1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
3 years ago
11

Select the correct answer.

Computers and Technology
1 answer:
Pachacha [2.7K]3 years ago
3 0
B) Spreading the news about the incident response plan is not a good idea. If an incident was intentionally caused by a malicious person or group, knowing your response plan gives them information about how to make things worse.
You might be interested in
Explain the steps you take to complete an Internet search. Do you use a particular search engine every time or do you alternate?
Naddik [55]
1. Personally, I always use the same search engine, which is Google. I once opened Bing mistakenly, but obviously returned to Google immediately. Google is my preferred choice because I've used it for such a long time that I've gotten so used to it and cannot change it. The other search engines don't look as appealing to me as Google.

2. Some advantages would be definitely the format of the information you get from a search engine as opposed to the metasearch engine - sometimes, the metasearch engine cannot provide you with complete results or even complete sentences, so you may be left with illegible texts. On the other hand, metasearch engines can give you so much more information than regular search engines.

3. If the credentials seem legit, based on particular rules as to how to write sources used (such as Chicago style, APA, etc.), then you can safely assume the source is credible. If the author wrote everything necessary in his text (especially works cited/links available), you can usually trust that source.
5 0
3 years ago
In which network zone should a web server be placed?
Cloud [144]

Answer:

DMZs

Explanation:

"That's fine for a small company, but a larger company should consider creating a perimeter security network called a demilitarized zone (DMZ) that separates the internal network from the outside world. DMZs are the best place for your public information."

       - ZDNetwww.zdnet.com › article › dmzs-for-dummies-5000297743

7 0
3 years ago
If you want an app to reach the largest possible audience, which two platforms should you use?
Papessa [141]

Android Studio for Android, and Xcode for Apple devices.

6 0
3 years ago
In Interactive Charting, which chart type allows you to chart the current spread between a corporate bond and a benchmark govern
harkovskaia [24]

Answer:

c. Bond Spread

Explanation:

An interactive chart is used to show all the details in the chart and the user can extend or shrink the details that is presented in the charts by using the slider control.

The bond spread in an interactive is a chart that is used to compare and chart the current spread between the corporate bond as well as the benchmark government bond.

8 0
3 years ago
There are various risks from attacks on wi-fi networks. These include all of the following except _____.
Mariulka [41]

There are various risks from attacks on wi-fi networks. These include all of the following except creating option d: malware.

<h3>What is malware?</h3>

This is said to be any program or file that purposefully hurts a computer, network, or server is known as malware, or malicious software.

Note that Computer viruses, worms, as well as Trojan horses, ransomware, and spyware are said to be examples of malware.

Lastly, Malware, often seen as malicious software, is a general word for any program or piece of code written with the intention of causing harm to a computer, network, or server.

Learn more about malware from

brainly.com/question/399317
#SPJ1

See options below

Blackbox

Acting

Miracle

Malware

5 0
1 year ago
Other questions:
  • A client is concerned that a power outage or disaster could impair the computer hardware's ability to function as designed. The
    13·1 answer
  • Write a recursive program that requests an answer to the question "Are we there yet?" using an input statement and terminates if
    10·1 answer
  • Which business application uses location information to provide a service and is designed to give mobile users instant access to
    5·1 answer
  • Most editing commands in Word, such as cut, copy, and paste, can be found on which tab?
    9·2 answers
  • Data are sent through a network on bundles called ____packets____. select one:
    14·2 answers
  • Your customer asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his works
    6·1 answer
  • Why won’t my Nintendo Switch connect to the internet?
    7·1 answer
  • A common approach of networking multiple computers as opposed to a single computer is? called:
    14·1 answer
  • 1) Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9
    5·1 answer
  • Your friend Cameron’s little sister is visually impaired. Cameron is worried that his sister will not be able to use technology
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!