1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lorico [155]
3 years ago
7

Complete the sentence.

Computers and Technology
1 answer:
Luda [366]3 years ago
6 0
The answer is Tablets
You might be interested in
Research the Next-Generation IPS (NGIPS) solutions involving four primary editions including FirePOWER 8000/7000 series, NGIPS f
dezoksy [38]

Answer:As cyber attacks evolve, network security requires unparalleled visibility and intelligence covering all threats for comprehensive protection. And with differing organizational responsibilities and agendas, you need a consistent security enforcement mechanism. These increasing operational demands call for a renewed focus on dedicated NGIPS to provide a deeper level of security and visibility for the enterprise.

Explanation:

6 0
3 years ago
WILL CHOOSE BRAINLIEST! in cells D6 through D8, enter formulas to calculate the values of the stocks. The formulas should multip
gtnhenbr [62]

Answer:

Alice Grant has been saving and investing part of her salary for several years. She decides to keep track of her investments on a worksheet. The file Application 9-7 contains the investments of Alice Grant. She owns several types of investments:

Explanation:

8 0
2 years ago
What type of program would you use to create a personal budget?
Rina8888 [55]

Answer:

Using a spreadsheet would be the best program for creating a personal budget.

Explanation:

With a spreadsheet, you can enter formulas to add or subtract from your budget, plus you can create charts and graphs as well.

8 0
2 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
is there a way to send files from my PC to my iPhone? My PC’s wifi receptors are broken so it cannot connect to wifi. Is there a
Alex_Xolod [135]

Answer:

I believe you need a internet connection for that or try a Hotspot that can work too.

5 0
3 years ago
Other questions:
  • Why would someone need to use tools like IECacheView or MyLastSearch on a system? Do companies have the right to search a workst
    11·1 answer
  • Explain the steps you take when conducting research online to ensure it the source is providing reliable information.
    6·1 answer
  • Neighbor discovery performs many of the functions that icmp router discovery and icmp ____ handled in ipv4.
    13·1 answer
  • Which of the following is not true of credit cards
    15·1 answer
  • What is the purpose of using SmartArt Graphics and what is one way you can use SmartArt Graphics in your presentation(s)?
    11·1 answer
  • Write a class called Counter that represents a simple tally counter, which might be used to count people as they enter a room. T
    9·1 answer
  • Suppose you have the following declaration.int[] beta = new int[50];Which of the following is a valid element of beta.(i) beta[0
    14·1 answer
  • What is it with the order of operations
    9·1 answer
  • Write a C console application that will be used to determine if rectangular packages can fit inside one of a set of spheres. You
    5·1 answer
  • In what ways can you modify the location of the neutral point?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!