1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ozzi
3 years ago
12

What basic drafting instruments are incorporated in a drafting machine?

Computers and Technology
1 answer:
erastovalidia [21]3 years ago
3 0
It would be the army and then people of nyc
You might be interested in
The c++ operator _______________ is used to destroy dynamic variables.
UNO [17]
<span>The c++ operator delete is used to destroy dynamic variables.</span>
6 0
3 years ago
First Person Who Answers Fast As Possible Will Be Marked As Brainiest ​
AleksandrR [38]

Answer:

Save a database object Ctrl+S or Shift+F12

Open an existing database   Ctrl+O or Ctrl+F12

To quit MS Access ALT+F4

Explanation:

7 0
4 years ago
______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
Kitty [74]

Answer:

"IP security" is the correct answer for the above question.

Explanation:

  • "IP security" is a set of rules or protocols which are used for the communication of the network.
  • It is a protocol that is used to encrypt the data which is needed to transfer on the network.
  • It provides security for the communication and it encrypts the data which is needs o transfer on the network.
  • The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.
7 0
4 years ago
Read 2 more answers
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
When Jimmy Fallon is outside the White House, his persona is mostly O A. humble O B. stern O c. gloomy O D. wild​
horsena [70]

Answer:

a

Explanation:

7 0
3 years ago
Other questions:
  • The internet is a worldwide assembly of computer
    11·1 answer
  • Write an application in which you declare an array of eight first names. Write a try block in which you prompt the user for an i
    7·1 answer
  • If a drastic change in environmental conditions results in a prolonged drought, how would the total population of ferns be affec
    14·2 answers
  • Which software would you use to create a print design?
    8·2 answers
  • Format character of Date function that display the day of the month in 2 digits with leading zeros such as 01 to 31
    11·1 answer
  • Which item is most likely to be a standard part?
    14·1 answer
  • Which platform is the best? (X-box, PC, Playstation, Nintendo Switch, Wii)
    10·1 answer
  • Sam plans to use this image in artwork for a brochure about airplanes. Which principles of page layout is Sam planning to use in
    11·1 answer
  • Fix the two words that are used incorrectly.
    10·2 answers
  • What will happend when I got a BSOD in Windows?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!