1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
12

What is information associated with a document to help describe that document called?

Computers and Technology
1 answer:
noname [10]3 years ago
3 0
You'd call that 'metadata'.
You might be interested in
A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action shoul
sergij07 [2.7K]

An action which this organization should take to find out if systems have been compromised is: C. Look for unauthorized accounts.

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities and compromises in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails a tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the computer system.

In this scenario, we can reasonably infer and logically deduce that an action which this organization or cybersecurity specialist should take to find out if systems have been compromised is to look out for unauthorized accounts.

Read more on penetration test here: brainly.com/question/25813524

#SPJ1

Complete Question:

A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised?

Look for policy changes in Event Viewer.

Scan the systems for viruses.

Look for unauthorized accounts.

Look for usernames that do not have passwords.

7 0
1 year ago
What level of system and network configuration is required for cui?
andrey2020 [161]

The level of system and network configuration is required for Cui will be "Moderate confidentiality".

  • The data that really should be safeguarded or disseminated under appropriate regulations, rules, and conservative government objectives or guidelines, would be considered as CUI.
  • The FISMA demands CUI Fundamental to somehow be safeguarded somewhere at the FISMA Conservative category and may even be labeled as CUI as well as regulated.

Thus the above answer is right.

Learn more:

brainly.com/question/14083709

4 0
2 years ago
(MCQ question). Which of the following files stores information about a local Google Drive installation such as User email ID, L
Harlamova29_29 [7]

Answer:

Sync_config.db

Explanation:

With the help of this file we can find the following information of our google drive.

  1. Google Drive version  
  2. local sync root path  
  3. User email address
8 0
3 years ago
Average LCD panels are around _______________, which most monitor authorities consider excellent brightness.
uysha [10]

Answer:

The correct answer to the following question will be option D. 300 nits.

Explanation:

LCD Monitors: LCD stands for Liquid Crystal Display, the display which uses two sheets of liquid crystal with polarizing material between the sheets and also known as Flat panel monitor.

  • Each of the crystal in LCD's is like a shutter, it either allows to pass the light or it blocks the light. There is a fixed type of resolution in LCD
  • LCD panels can be easily moved around all, lightweight, compact and small in size.
  • An average 17-inch LCD monitor could be around 15 pounds, upwards 300 nits which gives the perfect brightness.

So, Option D is the correct answer.

3 0
3 years ago
Which of the following is least likely to be a scientific experiment
Dennis_Churaev [7]

Answer:

what causes gravity to have a amount of force on one object but not another

Explanation:

3 0
3 years ago
Other questions:
  • A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
    13·1 answer
  • What is one major difference between the roles of film directors and theater directors? A. A theater director is involved in sel
    14·1 answer
  • This is a python program.
    6·1 answer
  • Who is the father of computer?​
    6·1 answer
  • My pc suddenly freezes and i can't open any apps or task manager. Apps do not open at all and if i restart from the start it get
    9·1 answer
  • Implement the Tollable interface. It provides one method, pay, that accepts an int (how many dollars to pay), and returns an int
    8·1 answer
  • Write a program (main method) that advises the user on programming language. So if a user for instance enters "Java" the program
    6·1 answer
  • What is good work ethic?​
    11·1 answer
  • A web-based program that uses artificial intelligence techniques to automate tasks such as searches is called
    8·1 answer
  • Which of the following tells the computer hardware what to do? A Information B) Software Procedures D People
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!