1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igor_vitrenko [27]
3 years ago
12

Which of the following are types of formatting you

Computers and Technology
2 answers:
dimaraw [331]3 years ago
6 0
The answer I believe is A
Mumz [18]3 years ago
6 0

Answer:

A, C, and F. :)

Explanation:

You might be interested in
The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
ddd [48]

Answer:

The statement is True

Explanation:

When talking about computer security, we can define covert channels as an attack on a system capable of creating a loophole for information objects transfer between various processes that would normally not allow communication under the computer security policy. Hence, the best defenses system against this kind of attack is via Intrusion Defense System and Intrusion Prevention System and relentlessly "watching all aspects of an IT infrastructure for aberrant or abnormal events of any type."

7 0
3 years ago
Which of the following is not part of the four ways you can avoid problems with email communication?
UkoKoshka [18]
D you can always find another way or other ways to relay your message 

hope this helps ya :)


3 0
3 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
OLEGan [10]

Answer: Stealth scanning technique

Explanation:

Stealth Scanning technique includes the following steps:

1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.

2. The port is assumed to be in closed state if the RST packe t is sent from the server.

3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.

6 0
3 years ago
This ingredient is often used as decoration for both hot and cold dessert​
soldier1979 [14.2K]

Answer: cream

Explanation: Cream This ingredient is often used as a decoration or accompaniment for both cold and hot desserts, but may also be used as one of the recipe ingredients.

Please mark as brainliest

8 0
2 years ago
Which Ribbon contains the paragraph attributes?<br><br> Home<br> Insert<br> Review<br> View
Lemur [1.5K]
The Home ribbon contains the Paragraph attributes
7 0
3 years ago
Read 2 more answers
Other questions:
  • A service provider, hardware, and web browser are needed to connect to __________.
    8·2 answers
  • In the beginning of a presentation, it is important to:
    9·1 answer
  • Carrie works on a help desk and is assigned a ticket that was automatically generated by a server because of an error. The error
    14·2 answers
  • If you are trying to improve your budget and spending, which option would save you the most money?
    13·2 answers
  • The breastbone or ________________ extends down the chest.
    5·1 answer
  • Add Try/Catch error checking To make sure that the user enters valid values in your program. To catch negative values passed to
    9·1 answer
  • What is the expression for the resultant value of three capacitance where C1 connected in parallel​
    11·1 answer
  • I'm bad i'm mrs puff doo doo doo yeah it's a holiday
    6·2 answers
  • What can you think of as a box or container that holds a value and has a label?
    11·2 answers
  • write the definition of a class clock. the class has no constructors and one instance variable of type int called hours.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!