1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
3 years ago
7

Who listens to bts and whats ur favorite song?

Computers and Technology
2 answers:
Nutka1998 [239]3 years ago
5 0

Answer:

Fake love

Explanation:

Yes, it's a very known one, but the beats and their dance moves are very on point. Plus....they're kinda hot;)

Molodets [167]3 years ago
5 0

Answer:

Shoyo here!

Explanation:

I actually don't listen to BTS... do you have any recommendations?

You might be interested in
how to answer the questions on brainly? I've typed my answer in the box but there's no submit button or whatever, and the only t
Zigmanuir [339]

Answer:

push the add your answer button

Explanation:

4 0
3 years ago
Read 2 more answers
"When analyzing the IDS logs, the system administrator notices connections from outside of the LAN have been sending packets whe
lakkis [162]

This is false negative. To be marked for alert.

<u>Explanation:</u>

The network administrator or network engineer when he or she is analyzing IDS logs and founded the ip address is same on source and destination both in outside side.

So the either TCPIP address has to change to be scanned across the network. Since same IP address is same pinging rate will high and pinging the same workstation or desktop or laptop.

Alert will not generate because both tcpip address same and if pinging is success.  Ids logs generates based true negative, true positive and false positive will not generate any alert.

5 0
4 years ago
List at least four items that security policy should include
forsale [732]

Answer:

Purpose.

Audience.

Information security objectives.

Authority and access control policy.

Data classification.

Data support and operations.

Security awareness and behavior.

Encryption policy.

4 0
2 years ago
using the UML graphical notation for object classes, design the following object classes, identifying attributes and operations.
german

Answer:

Explanation:

check the attachment for the solution.

1)  graphical notation for  a telephone object class.

2)  a messaging system on a mobile

3) a personal computer

4) a bank account

5) a library catalog

6) personal stereo

5 0
3 years ago
The Western Siberian Plain is __________ in some places because it has poor natural draining systems.
Nitella [24]

This is the complete sentence about the Western Siberian Plain:

The Western Siberian Plain is <u>marshy</u> in some places because it has poor natural draining systems.

<h3>What is the Western Siberian Plain?</h3>

The Western Siberian Plain is a plain that is located in the western part of Siberia and which is known because most of the plain is poorly drained and it is considered one of the largest swamps and floodplains of the world.

This is why the correct word to complete the sentence about the Western Siberian Plain is "marshy".

Check more information about the Western Siberian Plain here brainly.com/question/14478489

#SPJ1

7 0
2 years ago
Other questions:
  • Array testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cre
    10·1 answer
  • The collaborative team responsible for creating a film is in the process of creating advertisements for it and of figuring out h
    15·1 answer
  • Care sunt avantajele fișierelor de tip ".pdf" ?
    15·2 answers
  • How to type the horizontal line on Mac ? Please I need to finish my assignment
    8·1 answer
  • What do customers use to access the internet, usually for a monthly fee?
    6·1 answer
  • What is an example of technology that helps support the idea of continental drift.
    15·1 answer
  • (25 POINTS) Some applications work on all devices while others work on some devices. True or False?
    13·1 answer
  • What does XML do with a data wrapped in the tags?
    7·1 answer
  • 4
    10·1 answer
  • If the programmer translates the following pseudocode to an actual programming language, a syntax error is likely to occur. Can
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!