1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wewaii [24]
3 years ago
7

A(n) ________ is software and/or hardware that monitors system and network resources and activities and notifies network securit

y personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.
Computers and Technology
1 answer:
enyata [817]3 years ago
5 0

Answer:

intrusion detection system

Explanation:

intrusion detection system

IDS or the intrusion detection system is the software and/or hardware system which can be used to monitor for detecting suspicious network activities and monitoring the system and notifying teams when there are attempts to break the secure network infrastructure.

You might be interested in
What is a common use for append queries?
Karo-lina-s [1.5K]

Answer:

You use an append query when you need to add new records to an existing table by using data from other sources. If you need to change data in an existing set of records, such as updating the value of a field, you can use an update query.

6 0
3 years ago
Read 2 more answers
A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that su
viktelen [127]

Answer:

The correct answer to the following question will be option C.

172.16.80.1-172.16.87.254

Explanation:

IP Address: IP Address stands for Internet Protocol Address, a unique numerical label allotted to every computer network that are connected to the network of the computer and communicate through the internet protocol.

  • An IP address can be separated by periods and having four numbers that are called Octet. Range of IP address can be from 0 to 255.
  • We have to keep the first 21 bits and start setting all from the 22nd bit on to 0 (zero).
  • To get the suitable and the correct range of the address, we add and subtract 1 from the given broadcast address i.e.,172.16.85.0/21.

So, option C is the right answer and no other option is usable according to the given explanation and the address given by the administrator.

3 0
3 years ago
(e) The vending machine stores the quantity of items available in a database table called ITEMS
zimovet [89]

Answer:

a1,a2,62,

please mark brainliest

Explanation:

8 0
2 years ago
What is the function of cpu while processing data?​
attashe74 [19]

Answer:

"Store date, intermediate results, and instructions (program."

Explanation:

"CPU is considered as the brain of the computer. CPU performs all types of data processing operations. It stores data, intermediate results, and instructions (program). It controls the operation of all parts of the computer."

3 0
2 years ago
Read 2 more answers
Northern Trail Outfitters stores Last Name in a data extension. How should the text file be defined?
Crazy boy [7]

Answer:

d. Text(100)

Explanation:

The data extensions can be defined as the table with the fields of the data about contacts. It can be related to some other data extensions or can be a standalone.

In the context, the Northern Trail Outfitters stores the Last Name in the data extension which is defined as a text file as Text(100).

Choosing a proper field length and a data type ensures an efficient storage as well as retrieval of the data in the data extensions.

7 0
3 years ago
Other questions:
  • The last 64 bits of an ipv6 address are the interface identifier. what is frequently used to specify the interface identifier?
    14·1 answer
  • A multiplicative inverse of 3 modulo 5 is any integer a such that 3 a ≡ 1 (mod 5) , hence for some a ∈ Z5 .
    12·1 answer
  • 2. Imagine you play a game of fetch with the dog. It takes the dog 60 seconds to run a total of 180 meters. What was the dog's a
    6·1 answer
  • What was one complication caused by the tsunami that struck japan in 2011?
    15·1 answer
  • write the algorithm, flowchart and BASIC program to calculate the area of the rectangle length 50m and width 30m.​
    8·1 answer
  • _____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines th
    11·1 answer
  • B. What significant values have you learned while learning the tools and utensils?
    8·1 answer
  • 1. If an android phone is out of date or outdated and it requires an update. Explain the steps how I can update this phone.
    15·2 answers
  • How to be gud at Friday night funk
    11·1 answer
  • List at least 5 disadvantages caused by computer viruses?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!