1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
4 years ago
7

Describe two measures that a school could take to ensure the security of the school network.

Computers and Technology
1 answer:
Zolol [24]4 years ago
5 0

Answer:

Having a proper firewall that could prevent cyber attacks against black hat hackers, And having good cyber team that has had extensive training and know hows the network operates to ensure smooth sailing for the workers and students. (extra) Ensuring your staff understands the cyber war and knows not to click on malicious links that could allow a cyber crminal in to the network.

Explanation:

BlackHat- Individual that uses his knowlage of computers for malicious use.

Firewall- Enitial intrance into a computer it is a piece of software that have expressions to ensure you are only getting traffic that you have specified on the system and not allowing all traffic on all ports

You might be interested in
How many questions must you answer in Brainly to be able to message people?
spayn [35]

Answer:

you need to answer 1k questions

7 0
3 years ago
Read 2 more answers
Write the importance of program in computer​
zysi [14]

Answer:

The reason that programming is so important is that it directs a computer to complete these commands over and over again, so people do not have to do the task repeatedly. Instead, the software can do it automatically and accurately.

Explanation:

5 0
3 years ago
Help plz
Sonbull [250]

1.

first = float(input("First Entry = "))

second = float(input("Second Entry = "))

def func(num1, num2):

   return max(num1, num2)

print(func(first, second))

2.

first = input("First Entry = ")

second = input("Second Entry = ")

def func(word1, word2):

   return sorted([word1,word2])[0]

print(func(first, second))

I hope this helps!

8 0
3 years ago
Write a program that accepts two integers from the user and perform one of the four arithmetic operations based on user’s choice
madam [21]

Answer:

am i to late or do you still need the answer?

Explanation:

3 0
3 years ago
Help me pleseeeeee i will mark u as brainliest
Dovator [93]

Answer:

<!DOCTYPE html>

<html>

 <head>

 <style>

 #header {  

   text-align: center;

   float: left;

 }

 #langtable {

   border: 2px solid blue;

   border-spacing: 5px;

 }

 #langtable th {

     border: 2px solid green;

 }

 #langtable td {

     border: 2px solid green;

     padding: 10px;

 }

 </style>

 </head>

 <body>

   <div id="header">State and languages

   <table id="langtable">

     <tr>  

       <th>State</th>

       <th>Major Spoken Language</th>

     </tr>

     <tr>

       <td>Punjab</td>

       <td>Punjabi</td>

     </tr>

     <tr>

       <td>Jammu and Kashmir</td>

       <td>Kashmiri</td>

     </tr>

     <tr>

       <td>West Bengal</td>

       <td>Bengali</td>

     </tr>

   </table>

   </div>

 </body>

</html>

Explanation:

I think this looks pretty much like it.

7 0
3 years ago
Other questions:
  • Binary is a sequence of 0s and 1s such as 1001101 which can be used to code information. To break a code, you need to find how m
    14·1 answer
  • Identify the computer cycle in each of the descriptions below by choosing the answer from the
    12·1 answer
  • Identify a factor that is unlikely to influence the length of time people wait in the lunch line.
    8·2 answers
  • How can i change my age on my profile here bc i am 13 but i accidenlty put 2005 instead of 2006 no need to rush to answer just w
    9·2 answers
  • The biggest limitation of a network operating system (NOS) is _____ in terms of memory, process, device, and file management.
    7·1 answer
  • HELP AASAP BRAINLIEST JUST HELP
    13·1 answer
  • A ____ can be used to enter, display, or edit data
    5·1 answer
  • 11. Its collection of toys which could be used in the game via an implanted RFID chip made Activision’s game _______ one of the
    7·2 answers
  • Which TWO of the following are input devices that are parts of a laptop computer?
    9·2 answers
  • Which of these is most likely to contribute to the long term of a local ecosystem?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!