1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnesinka [82]
3 years ago
8

To lock down security settings on an individual system on a network, what would you use?

Computers and Technology
1 answer:
professor190 [17]3 years ago
8 0

Answer:

The answer is "LSS(Local Security Settings)".

Explanation:

The LSS stands for Local Security Settings, it is a set of information about the security of a local computer. LSS allows a feature, that the information on the protection of a local computer is a local safety policy of a device.

  • This option is available on windows.
  • The local security policy information includes the domains, that trust login attempts to be authenticated.

 

You might be interested in
What should you do in order to have access to the header and footer tools? Open the View tab. Open the Page Setup dialog box. Op
Svetach [21]

Answer:

Step 1  - Open the View tab.

Step 2 - Open the Page Setup dialog box

Step 3 - Open the header and footer tool.

Step 4 - Click OK.

Explanation:

In order to access to the header and footer tools

Step 1  - Open the View tab.

Step 2 - Open the Page Setup dialog box

Step 3 - Open the header and footer tool.

Step 4 - Click OK.

4 0
3 years ago
What is 1 of the rules for naming variables?
vova2212 [387]

Answer:

<h3>Rules for Naming Variables</h3><h3>The first character must be a letter or an underscore (_). You can't use a number as the first character. The rest of the variable name can include any letter, any number, or the underscore. You can't use any other characters, including spaces, symbols, and punctuation marks.</h3>

<em><u>#</u></em><em><u>M</u></em><em><u>a</u></em><em><u>r</u></em><em><u>k</u></em><em><u>a</u></em><em><u>s</u></em><em><u>b</u></em><em><u>r</u></em><em><u>a</u></em><em><u>i</u></em><em><u>n</u></em><em><u>l</u></em><em><u>e</u></em><em><u>s</u></em><em><u>s</u></em><em><u>p</u></em><em><u>l</u></em><em><u>e</u></em><em><u>a</u></em><em><u>s</u></em><em><u>e</u></em><em><u>✅</u></em>

3 0
3 years ago
Create a logic array qualifyingIndex with true for any location where the runner is male with a running time less than 8.2. Row
larisa [96]

Rounding Numbers

Say you wanted to round the number 838.274. Depending on which place value you'll round to, the final result will vary. Rounding 838.274:

Rounding to the nearest hundred is 800

Rounding to the nearest ten is 840

Rounding to the nearest one is 838

Rounding to the nearest tenth is 838.3

Rounding to the nearest hundredth is 838.27

5 0
3 years ago
What is a frame injection attack in a wireless network?
Romashka-Z-Leto [24]

Answer:

A.Un hacker introduce un cadru fals în timpul transmiterii datelor.

Explanation:

3 0
3 years ago
Read 2 more answers
A museum is evaluating historical documents for authenticity, reviewing their physical condition, and categorizing them by subje
Natasha_Volkova [10]

The part of this process that could the museum automate easily is defining and assigning categories by subject.

<h3>What is Cloud backup?</h3>

Cloud backup is known to be a kind of service where  data and applications on a business's servers are known to be saved up and kept on a remote server.

Note that a lot of Businesses usually back up to their data to cloud so as to keep files and data in space and available when they need it  most especially in the times of a system failure, outage, etc.

Learn more  about museum  from

brainly.com/question/95815

6 0
2 years ago
Other questions:
  • How can you make a circle in JavaScript? Thank you!
    9·1 answer
  • a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style
    6·1 answer
  • What is a Better Computer?<br> A. Alien<br> B. Microsoft<br> C. Windows<br> D. Apple
    11·2 answers
  • Where would you go to add fractions to a document in adobe indesign
    5·1 answer
  • Write a program to generate personalized junk mail. The program takes input both from an input file and from the keyboard.The in
    14·1 answer
  • Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a
    11·1 answer
  • Which option is the default when creating appointments and meetings in a user’s own calendar as it relates to Free/Busy informat
    8·1 answer
  • What legal protection would cover a person invention?
    10·2 answers
  • Rectangle perimeter is 72 .Find the new perimeter if length is doubled and breadth is tripled​
    7·1 answer
  • Write a program that uses the Purchase class in 5.13. Set the prices to the following: Oranges: 10 for $2.99 Eggs: 12 for $1.69
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!