Answer:
Cloud computing and applications
Explanation:
Answer:
HELLO, be nice spread love... DO NOT HATE ON OTHERS
░░░░░▐▀█▀▌░░░░▀█▄░░░
░░░░░▐█▄█▌░░░░░░▀█▄░░
░░░░░░▀▄▀░░░▄▄▄▄▄▀▀░░
░░░░▄▄▄██▀▀▀▀░░░░░░
░░░█▀▄▄▄█░▀▀░░
░░░▌░▄▄▄▐▌▀▀▀░░ This is Bob
▄░▐░░░▄▄░█░▀▀ ░░
▀█▌░░░▄░▀█▀░▀ ░░ Copy and paste him so he can take over brainly.
░░░░░░░▀███▀█░▄░░
░░░░░░▐▌▀▄▀▄▀▐▄░░
░░░░░░▐▀░░░░░░▐▌░░
░░░░░░█░░░░░░░░█░
COPY AND PASTE LETS DEFEAT BRAINLY
Explanation:
Answer:
dangerous
Explanation:
Is really dangerous try to get these products, because a computer service doesn't have any experience about cosmetics, in addition, regularly only man are interested in computer services, is a huge change, this company could lose all the investment, this company should get products similar about computer service.
Answer:
TCP and UDP
Explanation:
the transport layer, mostly TCP and UDP, is responsible for ensuring that data gets to the right applications running on those nodes.
Answer: C. Confidentiality
Explanation: Confidentiality with regards to security simply means securing information belonging to certain individuals, group, entity or issues and information of national security or high level clearance by avoiding leakage to authorized persons or groups.
With regards to network structure, confidentiality encompasses safe keeping of network data structure, packet header, network protocols and other information relevant to network structure by preventing illegal or unauthorized access to such information through the use of firewalls and top level security systems.