The answers are 1, 3, and 5.
Answer:
<em>Ethernet cables, Network Adapters, Modem, Routers, Switches.</em>
Explanation:
<em>The devices that are required in setting up a wired network for the 5 computer comprises of the following devices </em>
- <em>Ethernet Cables</em>
- <em>Network Adapters</em>
- <em>Modem/Router</em>
- <em>Network Switch</em>
<em>Ethernet cables: They are called network cables or RJ-45 cables used to in connecting two or more computers together. it has different categories called, the untwisted pair and twisted pair Ethernet, with a speed from 10-1000</em>
<em>Network Adapters : This adapters allows a computer device to connect and interface with a network computer</em>
<em>Modem/Routers : A router is a device that that sits in the middle between your local computers and modems. it takes receives information or gets information from the modem and delivers it to the computer</em>
<em>Network switch: it connects more than two computers together to a network and share data among themselves and other devices on the network</em>
Answer:
Uneven use of resources
Explanation:
Potential problem associated with supporting multi - user operation without hardware support is:
Uneven use of resources: In a situation where we assign a set of resources to user 1 and if a new user comes, then it would be difficult to allocate new resources to him. The processor would get confused between the two users. And the tasks would not be completed. This can affect task processing.
Sending potentially sensitive information by email
Potentially sensitive information can be sent via Email only if the Email is encrypted
Explanation:
No doubt Email is an inexpensive efficient means of communicating quickly. But it is prone to hacking and it is not a secure mechanism. In order to add security ,the Email needs to be sent in an encrypted form. Banking and HIPAA regulations require the emails to be sent in encrypted form as it is a secure mechanism. Even if one has the consent from the client , the Email has to be in encrypted. Even if the Organization's e-mail system has appropriate firewalls and related infrastructure , the golden rule is to send encrypted format Emails.