1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veseljchak [2.6K]
3 years ago
14

Abigail is writing an email to Justine Swenson, a friend of her best friend, Jane, inviting her to a get-together. Which is the

best way for Abigail to address Justine in the email?
Computers and Technology
1 answer:
joja [24]3 years ago
4 0
Use the subject box then write the details in the message box
You might be interested in
The computer stores a program while the program is running, as well as the data thatthe program is working with, in _____.
kenny6666 [7]

hard drive is wht the awnser is

8 0
3 years ago
WHAT DOES INFORMATION TECHNOLOGY DO??<br> Do they offer services or products
notsponge [240]
Yes

Explanation: Information technology, or IT, describes any technology that powers or enables the storage, processing and information flow within an organization. Anything involved with computers, software, networks, intranets, Web sites, servers, databases and telecommunications falls under the IT umbrella.
4 0
3 years ago
What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?
alisha [4.7K]

Answer:

Detection vs Prevention

Explanation:

  • A Network Intrusion Detection System as the name suggests it "detects" the attackers / vulnerabilities existed in the network system / infrastructure.
  • A Network Intrusion Prevention Detection System as the name suggests it "prevents" the attackers from hacking the system. While a detection just detects the abnormalities where as a prevention system can prevent them.
  • The detection system detects the vulnerabilities, security threats and the attackers in the system through the web traffic analyzers and security analyzers.
  • The prevention system prevents the network from being compromised. It tries to regain the access if already compromised.
  • Both the NIDS and NIPS have to be coordinated for the full protection of the network.
8 0
3 years ago
How did New York Governor Hugh Carey handle Sostre’s situation?
Ira Lisetskai [31]

Answer:

The governor found a way to free Sostre without assessing whether or not he was guilty or innocent of drug crime in buffalo.

Explanation:

4 0
3 years ago
Read 2 more answers
¿Qué diferencia existe entre un virus biológico y virus informático?
ddd [48]

Answer:

i dont know spanish but i am gussing that you want to find differnce in virus information?

Explanation:

6 0
3 years ago
Other questions:
  • Can i still download an update for an xbox one game if it's not turned on
    13·1 answer
  • A formal log-on procedure is the operating system’s last line of defense against unauthorized access.
    10·1 answer
  • Consider a system that uses a 32-bit unique salt where users have a 4-digit number as a password (e.g. 6813). Eve wants to crack
    8·2 answers
  • How do you put a picture when you ask a question?
    6·2 answers
  • _____ provide a description of the data characteristics and the set of relationships that link the data found within the databas
    8·1 answer
  • Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
    8·1 answer
  • Czy FALL GUYS będzie działało szybko na i5 GH8? Na ilu FPS?
    13·1 answer
  • This is a human-made physical system.
    15·1 answer
  • What problems do you see in the process of transacting business online
    10·1 answer
  • A server is handling thousands of simultaneous connections, and proxying requests to another service. Which concurrency model is
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!