E18 from the value in cell D18, giving the difference between the two numbers. In this case, with 9 in cell D18 and 7 in cell E18, the formula will evaluate to 2, which is the difference between the two numbers.

Excel formulas are important because they allow users to perform calculations and analyze data in a spreadsheet. They save time and effort by automating repetitive tasks, and they provide a quick and easy way to make decisions based on data.

Learn more about Excel Formula:

https://brainly.com/question/29280920

#SPJ1

What type of connector is used to connect an analog modem to a telephone line socket?.

Answers

RJ11 connector  is used to connect an analog modem to a telephone line socket.

What is connector?

Connector is defined as a network device, such as a PC, hub, or switch, that eliminates a segment of cabling or implements a condition of access. Connectors are parts or devices used, among other things, to electrically connect or disconnect circuits.

You most often use this RJ11 connector while connecting a phone or an analog modem to your POTS system, also known as the Plain Old Telephone System. Technically speaking, this is a six-position, two-conductor connector.

Thus, RJ11 connector  is used to connect an analog modem to a telephone line socket.

To learn more about connector, refer to the link below:

https://brainly.com/question/28884222

#SPJ1

Jen's house contains the following devices:
• Jen's laptop that is wirelessly connected to the home network router and turned on
• Her husband's PC, which connects to the router by a cable but is turned off
• Her mother's virus-infected computer that has been unplugged from the router
• Her daughter's smartphone that is wirelessly connected to the router
If Jen's daughter is talking on her phone, and Jen's husband's computer is off, which computers are currently
networked?
O All four, because they are all computers in the house, regardless of their present usage.
Jen's laptop and her daughter's phone, because they are both connected to the router and turned on.
Just Jen's laptop, because her mom's computer is not connected to the router, her husband's computer is off, and her daughter's
phone is not currently acting as a computer.
None of them, because a network must have at least two devices wired by cable before it can be called a network

Jen's house contains the following devices: Jen's laptop that is wirelessly connected to the home network

Answers

Answer:

Jen's laptop and her daughter's phone, because they are both connected to the router and turned on.

Explanation:

A network comprises of two or more interconnected devices such as computers, routers, switches, smartphones, tablets, etc. These interconnected devices avail users the ability to communicate and share documents with one another over the network.

Additionally, in order for a network to exist or be established, the devices must be turned (powered) on and interconnected either wirelessly or through a cable (wired) connection.

Hence, the computers which are currently networked are Jen's laptop and her daughter's phone, because they are both connected to the router and turned on. A smartphone is considered to be a computer because it receives data as an input and processes the input data into an output (information) that is useful to the end user.

Answer:

Jen’s laptop and her daughter’s phone, because they are both connected to the router and turned on.

Explanation:

The project team identified the completion of the first module to be the first significant event. The completion of Module One is a _____.


requirement

risk

stakeholders

milestone

Answers

The completion of module one is a milestone

Why is storage and important part of the computing process? It must be atleast five sentences.

Answers

Your computer needs storage because the processor needs a place to perform its magic — a scratchpad for mad doodles, if you will. All computers need storage. ... Memory is where the processor does its work, where programs run, and where information is stored while it's being worked on.

And why five sentences?

how long can digital certificates be valid quizlet

Answers

Digital certificates can be valid for a varying amount of time, typically ranging from one to three years. However, the exact validity period of a digital certificate depends on the issuing Certificate Authority (CA) and the type of certificate being issued.

Digital certificates are used to secure online communications and transactions by providing authentication and encryption. They contain information about the identity of the certificate holder and the public key associated with that identity. Once a digital certificate is issued, it is signed by the issuing CA and can be used for secure communication until it expires.

The validity period of digital certificates is determined by a number of factors, including the level of security required, the purpose of the certificate, and the policies of the issuing CA. For example, certificates used for online banking transactions or government communications may have shorter validity periods to ensure the highest level of security. On the other hand, certificates used for internal purposes within an organization may have longer validity periods.

To know more about Digital certificates  visit:
https://brainly.com/question/28271065

#SPJ11

Define the term editing​

Answers

Answer:

editing is a word file mean making changes in the text contain is a file. or a word file is one of the most basic ms office word operation.

Three actions you can perform on a touch screen,that you cannot perform with a traditional pointing device such as a mouse

Answers

Answer:

Pinch and Zoom: One of the most common actions performed on touchscreens is pinch and zoom. With a traditional pointing device such as a mouse, you cannot perform this action. With a touchscreen, users can use two fingers to zoom in and out on text, images, and other content on the screen.

Swipe: Another action that is unique to touchscreens is swipe. With a traditional pointing device, you cannot swipe across the screen to navigate between pages or screens. With a touchscreen, users can swipe left or right to move between screens or pages, and up or down to scroll through content.

Multi-touch gestures: Touchscreens enable users to perform multi-touch gestures, which cannot be performed with a traditional pointing device. For example, users can use three fingers to swipe between open applications, or use two fingers to rotate an image or document. These multi-touch gestures are becoming increasingly common in modern touch screen devices.

Explanation:

how many key stages are there in our cognitive development

Answers

The cognitive development process is a complex one. The different stages of cognitive development are demarcated by distinctive changes in reasoning patterns, knowledge acquisition, and information processing capacity.

There are four different key stages in the cognitive development process, which are as follows:

During the sensorimotor stage, which takes place between birth and the age of two years, infants and toddlers develop sensory and motor abilities. At this stage, children's cognitive processes rely mostly on immediate sensory perceptions, actions, and reflexes. The preoperational stage of cognitive development occurs between the ages of two and seven years. In this stage, children become more proficient in their language and mental representation abilities. Children in this stage have an emerging ability to think symbolically, but their thinking is egocentric, lacking the ability to take into account other people’s perspective. The third stage of cognitive development is the concrete operational stage, which spans from seven to 11 years of age. In this stage, children become more capable of performing mental operations on objects, but only concrete, physical objects. Children in this stage are able to think logically and causally about concrete events but have difficulty thinking about abstract or hypothetical concepts.The fourth and final stage is the formal operational stage, which takes place at the age of 11 and beyond. During this stage, children begin to understand abstract concepts, hypothetical thinking, and formal logic. This stage involves a higher level of reasoning capacity and a capacity to think hypothetically and deductively.

Know more about the cognitive development

https://brainly.com/question/14472406

#SPJ11

Miss Tanaka regularly runs review sessions for her students before exams, as her students forget what topics have been covered and where they can access the resources used in class. How should she use Blogger effectively to reduce the amount of review sessions she needs to run? She can embed a Sheet containing the class topics and links to resources, and update it after each class. She can create a video giving students a quick overview of the semester, and upload it to Blogger at the end of the semester. She can upload all her lesson plans and notes into the File Cabinet in Blogger so students can only access them at school. She can create a new blog post after every class with the lesson overview, notes and links to resources.

Answers

Answer:

She can create a new blog post after every class with the lesson overview, notes and links to resources.

Explanation:

In order to help her students out, Miss Tanaka can simply create a blog post after every class - her students will know to expect it every week and can easily locate it whenever they need it. This way, Miss Tanaka will also avoid having to repeat the same lesson over and over again if the students can find the summaries themselves and read whenever they want. These blogs will be found on the main page so everything is neat and well-organized.

She can create a new blog post after every class with the lesson overview, notes and links to resources.

What is a blog?

A blog is an online platform that allows an an individual, group or industry presents a record of their activities, teachings or beliefs.

An individual can login to a blog website and can view all the activities or event posted.

Therefore, Mrs Tanaka can create a new blog post after every class with the lesson overview, notes and links to resources.

Learn more on links to resources here,

https://brainly.com/question/16595058

What are some of the restrictions to muscle wire?

Answers

Answer:

Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.Although thin and lightweight, one of the most amazing things about Muscle Wire is that they can lift many times their weight and are able to do 100 times more work per cycle than the human muscle. This material is easy to use, small in size, operates silently, has a high strength-to-weight ratio, and is easily activated using AC or DC power. This technology is ideal where mechanics require minimization, such as electronic textiles projects, robotics or nano-applications.Muscle Wire is an extremely thin wire made from Nitinol (a nickel-titanium alloy) that is known for its ability to contract when an electric current is applied.

Other Questions
why would this change in amount of an accumulating substance potentially be of concern in the food chain of an ecosystem? 4343321= can you help me with this A student tests the properties of an element and finds that it is malleable, shiny, and conducts electricity. Based only on the student's data, this element is most likely a - . Assume Johns utility is U=min (2q1, 4q2)The price of each good is $2.00, and his monthly income is $4,000.His firm wants him to relocate to another city where the price of q2 is $10 but the priceof q1 and his income remain constant. What would be his equivalent variation orcompensating variation? The box-and-whisker plots show data for the test scores of four groups of students in the same class. Which plot represents data with the greatest range of scores? What is it called when two tectonic plates meet? Which statement best describes the purpose of nucleic acids?O broken down as a source of energya structural component of hair and nailsO forms the structure of your genesO forms the membrane around all cells To which kingdom does E. coli belong?A FungiB. ProtistaC. ArchaebacteriaD. Eubacteriasyy Shanice had $1500 into her checking account when she went on a 7 week trip to Europe after her senior year. When she returned from Europe she had $450 in the bank. Howmuch did she spend each week in Europe? TRUE / FALSE. gang violence decreased during the chicano movement (erlanger). Evaluate the expression. Write the answer in simplest form.55633429 The ages of the teachers at a school are given in the table.Find the median age of the teachers.Teachers Ages26342940384836255232 Solve multi-step equations with various solution sets (7th grade):-0.2(3c + 15) = 3(0.8c - 8) Movie stars such as Salma Hayeck, Samuel L. Jackson, Dwayne Johnson, and Jennifer Lawrence are paid millions of dollars per movie, which can take as much as 6 months of full-time work for an actor. By contrast, doctors and nurses earn considerably less over the same time period. Why might this be? While the supply of (major film stars OR doctors and nurses) is small and relatively fixed in the short run, the demand for (the average doctor or nurse OR movies featuring these film stars) is quite large globally. By contrast, the marginal benefit of the services provided by (major film stars OR doctors and nurses) is relatively low, although the total benefit is quite high. This illustrates the diamond-water paradox. True or False PLEASE HELP Residents of Eastport are convinced about the number of drivers who speed when driving down Main street. A group of residents takes turns observing the street. Each person spends one hour how many drivers speed and how many obey the speed limit. What's the population being studied?A. drivers who obey the speed limit B. drivers who speed C. drivers in Eastport D. drivers who travel down the street Why is Potassium called an alkali metal? name the substance produced by type ii alveolar cells that functions in reducing surface tension. what will happen if a user clears the analytics cookie from their browser? How did the expansion of slavery in the mid nineteenth century lead to civil war following is an equation of a circle in the xy-plane with center(-2, 1) and a radius with endpoint (0,2)? a) (x-2)(y 1)2 5 b)