1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11111nata11111 [884]
3 years ago
6

Say true or false::!

Computers and Technology
2 answers:
kherson [118]3 years ago
8 0
True!
That was easy lol,
stiks02 [169]3 years ago
5 0
True for both of them.
You might be interested in
Give two reasons why network security is the most important issue regarding data centers.
deff fn [24]
Three key concepts of security are integrity, confidentiality, and availability.

Network firewalls are the first line of defense, intended to keep intruders out. Once a system is compromised, all of its data can be accessed, and if a bad actor gains access to one system, they effectively have access to all of the systems. This touches on both system integrity and data confidentiality.

Security is also related to availability, or uptime. If your network is compromised, it may be inaccessible to those who need to use it, making it useless. If I'm working from an office in Chicago, and the company's main DC is in Atlanta, I need the network to remain available to access critical files.
7 0
3 years ago
What was the first general purpose, programmable, electronic computer?.
ryzh [129]

Answer:

ENIAC: first general-purpose electronic computer.

Explanation:

6 0
3 years ago
Under which access control system is each piece of information and every system resource (files, devices, networks, and so on) l
Pani-rosa [81]

Answer:

C. Mandatory access control

Explanation:

In the implementation of computer security, the mandatory access control (MAC) refers to the implementation of a security feature by operating systems. In this method, individual resource owners’ are unable to deny or grant permissions to a resources contained in a file. The criteria in a MAC when defined by the system administrator is implemented and enforced by the OS.

7 0
3 years ago
URLs are the global ______ of resources on the Internet.
adell [148]
I believe the answer might be addresses 
 <span />
4 0
3 years ago
Read 2 more answers
Brainliest for correct answer
SashulF [63]

Answer: A

Explanation: Been asked before.

6 0
3 years ago
Read 2 more answers
Other questions:
  • In a word processor, Tariq chooses Options from the Tools menu and then selects the Track Changes tab. Which of the following ta
    14·1 answer
  • A device that makes it possible for multiple customers to share one address is called a/n _____.
    15·1 answer
  • What is the benefit to having the user interface integrated into the operating system? a) Power users prefer the added flexibili
    13·1 answer
  • Write a program to calculate how much to tip a waiter person based on the quality of service. The script file should ask for the
    12·1 answer
  • How can people make sure they are using credit cards responsibly
    14·2 answers
  • Which is a requirement for searching for a template
    14·1 answer
  • Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environmen
    15·2 answers
  • To access documents stored on a "cloud", you'll
    12·1 answer
  • Which of the following statements is true when it comes to developing a web presence for a business?
    6·1 answer
  • A/an _____________ is a stored program that executes at a specified time. Group of answer choices stored procedure view trigger
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!