1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
myrzilka [38]
3 years ago
6

PLEASE HELP! One of the nice byproducts of joining a club, organization, community service project, or service learning project

is that:
O A. you can earn college credit
O B. you can earn extra money
O C. you can earn high school credit
O D. college appreciates it

Computers and Technology
1 answer:
astra-53 [7]3 years ago
8 0
A hope I help ya out:))
You might be interested in
Why do we use modem while<br>accessing the internet or email​
Dafna1 [17]

Answer: Modems: Your gateway to the internet

To bring the internet into your home, you're going to need a modem. This is a small device that connects to your internet service provider (ISP) to tap into all that internet goodness. ... Your modem shares this connection with a computer or a router via an Ethernet cable.

Explanation:

7 0
4 years ago
Who was responsible for unleashing the melissa computer virus
CaHeK987 [17]

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

6 0
3 years ago
What is the difference between master file and transaction file​
klio [65]

Answer:

master file contains data types while transaction file is used to record Master file

Explanation:

hope it helps

3 0
3 years ago
The actual database of active directory shared resources is stored on one or more computers designated as:
Mila [183]

Solution:

It is done by Native Os X command line tool that can do this.

Active Directory, the data store contains database files and processes that store and manage directory information for users, services, and applications. A copy of the data store runs on each domain controller in the forest. The Active Directory data store is often referred to as the directory.

The ideal environment for the data store includes the following:

A domain controller running an operating system in the Windows Server 2003 family and containing hardware that meets the minimum hardware requirements of the edition of the operating system (Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; or Windows Server 2003, Datacenter Edition)

For environments consisting of multiple domain controllers, the presence of a fully functioning Active Directory replication topology

For environments consisting of multiple domain controllers, the presence of a fully functioning File Replication Service (FRS) topology

A regular backup schedule

Regular monitoring of Active Directory, either through manual review of event logs or through an automated monitoring solution, such as Microsoft Operations Manager (MOM)

This is the required description describes the elements of the Active Directory data store, including its architecture, protocols, interfaces, logical structure, physical structure, processes and interactions, and network ports.


6 0
3 years ago
Why does brainly have 3-2 sites? I'm asking since I get tired from making 3-2 accounts on each one. Well by checking each accoun
Lyrx [107]
Each site could be for a different region for Brainly mainly because I just checked and one of the other Brainly sites had a lot more different people having questions in different languages.  
6 0
3 years ago
Other questions:
  • Debuted by the Lumiere Brothers, a hand cranked device that showed moving pictures to an audience​
    7·1 answer
  • Which of the following might indicate a source on the internet is NOT reliable?
    6·1 answer
  • Which class of fire extinguisher is appropriate for a fire involving electrical/energized electrical equipment?
    13·2 answers
  • ANSWER THESE RIDDLES FOR BRAINLIEST ANSWER!!!!
    11·2 answers
  • What is an input periphal
    8·2 answers
  • Why should you avoid the use of sarcasm , cliches, and idioms in business letters?
    6·2 answers
  • WHAT is the USE OF RIBBON TAB​
    10·1 answer
  • Look out for users with this photo.
    15·2 answers
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!