1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
3 years ago
11

Why is it important to use data in your file name?

Computers and Technology
1 answer:
goldenfox [79]3 years ago
5 0
What are u trying to ask
You might be interested in
quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f
Sergio039 [100]

At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

What is the security event?

A security event is known to be an alteration  in the day to day running of the operations of a network or an information technology service and it is one that tends to show the point that a security policy need to have been violated or a security safeguard could have failed.

Note that in the above point in the process, Ann is a person who see no reason to believe that any real security compromise or policy violation has occurred as this kind of situation does not meet the stage of been called a security incident or intrusion.

Therefore, based on the above, At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

Learn more about Security event from

brainly.com/question/27225071
#SPJ1

Ann is a security professional for a mid-sized business and typically handles log analysis and security monitoring tasks for her organization. One of her roles is to monitor alerts originating from the organization's intrusion detection system. The system typically generates several dozen alerts each day, any many of those alerts turn out to be false alarms after her investigation.

This morning, the intrusion detection system alerted because that network began to recieve an unusually high volume of inbound traffic. Ann recieved this alert and began looking into the orgin of the traffic.

65. At this point in the incident response process, what term best describes what has occurred in Ann's organization?

A. Security occurrence

B. Security incident

C. Security event

D. Security intrusion

8 0
1 year ago
A barcode is a Select one: a. coded instruction needed to control computer hardware. b. confidential computer code required by H
kolezko [41]

A bar code is a  series of bars and spaces representing numbers or letters.

<h3><u>Explanation:</u></h3>

A method that is used for the purpose of representing a data in the form of a picture or image that can be easily understood by the machine. It consists of many lines that has different widths and spaces. They either represent the letter or a number. These are mainly used for the representation of data in the machine understandable format.

For example an UPC-A bar codes has 12 numbers. The numbering system is represented by the first digit. The manufacturer will be represented by the next five digits in it. The product will be represented by the five digits following it. Check digit is represented in the last digit.

5 0
3 years ago
Which of the following statements about take home pay is TRUE?
Licemer1 [7]
Banks and other lenders share the credit history of their borrowers with each other and are likely to know of any loan payments that you have missed. Does this answer your question? Plz tell me. If not I am sorry...
8 0
3 years ago
Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his n
ch4aika [34]

Answer:

(B) Home

Explanation:

Echo is an Amazon product.

Home is a smart speaker developed by Google.  

Cortana is a product of Microsoft.

HomePod is developed by Apple.

If Henry wants to be connected to his Google account, you would recommend him to buy Home, because it is a Google product.

4 0
3 years ago
14. In cell B14, create a formula without using a function that adds 1 to the value in cell B12 and then multiplies the result b
vagabundo [1.1K]

Answer:

The formula for the given problem is given below:

= (1+B$12)×B13

Explanation:

Immediately you do one, then you can autofill the formula to the mentioned range B15:B17 and then to C14 to H17

When been done correctly, this is how the formula will look in those cells if you do it correctly.

Check the file attached below to see it.

7 0
3 years ago
Other questions:
  • Q3** Write a query to create a new price list for books written by the same author. Allow the user to enter only the first 4 let
    15·1 answer
  • Dfd symbols are referenced by using all ____ letters for the symbol name.
    9·1 answer
  • What can you do with someone's ip address?
    9·1 answer
  • Need 2.5 Code Practice Answers
    14·2 answers
  • Renee is creating a multimedia presentation for a website that requires user interaction. Which multimedia type is Renee using?
    5·2 answers
  • ?Which programmer designs programs for applications executed on the Internet?
    11·2 answers
  • What is the difference between an electronic notebook and electronic flash cards?
    8·1 answer
  • When a client computer wants to connect to a service instance, what specific name type does it use to find the service?
    9·1 answer
  • When your friend DaJuan turns on his computer, he hears four beeps. The computer won’t fully boot. DaJuan has a Dell computer wi
    7·1 answer
  • _______________________ variables do not need to be declared inside the function definition body, they get declared when the fun
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!