1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
3 years ago
10

Can someone help I think I know it but I wanna make sure I’m right

Computers and Technology
1 answer:
lapo4ka [179]3 years ago
3 0

I think it’s the last one.

You might be interested in
A. True
kupik [55]
If the coder is unable to locate a code that describes the exact service provided, it is acceptable to use a code approximates the services provided. TRUE, the coder should be able to come up with a code for that is what they provide.
7 0
3 years ago
In 3-4 sentences, write a note to a friend describ
sladkih [1.3K]

you can copy and paste your text.

7 0
3 years ago
Read 2 more answers
What font family is Times New Roman an what font family is Arial?
Alexxandr [17]

Answer:

Some Font Examples

Generic Font Family                 Examples of Font Names

Serif                    Times New Roman Georgia Garamond

Sans-serif                          Arial Verdana Helvetica

Monospace                     Courier New Lucida Console Monaco

Cursive                        Brush Script MT Lucida Handwriting

Explanation:

hope it help

4 0
3 years ago
Read 2 more answers
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
Which standard is commonly used on the Internet to represent non-numeric data?
mezya [45]
ASCI is the standard that is commonly used on the Internet to represent non-numeric data. ASCI stands for American Standard Code fro Information Interchange. This character encoding standard represents text in computers, telecommunications equipment, and other devices.  It assigns letters, numbers, and other characters within the 256 slots available in the 8-bit code
4 0
3 years ago
Other questions:
  • Briefly describe the significance of the shannon limit for information capacity.
    5·1 answer
  • OSHA has authority over the employers of
    5·2 answers
  • What advantage do ExpressCard modules and U.S.B adapters offer over expansion cards?
    10·1 answer
  • What does it mean when you mail is labled unable to forward for review
    5·1 answer
  • Different video files and ______ can cause compatibility issues to arise between computer systems.
    8·1 answer
  • central, secure database in which Windows stores hardware and software configuration information and system security policies is
    12·1 answer
  • Describe a common error that presenters make during their presentation and how to remedy the error​
    12·2 answers
  • Why Do You Need to Set Goals for a LinkedIn Automation Campaign?
    15·1 answer
  • In the range D5:D9 on all five worksheets, Gilberto wants to project next year's sales for each accessory, rounded up to zero de
    6·1 answer
  • Which remote access role service allows publishingweb-based applications for use by clients outside thenetwork?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!