1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
9

How many bytes make up the word panthers

Computers and Technology
1 answer:
Sati [7]3 years ago
6 0
It is saying 8 bytes
You might be interested in
Which one of the following report sections appear once on every report page?
Elina [12.6K]

Answer: Page footer section

Explanation:

 Page footer section is basically appear in the each report page at the bottom of the page. The page footer is basically used for the page number and the brief explanation of the symbols.

On the other hand, Report header section is basically appear once in the beginning of the report.

Report footer section is basically appear once in the end of the report.

Detail section is basically used to display the all detailed information in the report.

Therefore, page footer section is the correct option.

6 0
2 years ago
What can help prevent issues related to downloading content from the internet
Natasha_Volkova [10]
The best step to take is to have some kind of anti-malware/spyware software. Hope this helps you!


-Belle
8 0
2 years ago
The organization will most likely ___ to an internal user attempting to escalate privilege than to an external hacker
alexdok [17]

Answer:

respond differently.

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.

Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.

An organization is expected to most likely respond differently to an internal user such as one of its employees that attempt to escalate his or privilege than to an external hacker.

This is usually so because the organization trust its internal users to an extent than it does with external users or an attacker such as an external hacker.

8 0
2 years ago
Kenny has gone to a rocky beach to take a photo of the sunset. He wants to level his shot perfectly. He is aware that his tripod
iragen [17]

Answer:

it would probably be on the right side

Explanation:

3 0
3 years ago
Read 2 more answers
Select the correct answer.
vova2212 [387]
I would say a digital camera, I am pretty sure a digitizing tablet and a graphic pad is the same, and a keyboard is pretty useless for this
7 0
2 years ago
Other questions:
  • 2.Consider the following algorithm and A is a 2-D array of size ???? × ????: int any_equal(int n, int A[][]) { int i, j, k, m; f
    12·1 answer
  • Which of the following represents the bus topology? Multiple Choice All devices are connected to a central device, called a hub.
    8·1 answer
  • how much should an organization consider moving into the cloud before full outsourcing starts making more business sense
    14·2 answers
  • SOMEONE PLZZ HELP ME ASAP!!
    15·2 answers
  • Data that are collected on large populations of individuals and stored in databases are referred to as _____.
    15·1 answer
  • The getting started screen in Microsoft publisher consists of which main parts?​
    7·1 answer
  • What made it possible to develop personal computers?
    10·2 answers
  • Miley met up with a bunch of her college friends after several years. She told them that she works for the sound department of a
    5·1 answer
  • Identify the three fuzzy logic systems in the given text.
    10·1 answer
  • For which of the four game elements will you give a detailed description about the challenges that the player will face, such as
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!