1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
3 years ago
9

Is the answer for letter B correct?

Computers and Technology
1 answer:
lubasha [3.4K]3 years ago
5 0
Yes, I believe so but I would check with google just to make sure lol
You might be interested in
What naming scheme identifies the rows in a worksheet?
UNO [17]
The naming scheme would be b


3 0
3 years ago
Read 2 more answers
Which is an unethical use of technology and resources at the workplace?
Greeley [361]
The answer is B. sharing a coworker’s performance scores with your colleagues
6 0
3 years ago
Read 2 more answers
How can netiquette help you communicate when texting or instant messaging?
Yanka [14]

1. D

2. C

it allows citizens to submit anonymous tips to the police

5 0
3 years ago
Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt?.
Salsk061 [2.6K]

That is calld a bruteforce attack

4 0
2 years ago
1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
ioda

The well-designed standard architecture for security features in computer networking is defined by the OSI Security Architecture.

The OSI architecture is widely accepted because it establishes the process for ensuring safety in an organization. In a live attack, the victim is made aware of it. The victim of a passive attack is not made aware of the attack. System resources can be modified during an active attack. System resources are not changing while under passive attack. Monitoring a system is the focus of passive assaults, which do not require changing any data on the target system. On the system under attack, active threats will alter data.

Learn more about system here-

brainly.com/question/14253652

#SPJ4

6 0
1 year ago
Other questions:
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • Why is it important for people to express resentments in the workplace?
    9·1 answer
  • Which Windows system utility contains a comprehensive list of the devices connected to your computer and displays warning icons
    8·1 answer
  • has anyone noticed to get credit for answering a question you don't even need to answer it correctly?
    11·2 answers
  • The contribution of Charles Babbage in the history of computer​
    6·1 answer
  • 8. Explain strategies employed by the operating system to ensure safety of programs and data in
    15·1 answer
  • Does technology shape society or does society shape technology?
    14·1 answer
  • How to find the next instance of text formatted in bold
    15·1 answer
  • __________ translates analog voice signals into digital data and uses the Internet to transport the data.
    7·1 answer
  • A developer calls you with a problem. He was trying to debug a new daemon and mistakenly placed it on the production machine ins
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!