1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
5

In a network, a computer that performs specific services for other computers on the network is called a

Computers and Technology
1 answer:
klio [65]3 years ago
8 0
Motherboard or main sequence processor 
(either that  a mainframe or a server)
hope this helps

You might be interested in
Company Wizzy is having trouble with network security. Issues with authentication, viruses, malware/spyware, and other network i
Darya [45]

Answer:

B) security as a service I'm just doing the work

4 0
3 years ago
"in troubleshooting a boot problem, what is the advantage of restoring all uefi/bios settings to their default values?"
Alex17521 [72]
When this case would appear, one thing that I would do personally would first, go to the settings, in then, after having this done, I would then "scroll down" to where ti would say "restore (uefi/bios) files, and from there, you would get every value that would would have from the beginning in your chip.

And also, what is truly unique would be the fact that you would be able to choose the "restore point" that you would like for it to appear.
3 0
3 years ago
Describe how to deploy a website and make it as secure as possible while reducing its resources used
erastova [34]

Answer:

Explanation:

in order to deploy a website, you use these 5 steps, the first step is the preparation step, the second step is to set up DNS record, in step 3 a live testing is set up, in step 4 you set up email accounts while in step 5, you back up and now go live.

in order to secure your website from any threat, malware it hacker it it is necessary to use HTTPS. HTTPS, protects the websites integrity. it also provides data protection as data encryption provides such security. parameterized queries can also be used.

5 0
3 years ago
Assume your organization has 200 computers. You could configure a tool to run every Saturday night. It would query each of the s
lukranit [14]

The tool that would provide a report listing all systems that are out of compliance, including specific issues is Security Compliance Manager.

<h3>What are compliance tools?</h3>

The Security Compliance Manager is known to be a form of downloadable tool that one can use as it helps a person to plan, ascribe, operate, and manage a person's security baselines for Windows client and other forms of server operating systems.

Note that in the case above, The tool that would provide a report listing all systems that are out of compliance, including specific issues is Security Compliance Manager.

Learn more about Security Compliance Manager from

brainly.com/question/24338783

#SPJ1

4 0
2 years ago
Which concept allows the computer to repeat a group of steps in an
allochka39001 [22]

Answer:

A

Explanation:

I was gonna say 'loop' from my computing days. but it is now called iteration

7 0
2 years ago
Other questions:
  • Questions 1 )When does a spring tide take place?
    14·2 answers
  • In a ___ traversal of a binary tree, you begin at the root and visit nodes one level at a time
    10·1 answer
  • You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click o
    9·1 answer
  • Illusions in physcology​
    14·1 answer
  • Write an if/else statement that assigns 0 to x when y is equal to 10; otherwise it should assign
    9·1 answer
  • Information in​ folders, messages,​ memos, proposals,​ emails, graphics, electronic slide​ presentations, and even videos create
    7·1 answer
  • 1. True or false: The more pixels per inch in an image, the higher the resolution is. (1 point)
    8·1 answer
  • Help pls. Computer basics.
    5·2 answers
  • Write pseudocode for the question below:
    15·1 answer
  • Arturo is a security professional. He is strengthening the security of an information system. His design ensures that if a field
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!