1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
14

Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee

ded to ensure that systems are available. baseline infrastructure applications network
Computers and Technology
1 answer:
Alex777 [14]3 years ago
8 0

Answer:

Network.

Explanation:

Availability is an essential part of network security, and user behavior analysis and application analysis provide the data needed to ensure that systems are available.

Availability in computer technology ensures that systems, applications, network connectivity and data are freely available to all authorized users when they need them to perform their daily routines or tasks. In order to make network systems available regularly, it is very essential and important to ensure that all software and hardware technical conflicts are always resolved as well as regular maintenance of the systems.

A network administrator can monitor the network traffics and unusual or unknown activities on the network through the user behavior analysis and data gathered from the application analysis to ensure the effective and efficient availability of systems.

You might be interested in
A program has a infinite while loop. How can you interrupt it?
MrRa [10]

Answer:

The <em>break</em> keyword is how you interrupt a while loop.

the syntax looks like this ↓

Python ↓

while <em>true</em>:

<em>break</em>

Java script ↓

while (<em>true</em>);

<em>break</em>

6 0
2 years ago
PLEASE HELP ASAP!!!
Studentka2010 [4]

If you are using CSS :

table {

   border-collapse: collapse;

   border: 5px solid black;

   width: 100%;

}

td {

   width: 50%;

   height: 2em;

   border: 1px solid #ccc;

}

HTML

<table>

   <tbody>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

   </tbody>

</table>

for HTML:

<!DOCTYPE html>

<html>

<head>

<meta charset="UTF-8">

<title>Sample table</title>

<style>

table {

   border-collapse: collapse;

   border: 5px solid black;

   width: 100%;

}

td {

   width: 50%;

   height: 2em;

   border: 1px solid #ccc;

}

</style>

</head>

<body>

<table>

   <tbody>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

   </tbody>

</table>

</body>

</html>

3 0
3 years ago
Anthony is deciding between different savings accounts at his bank. He has four options, based on how frequently interest compou
leonid [27]
Depends is the answer multiple choice
7 0
3 years ago
Read 2 more answers
A small company with 100 computers has hired you to install a local area network. All fo the users perform functions like email,
Nadusha1986 [10]

Answer:

Based on the requirements indicated in the question above, the best Local Area Network (LAN) operating system that can be used is

Windows 7 , 8.1 or Windows 10. This is because they all are configured to handle extensive LAN activity and can connect over 200 users.

Explanation:  

Generally speaking, Windows 10 packs more improvement over the previous windows.

Cheers

6 0
2 years ago
You can post a Facebook status update from your smartphone. True or false?
Nady [450]
True .................
3 0
3 years ago
Read 2 more answers
Other questions:
  • Plz help ASAP
    10·1 answer
  • The most complex part of ssl is the ___________ protocol.
    7·2 answers
  • Write a pseudocode thats accept and then find out whether the number is divisible by 5 ​
    6·1 answer
  • Which of these is NOT a mathematical operator used in Python?
    12·1 answer
  • Whats the formatting of a letter to the editor?​
    12·1 answer
  • You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What i
    12·1 answer
  • Only one person can receive the same email at the same time true or false
    10·1 answer
  • Product of -6/13 and reciprocal of -7/16 is ____________​
    7·1 answer
  • Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
    12·1 answer
  • What is Frederick Taylor attributed to doing
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!