1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kherson [118]
3 years ago
13

why is it that everytime i ask a question (with brainly plus) it says there arnt any matches for your search. are the servers do

wn ? or did i just get scammed out of my money
Computers and Technology
1 answer:
fiasKO [112]3 years ago
6 0
That happens to me to
You might be interested in
What actions might contribute to recommendations you see online?
Virty [35]

Answer: what you search up

8 0
2 years ago
What do u call a individual that loves motor bikes and leather and is in a rival group known as mods?
vladimir1956 [14]
My best guess would be a biker they love motor bike they wear leather jackets and ride in groups this is the only thing i could think of

~ thanks ~
7 0
3 years ago
What is some effective writing techniques?
scoray [572]
Be persuasive, have form, and know what you are talking about. I would recommend using MELCON.  You can learn more about MELCON with this link.  http://melcon.weebly.com/
3 0
3 years ago
A penetration testing manager is contributing to an RFP for the purchase of a new platform. The manager has provided the followi
pochemuha

The manager has provided the following requirements <u>Password cracker: </u>

E. Password cracker

<u>Explanation:</u>

MITM is used to protect from hackers where they can hack the web site and misused the data. Basically man is in middle that monitors the network traffics between to tcpip and address and login as unauthorized person.

As RFP is a bidding process for purchase new product or new platform with complete document in details.

End user has to take care of hackers attack and make sure it is protected with all security holes.

Fuzzer is tool where send user data and check the security vulnerabilities and make sure it is protected.

It is not considered as high accuracy.

5 0
3 years ago
The ________ simulates your work area.
xz_007 [3.2K]
I believe it is, A. taskbar
5 0
3 years ago
Other questions:
  • Which of the following tasks is least effective at preventing a computer virus?
    14·2 answers
  • Primary technology skills are skills that are necessary for success in online education
    9·2 answers
  • Website designers work on the code and programming of a website, not the style or layout of the site.
    9·1 answer
  • When do you use an else statement?
    10·1 answer
  • GUYS THERE IS A HACKER IN BRAINLY PLEASE DONT PRESS ON THE WEBSITE THEY WILL HACK YOU.
    9·2 answers
  • Hey everyone please let my friends answer please?????? .
    12·2 answers
  • when demonstrating 2022 altima’s parking assistance, what steering feature should you mention when pointing out how easy the veh
    10·1 answer
  • How does the quantity of data affect the accuracy of an experiment?
    7·1 answer
  • What are 3 of the most important things about internet safety that you would recommend and why
    15·1 answer
  • Which of the following can be termed ‘application software’?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!