1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
4 years ago
15

What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?

Computers and Technology
1 answer:
mote1985 [20]4 years ago
3 0
Use a virus scanner they have plenty of good virus scanners out there just make shure that the virus scaner that your downloading isnt a virus thats how they get you XD
You might be interested in
How do news organizations primarily create revenue?
Tamiku [17]
D. through customer subscriptions
6 0
3 years ago
Read 2 more answers
What is the full form of bcc please tell​
expeople1 [14]

Blind Carbon Copy

For emails. It is used to send a copy of the email to somebody without the original person receiving it knowing that you sent a copy.

3 0
3 years ago
Read 2 more answers
A​ ___________ identifies the content and purpose of the​ visual, along with whatever label and number​ you're using to refer to
Westkost [7]

Answer:Title

Explanation: Title is basically considered as the "heading" or the "topic" that is used for giving the hint about the content or visual. In context with the visual ,which is the piece of display where title determines about the reason of visual and also hints about the content .It also gives the reference number that a person assign to the visual.

7 0
3 years ago
Formatting can be applied to
valkas [14]
Formatting can maybe be applied to software works
8 0
3 years ago
Read 2 more answers
You have important data on your hard drive that is not backed up and your Windows installation is so corrupted you know that you
Solnce55 [7]

Answer:

b.Make every attempt to recover the data

Explanation:

If you have important data on your hard drive that is not backed up and your Windows installation is so corrupted you know that you must refresh the entire installation you should  make every attempt to recover the data.

4 0
3 years ago
Other questions:
  • What’s the answer?............................
    13·1 answer
  • Design a 4-bit register that can accept an input from the user and store the accepted input. The 4-bit register will operate in
    6·1 answer
  • A(n ____ is anything about which data are to be collected and stored.
    8·1 answer
  • In Android system, an e-mail application that shows a list of new emails, composes an email, or reads an email is called (A) Ser
    9·1 answer
  • Public static String doSomething(String s) { final String BLANK = " "; //BLANK contains a single space String str = ""; //empty
    6·1 answer
  • What is one method that can be used to open the Microsoft Word application?
    8·1 answer
  • The fill command try’s to fill or generate content for cells based on a ________.
    15·1 answer
  • Pleasee help. How do you fix this problem in discord?
    10·1 answer
  • mary needs to rename her report.txt file to final_report.txt. which command will allow her to do this?
    10·2 answers
  • 2. Which one of the following is the purpose of relating tables in a database?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!