1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maksim [4K]
3 years ago
12

Do {

Computers and Technology
1 answer:
olga55 [171]3 years ago
4 0
Bruh ........................
You might be interested in
A system forensics specialist has three basic tasks related to handling evidence: find evidence, preserve evidence, and ________
dmitriy555 [2]

Answer:

It would be Store

Explanation:

hope this helps if not sorry :(

3 0
3 years ago
An important principle in information security is the concept of layers of security, which is often referred to as layered secur
Eva8 [605]

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

5 0
3 years ago
What is the numeric range of a 16-bit twos complement value? A 16-bit excess notation value? A 16-bit unsigned binary value?
blagie [28]

Answer:

twos complement value is (-2^15 -1) -32768 to 32767.

excess notation value is -32768 to 32767.

unsigned binary value is (2^16) 0 to 65535

Explanation:

Excess notation: used to represent signed integers. Always uses fixed number of bits with leftmost representing the sign.

Twos complement notation: As opposed to excess notation, a sign bit of 0 is used to represent the non-negative (+) sign and a 1 for the negative (-); again, zero is included in the non-negative set.

Unsigned Binary values: are binary values/bits that don't have signs

7 0
4 years ago
Amy adds 16 GB of storage to her smartphone.
tatyana61 [14]
For every 1 gigabyte equals 1000 megabytes. Therefor Amy can store 8000 pictures on her smartphone.

1 GB to 1000 MB
16 GB to 16000 MB
File size 2 MB
16000 MB divided by 2 MB = 8000 MB
8 0
3 years ago
In a real machine, the AMA is always the IMA. TRUE or FALSE.
Lena [83]
The statement "<span>In a real machine, the AMA is always the IMA. " is false.</span>
6 0
4 years ago
Other questions:
  • 3k means about 3 thousand bytes. how would you express two hundred million bytes?
    8·1 answer
  • A culture that emphasizes verbal communication skills is ____________.
    9·2 answers
  • Can someone help me with...A table can help? PLEASE
    8·1 answer
  • In presentation software, what is the way that text and pictures are arranged on a page called?
    10·1 answer
  • A network technician is asked to redesign an Ethernet network before some new monitoring software is added to each workstation o
    7·1 answer
  • 2. Which of the following statements accurately describes enzymes? A. Enzymes increase the activation energy of reactions. B. Te
    5·1 answer
  • A large institution, such as a bank, may have thousands of transactions to process in which no user interaction is required; whi
    5·2 answers
  • Which element of a presentation program’s interface displays the slide you are currently creating or editing?
    14·2 answers
  • What type of media is a hard disk​
    9·1 answer
  • Pie charts are best used for
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!