1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alekssandra [29.7K]
3 years ago
15

HELP!!! So i had 4/5 brainelist answers, but now i log on and only have 1/5

Computers and Technology
2 answers:
Dmitriy789 [7]3 years ago
4 0
You just gotta answer questions and have them good enough that people give you brainliest.
Sliva [168]3 years ago
4 0
That must mean you only received 1 brainliest within the past 30 days. 
You might be interested in
If an occupation is projected to grow by 13% over the next 10 years, how would you rate the job outlook?
Elena L [17]

Answer:

Steady

Explanation:

Its not an insane growth rate but it would more then likely be Steady.

6 0
3 years ago
Read 2 more answers
what will be the Trade discount and Invoice Amount if the List Price is $400.00 and the Trade Discount Rate is 85%
V125BC [204]

Answer:

$340

Explanation:

you have to multiply $400 bu 85% to get $340

4 0
2 years ago
What three best practices can help defend against social engineering attacks?
lina2011 [118]

The three best practices that can help protect against social engineering are:

  • Be watchful of instructions to click on enticing web links.
  • Educate employees regarding policies.
  • Avoid disclosing your login details.
<h3>Social engineering</h3>

This refers to online crimes that are socially engineered or designed to trick victims into providing certain information or carrying out certain actions that would cause unknown harm to them or others.

For example, they may be tricked into revealing their security information or other personal information via email correspondence.

You can learn more about social engineering here brainly.com/question/26072214

#SPJ12

6 0
2 years ago
____________ describes major components that comprise a system, their relationships, and the information the components exchange
inysia [295]

Answer: Software Architecture

Explanation:

Architecture of a software depicts the basic structure of a software system. Software architecture also describes how the structure of a system behaves and creates such structures, where each structure is consists of software components, relations between these components and the characteristics of these components and relations. It gives an abstraction of a system while hiding its implementation details. It provides description about how the elements of a system interact with each other. For example Service Oriented Architecture (SOA) is a software architectural approach in  which the different application components provide services to other components over the network. IT is a collection of services that communicate with each other. These services integrate into distinct software systems which belong to different business domains.

3 0
3 years ago
12. What are the additional elements required of a network architecture if the enclave is to support remote access through the p
Romashka [77]

The additional elements needed of a network architecture are:

  • Policy management
  • Remote access server
  • VPN Gateway, etc.

<h3>What is network architecture example?</h3>

Network architecture is known to be the set up of a computer network. It is regarded as the backbone for the specification of the physical attributes of a network and also their functional configuration.

An examples is a printer that is linked to the network. Note that  additional elements required of a network architecture if the enclave is to support remote access through the public Internet are Policy management, etc.

Learn more about network architecture from

brainly.com/question/13986781

6 0
2 years ago
Other questions:
  • What can a folder on a computer contain?
    13·2 answers
  • Shakespeare’s complete works have approximately 3.5 million characters. Which is bigger in file size: Shakespeare’s complete wor
    5·2 answers
  • Give 2 examples of when spreadsheets are used.
    15·1 answer
  • When Mark’s organization implemented an IS, they faced the lack of confidence in users. Which strategy can improve user confiden
    11·1 answer
  • The MAA is responsible on a daily basis to protect office computers and patient records and personal information from hackers. R
    12·1 answer
  • Which shortcut key combination will move the cursor to the beginning of the line?
    13·1 answer
  • Can someone explain what Bytes are? I would really like to know.
    5·2 answers
  • The disk you inserted was not readable by this computer
    11·1 answer
  • If a person communicates indirectly and attaches little value to
    6·1 answer
  • How to check the at&amp;t internet speed on my computer
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!