1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dexar [7]
3 years ago
9

2

Computers and Technology
2 answers:
aleksklad [387]3 years ago
7 0

Answer:

MOD

Explanation:

Elza [17]3 years ago
3 0

A is the correct answer.

Hope this helps you!

You might be interested in
How are online sources used? Check all that apply.
Rus_ich [418]

Answer:

As a way to learn from others

As a way to find information

Explanation:

common sense

3 0
2 years ago
Read 2 more answers
You have users who connect to the corporate network using their laptops. because these computers often access confidential data,
Triss [41]
<span>You implement NAP Enforcement for 802.1X</span>
7 0
2 years ago
Which statement is true about hacking?
V125BC [204]

Answer:

Hackers do so for various reasons, including the challenge of it

Explanation:

I would say it is this. Plz mark brainliest Thanks:)

7 0
2 years ago
Read 2 more answers
In a word-processing program, what are the easily accessible icons that allow you to print, save and change fonts with a click o
Elan Coil [88]

The answer is A. tool bar

7 0
2 years ago
Melissa is the network administrator for a small publishing company. as network administrator, she is in charge of maintaining t
Arte-miy333 [17]
The answer is an Intruder Prevention System (IPS). An Intrusion Detection System (IDS) will detect an attack but will not block it.
3 0
3 years ago
Other questions:
  • ​You work at a call center of a large bank where you answer credit card services related questions from customers. Lately, you h
    14·1 answer
  • On the Insert tab, select Table &gt; _______ to create a table from selected text.
    14·1 answer
  • A bicycle combination lock has four rings with numbers 0 through 9. Given the actual numbers and the combination to unlock, prin
    13·1 answer
  • You can count on everything online to be 100% accurate. <br> A. FALSE <br> B. TRUE
    11·2 answers
  • Public class Main{ public static void main(String [] args){ String name=WelcomeJava; Runnable r1=() -&gt; System.out.println(nam
    12·1 answer
  • Security breaches are easier to address with which payment form?
    11·2 answers
  • How much is this worth in dollars​
    9·1 answer
  • What legal protection would cover a person invention?
    10·2 answers
  • Which requires large computer memory?
    15·1 answer
  • In order to control access to a company's intranet and other internal networks, all communications pass through a _____ server.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!