1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hammer [34]
3 years ago
8

How long does a baby dolphin stay with its mum

Computers and Technology
1 answer:
g100num [7]3 years ago
5 0
The nursing usually takes up to 18 months, i.e. one year and a half.

The baby dolphin may however remain with his mum for up to 3-6 years.
You might be interested in
Explain in details three security countermeasures you know.​
SpyIntel [72]

Answer:

The three options are:

1. Avoid sharing files and folders over the network without the permission of your administrators. You might fall in trouble otherwise.

2. Never share your credit card details with a third party through the internet. You can lose a lot of or all your money.

3. Always ensure that your password is strong enough or else your account can be hacked, And never share them with anybody.

Explanation:

Please check the answer.

4 0
3 years ago
Describe and list advantages and disadvantages of each of the following backup types:
crimeas [40]

Answer:

Full back up

It creates complete copy of the source of data. This feature made it to the best  back  up with good speed of recovery of the data and  simplicity.However, because it  is needed for backing up  of  a lot of data, it is time consuming process,Besides it also  disturbs the routine application of  the technologist infrastructure. In addition large capacity storage is needed  for the  storage of  the large volume of back up with each new creation.

Incremental back up: back up work at high speed thus saves time, Little storage capacity is needed. This type of back up can be run as  many time as wished.

However, the restoration of data takes time, due to the time spent for restoration of initial back up and the incremental.

Differential Back up has very fast back up operation, because it only requires two pieces of back up.This is however slower compare to the Incremental.

The selective back up enable selection of certain type of file or folders for back up.

it can only be used to back up folders only when important data  are needed only.Thus the  storage capacity is low.

CPD eliminates back up window and reduces the recovery point objective.However, it has issue of compatibility with the resources to back up.,it is also expensive because its solutions are disk based.

Cloud based is affordable and save cost,It is easier to access. it is efficient,it can be access remotely for convenience.

However, Internet sources and some bandwidth must be available for access., always depends on third party providers,There is also problems encountered when switching providers.

Explanation:

8 0
3 years ago
What are some industries of aerodynamics and hydrodynamics? explain each one in detail.
maria [59]
Aerodynamic- Wind turbine, computational fluid dynamics, and Wind power

Hydrodynamics- Computational Fluid Dynamics, Hydraulics, and Microfluidics
3 0
1 year ago
Read 2 more answers
You are the security analyst for your organization and have discovered evidence that someone is attempting to brute-force the ro
Sergeu [11.5K]

Answer:

Active Attack

• It is an active attack 1, because someone is actively attacking your system. It is also an active attack because it is affecting the way your system works negatively, and visibly.

• 2, because they have been caught for actively committing a crime.

• lastly, because a brute-force is classified as an active attack, regardless. It is an illegal way to attempt to damage, steal or change a root password.

•<em> Fun fact </em>

 <em>A DDoS(distributed denial-of-service) is also classified as an active attack.</em>

6 0
2 years ago
Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful.
Alex777 [14]

Answer:

D. Misconfigurations

Explanation:

There are a large number of network security vulnerability with is a continuously increasing as technology evolves. Examples of the vulnerabilities are DOS attacks, reconnaissance attack, spyware, key logger, Malicious ware attacks etc.

There are good ways of mitigating these attacks, but sometime lack of vendor support of network devices and end of life systms, broadens the attacks.

Alyona would discuss option A - C, but not D (Misconfigurations) because it would only imply the capacity of the network team.

7 0
3 years ago
Other questions:
  • You have a Nano Server named Nano1. Which cmdlet should you use to identify whether the DNS Server role is installed on Nano1
    12·1 answer
  • What is an electronic tool that stores large amounts of data in one place in a systematic, logical way? A Database B Platform C
    5·1 answer
  • Write a public member function which replace that replaces one occurrence of a given item in the ArrayBag with another passed as
    14·1 answer
  • Cine stie repede va rog mult si repede
    9·1 answer
  • When you login to your blogging account. The first screen with all controls, tools and functions is called .... Select one: a. D
    10·1 answer
  • MULTIPLE COICE! BRAINLIEST
    12·1 answer
  • SOMEONE PLEASE HELP ME WITH THIS ILL GIVE YOU BRAINLY IF YOU GET IT RIGHT PLEASE!!!!!
    13·2 answers
  • Q1) write a brief note on desktop computer.
    13·1 answer
  • An analog video is a video signal transmitted by an analog signal, captured on a (blank)
    13·1 answer
  • Explain why you do not need expensive equipment to take pictures or record video?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!