1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanzania [10]
3 years ago
5

Why won't Brainly let me send a link? This is just du*mb! I want to send good articles explaining a content, and this site just

won't let me post it!
Computers and Technology
1 answer:
Basile [38]3 years ago
4 0

Answer:

Maybe is against the community

Explanation:

You might be interested in
Which shortcut keys can be used to duplicate a slide?
Leya [2.2K]

Answer:

Ctrl + D used to duplicate a slide

8 0
3 years ago
you just bought a new hard drive for your computer .you plan to use this as a secondary hard drive to store alll your files. wha
marin [14]
In case the first drive fails, the data will all be backed up onto the second drive, a copy will still be intact.
7 0
3 years ago
A computer scientist creates an app that tells you a funny joke each time you touch the Joke button.
Lena [83]

Answer:

B And A

Explanation:

B: The controller renders a responce it can be seen as a manager and other parts are its workers and makes sure that other parts are "working" well

6 0
2 years ago
Which feature of a social news sharing website distinguishes it from a social bookmarking website
Crank
The privacy feature i think
4 0
3 years ago
Read 2 more answers
A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engin
Vlad [161]

Answer:

Analyze network traffic

Identify the method of execution

Explanation:

Threat Hunting is a form of cybersecurity strategy carefully formulated to recognize threats that are yet to be found by routine security monitoring.

Using the approach of Threat hunting means applying unconventional techniques to determine the threats or find the origin of the malware.

Hence, in this case, the system engineer should carry out the following steps:

1. Analyze network traffic

2. Identify the method of execution

3 0
2 years ago
Other questions:
  • A windows host sends a tcp segment with source port number 1200 and destination port number 25. the sending host is a(n) _______
    10·1 answer
  • Please refer to the MIPS solution in the question above. How many total instructions are executed during the running of this cod
    10·2 answers
  • Assuming that each of the resistors in the circuit shown in the figure above has a resistance value of 100 k ohms, what will be
    11·2 answers
  • Which wildcard characters will return a single character when using the Find dialog box?
    6·2 answers
  • The browser on which you are viewing web pages is called the
    13·1 answer
  • Who distributes IP Address?
    10·1 answer
  • Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with
    9·1 answer
  • IN C++ PLEASE!!!! Define a function FilterStr() that takes a string parameter and returns "Good" if the character at index 4 in
    7·1 answer
  • What are the physical aspect of a presentation​
    7·1 answer
  • Help pweeze this is due today :(<br><br> I will give u brainliest just pweeze, I need this answer :(
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!