1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yKpoI14uk [10]
4 years ago
15

A ____ is an unknown network.

Computers and Technology
1 answer:
Grace [21]4 years ago
4 0

Answer:

its called a anonymous network

You might be interested in
What type of malicious software masquerades as legitimate software to entice the user to run it?
Vlada [557]

Answer:

Trojan horse

Explanation:

A Trojan horse is malicious software that masquerades as a legitimate computer program such as a video game, image file, utility program, or even an antivirus so as to entice the user to run it, thereby allowing an attackers (the developer of the malicious program) to gain access to the data on the computer in an illegal manner.

4 0
3 years ago
Which of the following is a regional accreditation agency?
Sveta_85 [38]

Answer:

A. Middle States Association of Colleges and Schools

Explanation:

The Middle States Association of Colleges and Schools (Middle States Association or MSA) is a non-profit association that performs regional accreditation of schools both public and private  in the Mid-Atlantic region of the United States and for some institutions with an American origin. The MSA has three commissions:

  1. Middle States Commission on Higher Education (MSCHE)
  2. Middle States Commission on Elementary Schools (MSCES)
  3. Middle States Commission on Secondary Schools (MSCSS)
4 0
3 years ago
A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file se
inysia [295]

Answer:

gpresult

Explanation:

Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.

Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.

There are various group policy commands such as;

  1. rstrui (System Restore tool will run),
  2. runas (using different permission to run a tool or program),
  3. tasklist (currently running programs are shown
  4. gpupdate (Group policies are refreshed)
  5. gpresult (group policy configurations are displayed for verification)

gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date

6 0
3 years ago
PLEASE HELP!! Which of the following computing devices would best address the needs for a CYBER SECURITY ANALYST?
Tomtit [17]

Answer:high end laptop.

Explanation:

5 0
4 years ago
Write a function that takes, as an argument, a list, identified by the variable aList. If the list only contains elements contai
Genrish500 [490]

Answer:

The function is as follows:

def concList(aList):

   retList = ""

   for i in aList:

       if(str(i).isdigit()):

           retList+=str(i)

       else:

           retList = "Not digits"

           break;

   return retList

Explanation:

This defines the function

def concList(aList):

This initializes the return string to an empty string

   retList = ""

This iterates through aList

   for i in aList:

This converts each element of the list to an empty list and checks if the string is digit

       if(str(i).isdigit()):

If yes, the element is concatenated

           retList+=str(i)

If otherwise

       else:

The return string is set to "No digits"

           retList = "Not digits"

And the loop is exited

           break;

This returns the return string

   return retList

5 0
3 years ago
Other questions:
  • Which type of architecture places a firewall in front of the VPN to protect it from Internet-based attacks as well as behind a f
    6·1 answer
  • The smallest network
    13·1 answer
  • Which of the following are reasons why it is important to properly recycle electronic equipment? Select all that apply.
    14·2 answers
  • How can I crack a computer password?
    10·1 answer
  • What were the technological innovations that allowed for the rapid expansion of the railroads?
    6·1 answer
  • A user on a corporate laptop discovers that their bank account and social media accounts have all been hacked. The user has high
    12·1 answer
  • Boardman College maintains two files—one for Sociology majors and another for Anthropology majors. Each file contains students'
    5·1 answer
  • Which of the following is the shortcut key combination for pasting copied text?
    11·2 answers
  • Should the federal government have bug bounty programs? Why or why not?
    9·2 answers
  • Taking this driver education course
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!