1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
12

What is required for real-time surveillance of a suspects computer activity?/p Group of answer choices a. Blocking data transmis

sions between a suspect’s computer and a network server. b. Poisoning data transmissions between a suspect’s computer and a network server. c. Preventing data transmissions between a suspect’s computer and a network server. d. Sniffing data transmissions between a suspect’s computer and a network server.
Computers and Technology
1 answer:
Hitman42 [59]3 years ago
3 0

Answer:

c  Preventing data transmissions between a suspect’s computer and a network server

Explanation:

You might be interested in
Computers that belong to the same domain can access a common security database of user and computer account information. This ty
Mashutka [201]

Answer: Active Directory database

Explanation:Active directory database works on ESE (Extensible storage engine) for the functioning.Indexed and sequential access method(ISAM)database persist in the ESE for the management of computer devices.

This functions for providing the quick accessing towards the records through database.The database files contain the data in the ESE indexes and is common to computer information and the user.

6 0
2 years ago
which of the following statements about the evolving relationship between traditional newspaper operations and blogging is true?
Alex_Xolod [135]

Newspapers will continue to collapse or have their newsroom staffs substantially reduced as a result of their excessive debt.

One of these was advocacy journalism, where the journalist actively advances a specific cause or point of view. Early American newspapers were partisan and sensational, but in the late nineteenth and early twentieth century, they started to become more objective and professional. Many journalists have been confused by the fall in recent years since readers don't seem to be all that interested in reading newspapers. The decline in newspaper production is caused by a number of factors, including social media, corporate ownership, internet access, and advertising. Three of the four primary purposes of mass communication—surveillance, correlation, and cultural transmission—involve journalism to a significant extent.

Learn more about professional here-

brainly.com/question/1938929

#SPJ4

3 0
1 year ago
what will happen to the contents of the destination ell if you copy the contents of the source cell into the destination cell
DochEvi [55]

Answer:

It's content will be replaced with a content from the source cell.

7 0
3 years ago
A data center needs to ensure that data is not lost at the system level in the event of a blackout. Servers must stay operable f
poizon [28]

Answer: UPS

Explanation:

The redundancy effort that should be put in place to ensure the data remains available is the Uninterruptible Power Supply(UPS).

Uninterruptible Power Supply (UPS) is necessary in the provision of battery backup power when there's drop or stoppage in the flow of electricity. With regards to the question, it'll ensure that data is not lost at the system level in the event of a blackout.

3 0
3 years ago
Which do web servers host?<br> Websites<br> Networks<br> Firewalls<br> Zones
bixtya [17]

Answer:

Websites

Explanation:

A web server host websites, individuals or corporate websites, this helps us to show our websites in the World Wide Web, there are several companies offers this service, even we can get a free host, but a corporate website or a social media needs a lot of host recourses, these hosts are expensive than other, we could pay a web host monthly or per year.

6 0
3 years ago
Other questions:
  • Which of the four basic functions of a computer refers to the collection of data by a computer?
    11·2 answers
  • What is the drawback of the linear model?
    5·2 answers
  • ________ are used to translate each source code instruction into the appropriate machine language instruction.
    11·1 answer
  • Which party controlled the White House and politics in the late 1800s, except for Grover
    6·2 answers
  • Ok.,so i have a sopitify account and by accident i pressed the downlaod on button and it says start you free trial i pressed tha
    11·2 answers
  • Assume the availability of a function is_prime. Assume a variable n has been associated with positive integer. Write the stateme
    15·1 answer
  • Hellpppp please I need it!
    15·1 answer
  • 17. Which of the following keyboard shortcut is used to copy the selected text?
    13·2 answers
  • Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authe
    7·1 answer
  • If you walked into a room containing three computers and were told one of them was infected with malware, how would you determin
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!