1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
3 years ago
7

Describe two measures that a school could take to ensure the security of the school network.

Computers and Technology
1 answer:
Zolol [24]3 years ago
5 0

Answer:

Having a proper firewall that could prevent cyber attacks against black hat hackers, And having good cyber team that has had extensive training and know hows the network operates to ensure smooth sailing for the workers and students. (extra) Ensuring your staff understands the cyber war and knows not to click on malicious links that could allow a cyber crminal in to the network.

Explanation:

BlackHat- Individual that uses his knowlage of computers for malicious use.

Firewall- Enitial intrance into a computer it is a piece of software that have expressions to ensure you are only getting traffic that you have specified on the system and not allowing all traffic on all ports

You might be interested in
write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the e
chubhunter [2.5K]

Answer:un spain please

Explanation:

4 0
3 years ago
Which THREE of the following actions can you perform with most webmail services?
laila [671]

Answer:

C.find the email address of someone you know

D.maintain an address book of your contacts

E.organize your emails In folders

8 0
2 years ago
A feature that displays in the lower right corner of a selected range with which you can analyze your data by using Excel tools
bagirrra123 [75]

Answer:

Quick analysis tool.

Explanation:

Excel is a spreadsheet application package found in the Microsoft office suite. it's environment on the display screen is called a worksheet and a collection of the worksheets is called a workbook. The excel packet is used for data analysis and interpretation and presentation.

When a group of cells in a worksheet is selected, a small tool kit appears that the lower right corner, it is known as a quick analysis tool. It is use for easy and fast analysis and formatting of that selected group.

5 0
3 years ago
Read 2 more answers
Suppose you are an ad-serving company and you maintain a log of cookie data for ads you serve to the Web pages for a particular
Firlakuza [10]

Answer:

A

Explanation:

thethe more you have attached the more people are going to know your product so that it's going to be a long process which people can introduce to their friends

3 0
3 years ago
3. What report shows what mobile devices were used to view a website?
mrs_skeptik [129]

The report that shows what mobile devices were used to view a website is the Devices report under “Mobile”

<h3>What is a mobile device?</h3>

This is known to be a is a small hand-held device that shows screen with touch input and it is said to be also made up of QWERTY keyboard as well as others.

Note that The report that shows what mobile devices were used to view a website is the Devices report under “Mobile”

See full question below

What report shows what mobile devices were used to view a website?

The Exit Pages report under “Site Content”

The Landing Page report under “Site Content”

The Engagement report under “Behavior”

The Devices report under “Mobile”

Learn more about website from

brainly.com/question/13171394

#SPJ12

4 0
2 years ago
Other questions:
  • Which of the following refers to a combination of hardware and software that ensures only authorized individuals gain entry into
    11·1 answer
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • 3.24 LAB: Seasons
    13·1 answer
  • A ___ is a node (or a device) that connects two different networks together and allows them to communicate.
    12·1 answer
  • Explain 3 categories of plagiarism​
    14·2 answers
  • 12. When computer professionals take on jobs, they may not enter into relationships with which of the
    6·1 answer
  • Whats with the bot spamming customer care numbers...kinda annoying when im trying to help people.
    12·1 answer
  • Does anyone know 7.1.3: Firework karel?
    5·1 answer
  • Who is the best Attack on Titan Character?
    12·2 answers
  • Consider the following declaration:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!