1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
belka [17]
3 years ago
13

Plese give three examples of specilized servers.

Computers and Technology
2 answers:
MariettaO [177]3 years ago
5 0
1.Extended border node (EBN)
2.Central directory server (CDS)
3.Branch extender (BEX or BrEx or BrNN)
natali 33 [55]3 years ago
3 0
<span>-Web Servers
-</span><span>Application Servers
 
Types of specialize servers. 

</span><span>File, Printer and Database Servers. 
</span> 
Movies, audio and animations also count. 
You might be interested in
security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
daser333 [38]

Organization must notify the DPA and individuals

<h3>What was the typical weakness that outside attackers exploited?</h3>

One frequent flaw in network security that some attackers have learnt to take advantage of is the propensity of some web browsers, like Safari, to launch "safe" or "trusted" scripts automatically. Threat detection is the process of scrutinizing a security ecosystem from top to bottom to find any malicious behavior that could jeopardize the network. If a threat is identified, mitigating measures must be taken to effectively neutralize it before it can take advantage of any existing vulnerabilities. It's critical to often scan because security professionals and hackers frequently discover new vulnerabilities, like Log4Shell. Therefore, scanning for and identifying security vulnerabilities is the initial step in the vulnerability remedy procedure.

To learn more about outside attackers refer to

brainly.com/question/17329931

#SPJ4

3 0
1 year ago
Viet drives around and checks meters to document the amount of electricity used in homes. What Energy pathway is he a part of? E
Svet_ta [14]
As Viet drives around and checks meters to document the amount of electricity used in homes he would be part of the energy distribution process since the electricity is distributed off  a power line into the house and then within the house by the wiring to the lights and the electrical outlets for usage by the inhabitants.
7 0
3 years ago
Read 2 more answers
I need help making this table in html code I have some of chart done but idk where to go after the 6:30pm part
Bumek [7]

dvioubfeevuf is hsvqvuvsqv

5 0
3 years ago
If you delete a file from removable media, it is stored in the recycle bin where you can recover it until you empty the recycle
Natasha2012 [34]

The appropriate response is no. why you can't discover it. After we erased our information, the information will be put away recycle bin, on the off chance that you purge the reuse receptacle, the information will be erased, and in the meantime, Windows will list the space as accessible room. On the off chance that you cover the recycle bin with other data's, the information put away before will really lost, so in the event that you need to recuperate the information in our recycle bin, don't attempt to cover it with something else.

<span>On the off chance that you may need to recuperation it, For standard individuals, we can't recuperation it straightforwardly, on the off chance that you have enough cash, you can send it to a few information recuperation organization to acknowledge proficient recuperation, however to the extent I am concerned, few of us can pay for it in view of a few information, you may feel frantic, yet another way, is attempt to utilize a few information recuperation programming.</span>

5 0
3 years ago
Define input hardware​
luda_lava [24]
It’s a piece of hardware (you can touch it) that changes something on the screen. Examples are a keyboard putting letters on the screen or a mouse moving the cursor
6 0
3 years ago
Other questions:
  • How to upgrade from office home to office professional
    13·1 answer
  • All tif files start at offset 0 with what 6 hexadecimal characters?​
    11·1 answer
  • List three tacos there are several from the opening page of the help and support center.
    5·1 answer
  • Assume that the int variables i and j have been declared, and that n has been declared and initialized.
    10·1 answer
  • The pay of an hourly worker is calculated by multiplying the hours worked by the hourly rate—up to 40 hours; any hours worked be
    11·1 answer
  • In addition to ranking the relevance of a particular site according to the keywords entered by the user, which of the following
    10·1 answer
  • How can your network be infected with malware or ransomware?
    6·1 answer
  • The success criteria are used to judge whether a project is successful. False True <br> need it now
    13·2 answers
  • Write a program to find the principle amount​
    10·1 answer
  • The output of a computer can be seen on ( monitor, keyboard or mouse )​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!