1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivanzaharov [21]
3 years ago
7

A0domain indicates that the computer or DNS name does not exist.

Computers and Technology
1 answer:
Alekssandra [29.7K]3 years ago
7 0

Answer:

false

Explanation:

i believe the right term is error

You might be interested in
Which font is most suitable for an academic article on a website? Which is most suitable for casual information?
CaHeK987 [17]

There are thousands of fonts, there is no clear answer of what is best for ___ website or ___ page. It's all what you think looks good and sometimes depends on the colors on the site.

4 0
3 years ago
Read 2 more answers
Changing the color of the text in your document is an example of
nexus9112 [7]

Answer:

???????????uhhh text change..?

Explanation:

7 0
3 years ago
Read 2 more answers
My assignment asks me to write a python program using if, elif, and else that takes a user's salary and calculates the tax based
Goryan [66]

Answer:

user_salary = int(input("Please Enter Your Salary : "))

if user_salary in range(10000, 20000):

   print("Tax = ",int(user_salary/100*1))

elif user_salary in range(20000, 30000):

   print("Tax = ",int(user_salary/100*2))

elif user_salary in range(30000, 40000):

   print("Tax = ",int(user_salary/100*3))

else:

   print("No Tax!")

Explanation:

8 0
2 years ago
You are auditing a client's network and have gained physical access to a workstation. To prevent any security software from dete
Llana [10]

Answer:

OphCrack LiveCD.

Explanation:

The user examines that server of a client, as well as requires complete control of such a system. To avoid recognizing its invasion by certain security programs, he wants to select a LiveCD which can break Operating System's credentials,  and he would have been using OphCrack LiveCD because it used to crack the credential of the Windows user.

So, the following are the reason by which the answer is correct according to the scenario.

3 0
3 years ago
An engineer plans to acquire data from a disk. The disk is connected to the forensics workstation and is ready for the engineer.
aksik [14]

The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

<h3>Is non-repudiation an aspect of integrity?</h3>

In general, nonrepudiation is known to be a term that puts together or combines authentication and integrity.

Note that Nonrepudiation is said to be a key or one of the pillars that pertains to information assurance.

The integrity in cyber security is known to be the act of keeping safe against any form of an improper information modification or destruction.

Hence, The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

Learn more about acquisition from

brainly.com/question/11412887

#SPJ1

8 0
2 years ago
Other questions:
  • Which of the following is a disadvantage of using a personality assessment to determine who is well suited for a work position?
    7·2 answers
  • Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that chec
    14·1 answer
  • In an inheritance situation, the new class that you create from an existing class is known as the:
    5·1 answer
  • Ou have an application running on Oracle Cloud Infrastructure. You identified that the read and write operations are slowing you
    10·1 answer
  • In which step of web design is storyboarding helpful?
    14·1 answer
  • Count characters Write a program whose input is a string which contains a character and a phrase, and whose output indicates the
    6·1 answer
  • Give several reasons why Python is such a great programming language. Explain how Python is related to flowcharts. (students mak
    9·1 answer
  • PLZZZZ I NEED THE ANSWER NOW PLZZZZ!!!!!!!!!!!!!!!!!!!!!!!!! Which one of the following is considered a peripheral? A Software B
    5·1 answer
  • You can invoke or call a method from another program or method. When methods must share data, you can pass the data into and ret
    6·1 answer
  • Create flowchart using Flowgorithm to represent the logic where the user inputs a number between 1 and 3 and displays the number
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!