1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr402 [8]
3 years ago
11

6 The part of the computer that contains the brain or central processing unit is also known as the ?

Computers and Technology
1 answer:
Olin [163]3 years ago
4 0
Answer:  "CPU" .
________________________________
You might be interested in
What are the assignable addresses for the 12th subnet with the network address of 220.100.100.0 and the number of needed subnets
bogdanovich [222]

Answer:

C. 220.100.100.45 to 220.100.100.46

Explanation:

The Classless IP subnetting of 220.100.100.0 begins from the fourth octet of the IP address. To get 45 subnet mask, it uses 6 bits from the fourth octet, which approximately give 64 subnets, while the remaining 2 bits are used for host IP addressing.

The useable host IP addresses are gotten from the formula '2^{n}-2', with n=2 bits.

useable host IP addresses = 2^2 - 2 = 2 addresses per subnet.

While the 12th subnet is 12 x 2^2 = 44.

This means that the 12th subnet mask starts with 220.100.100.44 (as the network address) and ends with 220.100.100.47 as broadcast IP address, while '.45' and '.46' are the assignable addresses of the subnet.

5 0
3 years ago
What is an example of a reputable website
Keith_Richards [23]
A reputable website would be one that you could research online and read about it's history , reviews etc .
4 0
3 years ago
Read 2 more answers
In 1981, Ian Murphy broke into the AT&T online computer system and changed their clocks, allowing people to make calls durin
poizon [28]
A. intentionally or recklessly disrupt, degrade, or destroy information or services on the computer
5 0
2 years ago
Business intelligence applications access large pools of data, usually transactional records stored in large databases called __
asambeis [7]
Business intelligence applications access large pools of data, usually transactional records stored in large databases called data warehouses (DW or DWH). The data warehouse contains <span>integrated </span>data from one or more disparate sources that is <span>used for reporting and data analysis.</span>
8 0
3 years ago
While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Whic
VladimirAG [237]

The activity Sarah, a network security administrator, performed by going through a network log and then noticing substantial outbound network traffic is: indicators of compromise (IOC).

Cybersecurity refers to the preventive practice adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use;

  • A body of technology.
  • Processes.
  • Frameworks.
  • Policies.
  • Network engineers.

In Cybersecurity, it is very important to adopt certain security standards, policies, frameworks, technology, antivirus utility, and best practices, in order to achieve the following:

I. Prevent data theft and data corruption by malwares (viruses).

II. Enhance data integrity and secure (protect) data.

III. Mitigate any unauthorized access or usage of the system network by a hacker.

In conclusion, the indicators of compromise (IOC) refers to the factual evidence on a network device pointing to a security breach or data theft.

Read more: brainly.com/question/24112967

8 0
3 years ago
Other questions:
  • Samantha received a gaming session as a gift. She would like to have it communicate with her sister Jennifer’s gaming system so
    15·1 answer
  • "under the control panel, what console contains print management, computer management, and event viewer?"
    11·1 answer
  • What are features of a product?
    8·2 answers
  • Which document would most likely be written in an informal style?
    12·1 answer
  • What is the keyboard shortcut used to paste previously copied text?
    15·2 answers
  • BRAINLIEST !!A game design document is like a diary for game developers.
    11·1 answer
  • If you could make another device "smart" and have
    12·1 answer
  • What is the output of the following program?
    11·1 answer
  • Over the past year alone, more than _________ have been stolen from Target.
    10·2 answers
  • Does anyone have a rbx account? If they do friend request Tribalchief777
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!