subject
Computers and Technology, 08.07.2019 18:30 kbrxxzy

6. when searching for your word processing file to finish writing your report you should look for a file with which extension? a. doc b. exe c. jpg d. xls 7. including a space in the file name causes problems on all operating systems. a. true b. false 8. cleaning the keyboard is the most important part of keeping your computer running at peak performance. a. true b. false 9. if your computer will not turn on what is something you would do to diagnose the problem a. check if the monitor is plugged in b. push the power button c. see if it is plugged in d. turn on the printer 10. when computers are connected and operate through one main computer it is called a network a. centralized b. client server c. gui d. peer-to-peer

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 06:20
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
question
Computers and Technology, 22.06.2019 12:20
Usually, when we sniff packets, we are only interested certain types of packets. we can do that by setting filters in sniffing. scapy’s filter use the bpf (berkeley packet filter) syntax; you can find the bpf manual from the internet. set the following filters and demonstrate your sniffer program again (each filter should be set separately): (a) capture only the icmp packet. (b) capture any tcp packet that comes from a particular ip and with a destination port number 23. (c) capture packets comes from or to go to a particular subnet. you can pick any subnet, such as 128.230.0.0/16; you should not pick the subnet that your vm is attached to.
Answers: 3
question
Computers and Technology, 23.06.2019 01:30
Jason works as an accountant in a department store. he needs to keep a daily record of all the invoices issued by the store. which file naming convention would him the most? a)give the file a unique name b)name the file in yymmdd format c)use descriptive name while naming the files d)use capital letters while naming the file
Answers: 3
question
Computers and Technology, 23.06.2019 18:50
Ais a picture icon that is a direct link to a file or folder
Answers: 1
You know the right answer?
6. when searching for your word processing file to finish writing your report you should look for a...
Questions
Questions on the website: 13722367