1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandrvk [35]
3 years ago
5

You should always try to avoid showing that an animal in a zoo is a captive animal. True False

Computers and Technology
1 answer:
Ede4ka [16]3 years ago
7 0

Answer:

im like 90%  sure its true

Explanation:

You might be interested in
________ are viruses that masquerade as useful programs or files. hydras spyware programs worms adware programs trojan horses
Harrizon [31]
Trojan horse is the correct answer
5 0
3 years ago
For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro
elena-14-01-66 [18.8K]

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

8 0
3 years ago
network consisting of computers and other devices that are eithrr fully or partially connected to each other
tekilochka [14]

The answer is a Mesh topology. This method connects every device to each other device in the network. A wired full-mesh topology is not as common as it is impractical and highly expensive. A partial mesh topology offers redundancy if one of the connections goes down and usually uses a connecting medium such as a router to eliminate cables and expensive PCI NIC's.

8 0
3 years ago
A customer uses an app to order pizza for delivery. Which component includes aspects of the customer's interaction with an enter
MissTica

The available options are:

Understand the customer journey

Identify customer requirements based on their behavior and interactions

Provide a steady stream of marketing-qualified leads to the sales team

Help curate the right kind of content for customers

Provide feedback to the operations team regarding product quality

Answer:

Identify customer requirements based on their behavior and interactions

Explanation:

The component that includes aspects of the customer's interaction with an enterprise platform is "Identify customer requirements based on their behavior and interactions."

The above statement is true because when a customer uses an app to order pizza for delivery, the app can identify the customer's requirements based on the interaction between the customer and the app.

The customer uses the app to ask for what he wants, which is the requirements based on his behavior; the app identifies these wants and acts accordingly. This also shows interactions between the app and the customer.

8 0
3 years ago
python There is a reference variable office_a_c of type AirConditioner. Create a new object of type AirConditioner using the off
Kay [80]

Answer:

  1. class AirConditioner:
  2.  def __init__(self, a_c=False):
  3.    self.office_a_c = a_c  
  4. ac = AirConditioner()
  5. ac.office_a_c = True

Explanation:

Firstly, create a class and name it as AirConditioner (Line 1).

Next in the class constructor, create the reference variable office_a_c (Line 3). Please note the reference variable shall be preceded with a self keyword. Besides, the reference variable is set to False by default.

Create an AirConditioner object (Line 6) and then use the dot syntax (.) to set the object reference variable office_a_c to True.

8 0
3 years ago
Other questions:
  • 4. The same data source can be used multiple times in creating mail-merge documents.
    7·1 answer
  • Nina aspires to be a digital media specialist. What should Nana be familiar with in order to pursue this career?
    9·2 answers
  • A binary message consisting of four bits was sent to you by a friend. The message was supposed to be ABAB. Unfortunately, your f
    8·1 answer
  • Which option describes wearable technology?
    9·1 answer
  • Item 8 Item 8 Shelby Black runs a very successful hair salon in downtown Los Angeles. One of Shelby’s tasks is to input positive
    13·1 answer
  • Which statement describes the relationship between science and technology?
    13·2 answers
  • Whay is processing?Explain with an example.​
    9·2 answers
  • Which properties would be useful to know to search for a Word document? Check all that apply.
    7·1 answer
  • What is the missing part to have the output as 3 2 1 while count >0 : print(count) count -= 1
    10·1 answer
  • What is the console.log function for?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!