1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
12

Which of the following are not parts of a message? Select all that apply.

Computers and Technology
1 answer:
Nikolay [14]3 years ago
6 0
5 and 6 are the correct answers to this. :D
You might be interested in
Disrupting a business's ability to conduct electronic commerce is cönsidered an act of
aalyn [17]

Answer:

Digital Restrictions

Explanation:

This is the process that arises as a result of not meeting specific ethical standards and procedures for operating an online business on the form of electronic commerce. Such situation could be as a result of important factors like:

1. Unduly registered or incorporated businesses

2. Lack of patent or trademark to shown authenticity of product or services

3. Inability to provide certified prove of ownership to avoid fraudulent acts and others.

7 0
3 years ago
4. The NIMS Management Characteristic of Chain of Command and Unity of Command means that each person: A. Continues to report di
Kipish [7]

Answer:

The answer is "Option C"

Explanation:

This system facilitates the establishment by state, Municipality, Militaristic, Provincial and local governments of a detailed, national framework for disaster response. This command structure of each person refers to only a single ICS boss because of NIMS management, and the wrong option can be defined as follows:

  • In option A, The Continuous report describes your daily details.
  • In option B, These reports are not in one ICS supervisor.
  • In option D, It can not assign different competences.
8 0
3 years ago
You have instructed all administrators to disable all nonessential ports on servers at their sites. why are nonessential protoco
wlad13 [49]

The reason nonessential protocols are a security issue that you should be concerned about is that: A. nonessential ports provide additional areas of attack.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

In Cyber security, the reason nonessential protocols are a security issue that an end user should be concerned about is that nonessential ports would provide additional areas of attack because all protocols have weaknesses based on the principle of least privilege.

Read more on information security here: brainly.com/question/14286078

#SPJ1

Complete Question:

You have instructed all administrators to disable all nonessential ports on servers at their sites. Why are nonessential protocols a security issue that you should be concerned about?

Nonessential ports provide additional areas of attack.

Nonessential ports can't be secured.

Nonessential ports require more administrative effort to secure.

3 0
2 years ago
Computer works on the basis of?​
ASHA 777 [7]
Computer works on the Basis of multitasking.
6 0
2 years ago
How many instructions can the microprocessor execute each second if the assembly line is present?
SpyIntel [72]

The instructions that he microprocessor can execute each second if the assembly line is present will be depending on the workload and the architecture’s core because it is all depending on the speed of the CPU and the multiplier that it acquires.

3 0
3 years ago
Other questions:
  • Esther has acquired an associate's degree in information technology and certifications in PageMaker and Illustrator. Which caree
    8·2 answers
  • Windows explorer has a pane located on the left side which can display the directory structure of one or more drives. what is th
    15·1 answer
  • The ____ category of apps makes the computer easier for blind people to use.
    9·1 answer
  • Why is it important to verify a customer complaint?
    6·1 answer
  • A properYour customer has connected a 1000-watt microwave oven and a 600-watt mixer to a 15-amp branch service line for the kitc
    11·2 answers
  • A URL suffix is called a domain name.
    11·1 answer
  • Edhesive 3.2 Lesson Practice question 1
    5·1 answer
  • Convert 128 GB into KB​
    8·2 answers
  • which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) short
    9·1 answer
  • How can you create a messages to look like an IMessage?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!