1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergij07 [2.7K]
3 years ago
13

What is Logic and Emotion?

Computers and Technology
2 answers:
m_a_m_a [10]3 years ago
8 0
Logic is Strict principles of validity (reasoning)

Emotion is the natrual instinctive feeling from reasoning or knowledge.

Hope this helps! ^0^ <span />
Lapatulllka [165]3 years ago
6 0
I have to agree with @HalpWorldHistory  .
You might be interested in
What are three advantages of using social media to create awareness of your business?
jonny [76]

Answer:

1. Your Business brand becomes popular

2. Due to the first reason, you have more people trying your business (More traffic)

3. More completed transactions

Explanation:

These are three advantages of using social media to create awareness for a Business.

6 0
3 years ago
Define the html code to insert a heading
Lera25 [3.4K]

Answer:

okay so,bruedbure

Explanation:

yedhuji r4uh 4tuh t4gyi gu4h gtuh4tgr

7 0
3 years ago
A USB flash drive uses solid
steposvetlana [31]
State drive. SSD=Solid State Drive
8 0
3 years ago
Explain what a honeypot is. In your explanation, give at least one advantage and one disadvantage of deploying a honeypot on a c
tatuchka [14]

Answer:

A honeypot is a computer network set up to act as a decoy to track, deflect, or research trying to obtain unwanted access to the information system.

Explanation:

A honeypot is a device or device network designed to imitate possible cyber-attack targets. It can be utilized to detect or deflect assaults from a legitimate military target. It may also be used to collect knowledge on how cybercrime works.

<u>Advantage:- </u>

  • Data Value:- One of the challenges faced by the research community is to obtain meaning from big data. Companies hold large quantities of data daily including firewall logs, device logs, and warnings for vulnerability scanning.
  • Resources:- The problem facing most protection systems is resource shortages or even the depletion of resources. Power saturation is when a protection asset can no longer work since it is overloaded by its assets.
  • Simplicity :- I find simplicity to be the biggest single strength of honeypots. No flashy techniques are to be created, no stamp computer systems to be managed, no rule units to be misconfigured.

<u>Disadvantage:-  </u>

That honeypot doesn't replace any safety mechanisms; they just operate with your overall security infrastructure and improve it.

4 0
4 years ago
What does WYSIWYG mean?
ch4aika [34]
This is a computer programmer's acronym for "what you see is what you get<span>."</span>
3 0
3 years ago
Read 2 more answers
Other questions:
  • What limits the impact of vehicle balance on view ghost ability during emergency vehicle maneuvers?
    15·1 answer
  • What is the maximum data transfer rate of an ieee 1394a device?
    5·1 answer
  • To locate something in the database, one must type in the keyword into the ________ of the application.
    12·1 answer
  • The ________ is the heart of the operating system and controls its most critical processes.
    9·1 answer
  • Which one of the following items would you be most likely to keep in a database? A. Payroll records B. Address book C. Financial
    7·1 answer
  • In a folder hierarchy, the top level is referred to as which of the following?
    7·1 answer
  • Explain how devices on a lan access resources in a small to medium-sized business network.
    15·1 answer
  • For each of the innovations below. Decide if it is a computing innovation or not. Part 3 Continued.
    7·1 answer
  • A group of small local businesses have joined together to share access to a cloud-based payment system. Which type of cloud is m
    15·1 answer
  • In a web application, the client uses a ___________ to interact with a web server.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!