1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OlgaM077 [116]
3 years ago
12

Select the correct answer.

Computers and Technology
1 answer:
Furkat [3]3 years ago
3 0

Answer:

I think the three and four

You might be interested in
What does the -pwd switch do? how can you make dsadd bring up a prompt asking for the users password?
Leno4ka [110]
Greeting's!

It Will Ask You To Input An Old Password "Current" Password And A "New" Password After That Is Done You Can Use The "New" Password Instead Of The "Old" Password.
3 0
2 years ago
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
2 years ago
Which of the following is an example of hypertext pattern reading?
Murrr4er [49]
A is the correct answer
5 0
2 years ago
. Which of the following is NOT a
joja [24]

Answer:

solution

Explanation:

The correct option is - solution

Reason -

To solve a problem,

Firstly we give input , then system will process that input which then gives output.

Solution is not a part of the process.

So, Solution is not a significant part of a simple problem.

7 0
2 years ago
In what situations other than developing software might the process of analysis, design, development, test, deployment, and main
forsale [732]

In Systems development  or  traditional waterfall approach will the process of analysis, design, development, test, deployment, and maintenance be a useful approach.

<h3>What is software development?</h3>

Software development is known to be a term that connote the composition  of computer science works made for the process of developing , designing, and aiding software.

Note that In Systems development  or  traditional waterfall approach will the process of analysis, design, development, test, deployment, and maintenance be a useful approach. as it also uses the dteps listed above.

Learn more about software from

brainly.com/question/1538272

#SPJ1

7 0
2 years ago
Other questions:
  • Which of the following represent typical account fees?
    7·1 answer
  • To move to the most extreme right cell containing data in your worksheet, what basic key combination can you use?
    7·1 answer
  • Match the tool to its description.
    15·1 answer
  • Because you do not know every possible future use for the data TerramEarth collects, you have decided to build a system that cap
    15·1 answer
  • Industrial Products is a small light-manufacturing firm that produces a variety of control systems for heavy industry. It has a
    13·1 answer
  • Advantage and disavantage of malware maintenance
    12·1 answer
  • When you're working on an image, it's a good idea to make a ____________ of the image, so that you'll have the original image in
    12·2 answers
  • - Which amongst the following is not a Characteristic of Cloud Computing?
    5·1 answer
  • Please help me I need a help
    13·1 answer
  • What option can be used by a system administrator to ensure that dynamic updates are made only by known clients when you have a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!