1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
2 years ago
8

Brake fluid should be checked __________.

Computers and Technology
2 answers:
Nina [5.8K]2 years ago
8 0
C every 30,000 miles
kondaur [170]2 years ago
6 0
Checked every 30,000 miles
You might be interested in
Four differences between general and special purpose conputer in points.......
cupoosta [38]

Explanation:

hope this helps to uhh...

4 0
2 years ago
Acme Widgets currently uses a 1024-bit RSA encryption standard company wide. The company plans to convert from RSA to an ellipti
nadya68 [22]

Answer:

The answer is "Option A".

Explanation:

The elliptical curve cryptography system needs much shorter keys for cryptography, and it is very powerful because of the RSA cryptography method. It is also known as a key of 1024-bit, which is in comparison is equal to the 160-bit ECC key for cryptographic, that's why other options are not correct, which is defined as follows:

  • In option B,  It is higher the ECC key system, that's why it's wrong.
  • In option C, It is a part of the RSA system but its value doesn't match the ECC system, that's why it is wrong.  
  • In option D, It's valued is just double to the RSA system, that's why it is wrong.

6 0
2 years ago
Complete the paragraph below.
tiny-mole [99]

Answer:

inject, update

Explanation:

Dependency injection is a concept in object-oriented programming that links or transfers the functionality of an independent class to a dependent class.

Assuming two classes, Vehicle and Bus are created, the Bus class inherits from the Vehicle. The Bus class is dependent on the Vehicle class and its instances create instances of the Vehicle object.

It is easier and faster to update the Bus class and other classes that inherit from the Vehicle class by updating only the Vehicle class.

3 0
3 years ago
Three basic components to cloud computing are client, internet
MrRissso [65]

Answer:

the basic components of cloud comuting in a simple topology

3 0
3 years ago
Create a security management policy that addresses the management and the separation of duties throughout the seven domains of a
klio [65]

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain.

Explanation:

User Domain : The User Domain covers all theusers (of any rank) that haveaccess to the other six domains.

RISKS:

  • User can destroy data in application(intentionally or not) and delete all
  • User can insert infected CD or USBflash drive into the work computer

Workstation Domain : A computer of an individual user where the production takes place

RISKS:

  • The workstation’s OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.
  • A workstation’s hard drive can fail causing lost data

LAN Domain : Contains all of the workstations,hubs, switches, and routers. TheLAN is a trusted zone

RISKS:

  • A worm can spread through the LANand infect all computers in it.
  • LAN server OS can have a knownsoftware vulnerability.

WAN Domain : Stands for Wide Area Network and consists of the Internet and semi-private lines

RISKS:

  • Service provider can have a major network outage.
  • Server can receive a DOS or DDOS attack.
  • A FTP server can allow anonymously uploaded illegal software

LAN / WAN Domain : The boundary between the trusted and un-trusted zones.The zones are filtered with a firewall

RISKS:

  • Weak ingress/egress traffic filteringcan degrade performance.
  • A firewall with unnecessary portsopen can allow access from the Internet

System / Application Storage Domain : This domain is made up of user-accessed servers suchas email and database

RISKS:

  • A fire can destroy primary data
  • A DOS attack can cripple the organization’s email

Remote Access Domain  :The domain in which a mobileuser can access the local network remotely, usually through a VPN

RISKS:

  • Communication circuit outage candeny connection.
  • Remote communication from officecan be unsecured.
  • VPN tunneling between remotecomputer and ingress/egress routercan be hacked
6 0
3 years ago
Other questions:
  • Betsy loves her job. On a daily basis she problem-solves and uses her creative side to fix situations centered around setting up
    15·2 answers
  • is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources th
    9·1 answer
  • Which statement about dialogues is NOT correct? Select one: A. Users should be able to control the direction of speed of dialogu
    5·1 answer
  • The DNS server at your headquarters holds a standard primary zone for the abc domain. A branch office connected by a slow WAN li
    14·1 answer
  • Renee's creating a plan for her business's information system. What should she do after she determines the goals for her busines
    10·1 answer
  • The Mark Table of Contents Entry option is used for marking nonheading text for the table of contents. the options are manually
    5·2 answers
  • What is the largest value that can be represented by 6 binary digits? .
    5·1 answer
  • Need help ASAP <br><br> Thankss + BRAINLIST only for correct answers
    10·1 answer
  • The computer scientists Richard Conway and David Gries once wrote: The absence of error messages during translation of a compute
    7·1 answer
  • Write two sentences but each one having either computer in it or technology in it. You can use a word more than once in a senten
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!