1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katen [24]
3 years ago
11

PLEASE HELP!!!

Computers and Technology
2 answers:
Artemon [7]3 years ago
4 0
Close? Exit? Don’t know which one.
BaLLatris [955]3 years ago
3 0

leave (i'm pretty sure this is the answer)

You might be interested in
You have implemented a network where each device provides shared files with all other devices, what kind of network is it?
Reil [10]

It is a Peer-to-peer type of network when you have implemented a network where each device provides shared files with all other devices.

So the answer is Peer-to-peer.

8 0
2 years ago
D. A................ usually contains detailed comments about something in the text.
kondaur [170]

Answer: Foot note

Explanation:

The option that contains detailed comments about something in the text is simply referred to as the foot note.

A footnote is simply refered to as the note that is at the bottom of a particular page which gives more information about a particular thing.

Therefore, based on the options given, the answer is B.

7 0
2 years ago
Why would a team choose to employ a zone defense over a person to person defense?
vova2212 [387]

Answer/Explanation:

Zone defense is chosen if MULTIPLE people are attacking one spot that's why they would choose zone defense.

Person to person defense is when 1 person is attacking one spot so somebodies sent out to defend it.

<u><em>~ LadyBrain</em></u>

7 0
3 years ago
The goal of information security management is to protect the confidentiality, integrity, and availability (CIA) of a firm's inf
Fofino [41]

Answer:

confidentiality, integrity, and availability

Explanation:

6 0
2 years ago
testout You want to prevent users in your domain from running a common game on their machines. This application does not have a
Margarita [4]

Answer:

Hash condition is the correct answer to the following question.

Explanation:

Hash condition provided more security than the applocker file path rule and it is manually for the files.

  • It is more secure than the path rule because each file has its separated hash condition.
  • Drawback of hash file is every time whenever when file is updated then we have to update the file hash condition.
8 0
3 years ago
Other questions:
  • When might it be necessary or advisable to write a shell script instead of a shell function? give as many reasons as you can thi
    15·1 answer
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • What are the main types of computer software?
    5·2 answers
  • How do I use this without the spring?
    6·1 answer
  • Function of an actuator
    8·2 answers
  • Jose has 3/5 kilogram of peppermints and 2/3 kilogram of candy canes. How many kilograms of candy does he have?
    10·1 answer
  • You're making great progress on your assignment. You've defined the purpose of your message, identified both the primary and sec
    9·1 answer
  • Three types of keys on the keyboard​
    15·2 answers
  • DEFINE Problem:
    11·1 answer
  • Which of the following is/are used in multimedia?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!