1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vika [28.1K]
3 years ago
6

Which of the following is an example of intellectual property?

Computers and Technology
2 answers:
Monica [59]3 years ago
6 0

Answer:

Trade secrets

Trademarks.

Copyrights.

Patents.

Explanation:

REY [17]3 years ago
5 0

Answer:

lines of a

Explanation:

You might be interested in
is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
Rina8888 [55]

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

3 0
3 years ago
You are attempting to run a Nmap portscan on a web server. Which of the following commands would result in a scan of common port
Bess [88]

Answer:

Nmap CST CO CT0

Explanation:

Network map (Nmap) is a network scanning and host detection tool used in penetration testing to sorting out vulnerability in a network. Nmap APIs are used in packet sniffer tools as well to scan for available networks. There are different nmap command , but the command needed to scan a port with less noise to evade an IDS is the nmap's "Nmap CST CO CT0" command.

5 0
3 years ago
How many components of a computer? ​
zepelin [54]

Answer:

There are five main hardware components in a computer system: Input, Processing, Storage, Output and Communication devices. Are devices used for entering data or instructions to the central processing unit.

Explanation:

8 0
3 years ago
Why was manufacturing such a slow and costly process before the Industrial Revolution?
ohaa [14]

Answer:

work was done by hand

Explanation:

Back then they didn't have machines

hope this helped

~chara

8 0
3 years ago
Eniac was the first desktop computer. t/f
LekaFEV [45]

Answer:

The answer is "False".

Explanation:

ENIAC stands for Electronic Numerical Integrator and Computer, It was first developed in 1946. This computer use circuits and node that are interconnected with each other to show the result.

  • ENIAC was a firstly, Reconfigurable vacuum tube, that controls the unit and it doesn't store information
  • It takes a large room to set up the system, that's why it is not true.

6 0
4 years ago
Other questions:
  • Suppose we have an arrayAofnprofessors; each teacher has two characteristics: difficulty (a numberin the range [0,10], where a h
    7·1 answer
  • How do Filament 3D printers build a model?
    8·1 answer
  • The entirety of a packet at one layer becoming the payload section at another layer is known as
    8·2 answers
  • Se Statements
    6·1 answer
  • Give an example of movies or games that use teleportation
    11·1 answer
  • Write a program to check if an input is a valid hashtag (starts with #, contains only letters, numbers, and underscore, no space
    6·1 answer
  • Please I need all the help I can get
    11·1 answer
  • A ? is the desired value where a process should be maintained. The value may be manually set, automatically set, or programmed.
    13·1 answer
  • Hola busco ya saben nv por fa no sean malos nunca e tuvido una ni se como se siente el amor
    5·2 answers
  • A. Modify the FitnessTracker class that includes data fields for a fitness activity, the number of minutes spent participating,
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!