1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Umnica [9.8K]
3 years ago
11

:3 11 points!

Computers and Technology
1 answer:
Lady_Fox [76]3 years ago
7 0

Answer:

If it's for school idk but I have a brothers printer and it has worked since 2009

Explanation:

You might be interested in
Your organization's security policy specifies that any mobile device (regardless of ownership) that connects to your internal ne
Veseljchak [2.6K]

Answer:

Create an microsoft intune for remote management of the device

Explanation:

Microsoft intune is a server based management that grants an authorized user or group limited access to information in its database.

Setting up a intune in new acquired devices (it is called bulk enroll) is as easy as connecting a usb to the device and clicking install on the administrator PC. While already existing devices would have to create an account as individual users.

3 0
3 years ago
What is a drone satellite?​
babymother [125]

Answer:

A satellite that can be controlled where to go.

Explanation:

4 0
3 years ago
taking small bits of information from the internet/web and using it as my own work or to complete an assignment is plagiarism.
lana66690 [7]
Not necessarily, if you are sourcing the information you have used to come to your own conclusion then that isn't plagiarism, however if you just copy paste completely and use it as your own work then yes it is plagiarism.  <span />
7 0
3 years ago
What type of firmware should you look for on a pc if you want the computer to support gpt partitions?
Ilia_Sergeevich [38]

Answer:

UEFI

Explanation:

7 0
2 years ago
The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
gayaneshka [121]

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

5 0
3 years ago
Other questions:
  • What technique is used to separate the different cell parts?
    15·1 answer
  • TCP has a 32-bit sequence number field and 16-bit advertised window field. Assume that RTT is 512 (2 9 ) ms, transmission speed
    6·1 answer
  • You need to write a loop that will repeat exactly 125 times. which is the preferred loop construct to use?
    12·1 answer
  • Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for e
    12·1 answer
  • A program in which students learn a specific skill for a particular job is called a
    8·2 answers
  • If you receive an email message you suspect is spam, what should you do?
    11·1 answer
  • Put Your Zom Here If You In Zom
    6·2 answers
  • Is data science the sexiest job in 21st century according to Harvard business review?
    13·1 answer
  • Which search strategy explores nodes from the initial state as well as the goal state?
    10·2 answers
  • In the software development process, which review studies the software design before it is released for coding?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!