1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
3 years ago
15

What is brainlistand what does it do

Computers and Technology
1 answer:
VARVARA [1.3K]3 years ago
8 0

Hi, this is a little response I wrote for you.

<u>What is Brainliest?</u>

<em>Brainliest</em> is something that the person posting a question can give to the  poster of the "best" response to their question.

<u>Benefits:</u>

a. To level up, you need a certain amount of Brainliests.

b. I believe they are worth 25 points for the person getting the Brainliest.

<u>How do you give Brainliest?</u>

You can only give Brainliest after <u>both people</u> have answered your question. So, after I answer, you should see a little crown icon by the bottom of my response. If you click it, you will give me "Brainliest" for that question and I will be one Brainliest closer to becoming an "Expert" instead of an "Ace."

I hope this helps clear things up! :)

You might be interested in
Select all the correct answers
ikadub [295]
Umm I think 3 and 1
5 0
3 years ago
Does watching Beastars make me a furry? ​
jarptica [38.1K]

Answer:

Technically

Yes

Yes it does

8 0
3 years ago
is there an app i can use to make a picture appear in the corner of a video then disappear after being up for a second?
Nuetrik [128]
Umm i really do not know i'm sorry
7 0
4 years ago
Read 2 more answers
quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f
Sergio039 [100]

At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

What is the security event?

A security event is known to be an alteration  in the day to day running of the operations of a network or an information technology service and it is one that tends to show the point that a security policy need to have been violated or a security safeguard could have failed.

Note that in the above point in the process, Ann is a person who see no reason to believe that any real security compromise or policy violation has occurred as this kind of situation does not meet the stage of been called a security incident or intrusion.

Therefore, based on the above, At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

Learn more about Security event from

brainly.com/question/27225071
#SPJ1

Ann is a security professional for a mid-sized business and typically handles log analysis and security monitoring tasks for her organization. One of her roles is to monitor alerts originating from the organization's intrusion detection system. The system typically generates several dozen alerts each day, any many of those alerts turn out to be false alarms after her investigation.

This morning, the intrusion detection system alerted because that network began to recieve an unusually high volume of inbound traffic. Ann recieved this alert and began looking into the orgin of the traffic.

65. At this point in the incident response process, what term best describes what has occurred in Ann's organization?

A. Security occurrence

B. Security incident

C. Security event

D. Security intrusion

8 0
1 year ago
What are your considerations in making a derivative ict content ti effectively communicate or present data or information?
Sever21 [200]

Answer:

1) Design

2)Content

Explanation:

The considerations in making a derivative ICT content to effectively

communicate or present data or information include the Design.

The design is what helps to portray and make the content more appealing and appropriate for the end users.

The content is the main body and it is vital in helping to provide the required information.

7 0
3 years ago
Other questions:
  • An email message form includes all of the following main areas except
    11·2 answers
  • ____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast
    15·1 answer
  • Which of the following statements is false? a. InputStream and OutputStream are abstract classes for performing byte-based I/O.
    7·1 answer
  • What linux command is used to change file permissions?
    10·1 answer
  • (Convert milliseconds to hours, minutes, and seconds) Write a function that converts milliseconds to hours, minutes, and seconds
    12·1 answer
  • "What is the capital of Belarus?" is an example of what type of search query
    10·2 answers
  • Physical Geography of the Middle East
    13·1 answer
  • Discuss TWO changes in ICMP that took place with the development of IPV6 and indicate why those changes were made.
    7·1 answer
  • WHATS YALL FAVORITE GAME WHOEVER GIVES THE BEST ANSWER WINS 200
    13·2 answers
  • What are the features of the title bar for the Microsoft word application?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!