1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leonid [27]
2 years ago
8

Criselda is a computer operator. when she turns on her computer, it loads information from the hard disk into the computer's?

Computers and Technology
1 answer:
insens350 [35]2 years ago
4 0

Answer:

RAM

Explanation: Data is read from Disk to RAM for processing

You might be interested in
Why would you use a billeted list in a slide presentation?
Damm [24]

Answer:

You would use a Bullet Point on a slide presentation because its concise and to the point.

Explanation:

The correct way to use a Bullet point is to keep it simple. Its not made to be a full sentence. You need to create a bullet point you can expand upon. when you keep it plain and simple you can get more info on your points.

7 0
3 years ago
How to do GCD on small basic?​
Alekssandra [29.7K]
The other person is right
7 0
3 years ago
The company called ____ offers a complete graphic information system software solution for computer-generated maps that stores a
jeyben [28]
The answer is <span>ESRI.  It </span>offers a complete graphic information system software solution for computer-generated maps that stores all its data in your oracle 10g database.  It stands for Environmental Systems Research Institute.  Esri's<span> GIS mapping software is the most powerful mapping and spatial data analytics technology available.</span>
7 0
3 years ago
The ____ section of the project plan should describe the major project functions and activities and identify those individuals w
harkovskaia [24]

Answer:

Option(c) is the correct answer to the given question .

Explanation:

The Project responsibilities section is responsible of the planning of project.

Following are the Roles of the Project Responsibilities

  • To check the objective of the project goals.
  • Works with customers and  to define and meet client needs and the overall objective .
  • Cost estimation and expenditure production of the project
  • Ensure the fulfillment of the client .Analysis and enterprise risk management. and Tracking the progress of project.

All the others options are not responsible of the planning of project that's why Option(c) is the correct answer .

7 0
3 years ago
Different network scenarios require the
Vladimir [108]

Answer:

a) Viruses

Explanation:

Vulnerability assessment is performed by variety of tools and these can be protocol analyzer, vulnerability scanner, Honeypots, port scanners, honey nets and banner grabbing tools.

Port scanners : they are used to scan the ports which can be exploited by attackers. Most of TCP/IP applications communicate using different ports and attackers can exploit these ports if they are found vulnerable. for example : ports like 80 and 443 are commonly used for HTTP and SSL communication. 22 is used for SSH and if they are open to world then it will allow attackers to use those to get the entry into the system.

Protocol Analyzers : They are used to analyze the packet captures. tools like wireshark, tshark, these tools will help user to decode HTTP/SSL/HTTPS/FTP/RSTP or any application protocols communication. this will help user to understand any unwanted or non-anticipated traffic.

Vulnerability Scanners : They are used to detect the vulnerabilities in the network or systems. these will help administrators to get the alerts whenever there are unanticipated activity. It will have two types of scanners one is active scanner and other is passive scanner. Active scanners will keep on sending probes at the fixed time slots and passibe scanners will be in listening mode all the time. These scanners will alert when a new nodes comes up or goes down or if any system gets compromised.

Honeypots and Honey nets : They are devices or softwares which are having limited security. These devices are made vulnerable purposefully so that attackers can try and attack.  This will help softwares to detect the attackers when they try to exploit these open vulnerabilities. They are deceptions created with purpose.

Banner grabbing Tools : These are tools which will capture the banner information like HTTP protocol version, underlying operating system, open ssl versions being used, server software and similar information. these are important as it will open up potential vulnerabilities in the underlying software. for ex : SSLv3 has a vulnerability known to world and can be exploited by anyone.

4 0
3 years ago
Other questions:
  • What is the output after the following code executes?
    14·1 answer
  • Imagine that you are an independent filmmaker making a feature-length narrative film in the United States, with a variety of bot
    11·2 answers
  • Net Worth is equal to assets minus liabilities. Which event will have the greatest impact (positive or negative) on one's net wo
    9·1 answer
  • PLEASEEE HELPPPP me
    13·1 answer
  • A server that provides data transfer and storage space at remote locations is called a
    7·1 answer
  • What is an example of CT SO?
    9·1 answer
  • so i just went to play forge of empires and when i logged on to it all of my progress was gone and i was so far in to it
    15·2 answers
  • Vegetable farming is a good source of income explain this statement<br>​
    5·1 answer
  • Explain the following buttons as used in emails:compose,inbox and Draft.<br>​
    10·1 answer
  • Messages that have been accessed or viewed in the Reading pane are automatically marked in Outlook and the message subject is no
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!