1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gavmur [86]
3 years ago
10

Before composing a cover letter, you should start _____.

Computers and Technology
2 answers:
k0ka [10]3 years ago
7 0

Answer: with the letterhead

Explanation:

ExtremeBDS [4]3 years ago
3 0
Perhaps U should start with A header

You might be interested in
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
Which of the following software monitors a user's activities and sends the information back to another source without the user k
sdas [7]

Answer:

Malware

Explanation:

Some of the examples of Malware are Spyware, Viruses, Adware, Fake security software and Browser hijacking software. And these are a piece of codes, and if this is successfully installed on any computer, it spies through the user's activity, and without any consent of the users, sends all those personal and various other very sensitive data like credit card related information to the hacker. and who then take control of all your activities, and can threaten you, and ask for money to let you go free. Hence, always be clear to operate with only trusted parties.

5 0
3 years ago
Consider five wireless stations, A, B, C, D, and E.
klio [65]

Answer:

Check the explanation

Explanation:

A) Whenever C is sending to D, what other communications are possible?

C’s packet will be seen by A, B and D, but not by E. Thus, D can send to E at the sametime..

B) Whenever B is sending to A, what other communications are likely?

Even though B’s packet will not be seen by D, other nodes, e.g., E, or C, can’t send to D since the packets from these nodes will interfere with the packets from B at A. Therefore, other communications is not likely at the same time.

C) Whenever B is sending to C, what other communications are possible?

B’s packet will be seen by E, A and C, by not by D. therefore, E can send to D at the same point.

4 0
3 years ago
Will give brainliest
lapo4ka [179]

Answer:

a. energy

Explanation:

The higher the amplitude, the higher the energy. To summarise, waves carry energy. The amount of energy they carry is related to their frequency and their amplitude. The higher the frequency, the more energy, and the higher the amplitude, the more energy.

Hope this helped!!!

7 0
3 years ago
Complete the statement below using the correct term.
julia-pushkina [17]

Answer:

im pretty sure it is the implementation phase. But i can't be too sure about it.

5 0
3 years ago
Other questions:
  • Which formula returns TRUE, if the value in cell B1 is less than 40 and the value in C1 is less than 100?
    7·2 answers
  • Describe network in the terms of computer lab
    5·1 answer
  • In some cases, certain Hyper-V guest operating system features do not function properly using the operating system's own device
    9·1 answer
  • A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ___
    14·1 answer
  • Inthe old days, databases did NOT support ____________.
    10·1 answer
  • After an attacker has successfully gained remote access to a server with minimal privileges, which of the following is their nex
    15·1 answer
  • An entity can be said to have __ when it can be wronged or has feelings of some sort
    10·1 answer
  • Which is a concept of the CIA of Computer Security
    7·1 answer
  • Which of the expressions is false? when a = 10 and b = 4
    8·1 answer
  • Someone put malware on your computer that records all of your keystrokes. what aspect of security was primarily attacked? choose
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!