1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solmaris [256]
3 years ago
12

Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee

ded to ensure that systems are available.
Computers and Technology
1 answer:
sertanlavr [38]3 years ago
7 0

Answer:

Network

Availability is an essential part of Network security, and user behavior analysis and application analysis provide the data needed to ensure that systems are available.

You might be interested in
Referat noaptea la școala cu sfârșit de groază​
solniwko [45]

Te ajut eu daca vrei tu la refera

7 0
2 years ago
Who is in the age range of 13-15 and wants to join a mine craft smp?
Ratling [72]

Answer: Wow that's really cool!

3 0
2 years ago
Assume values 10, 20, 30, and 40 are entered in the cell range A1:A4. Cell A10 contains the formula: =A1+A2+A3+A4 and displays v
r-ruslan [8.4K]

Answer:

The formula and value to this question is "=A1+A3+A4+A5 with value 100"

Explanation:

The explanation of the given question as follows:

  • In question, it is defined that four cells that are "A1, A2, A3, and A4"  contains value that are "10, 20, 30, and 40".
  • To add these values we use addition formula that is "=A1+A2+A3+A4". it will give value 100.
  • If the user inserts a new row that is "A2" and assigns a value in the cell that is "50" so, we use the above formula that adds values with these values we also use the value "100".
8 0
2 years ago
Ftp is a _________ that is utilized to copy and manage files over the internet
Marizza181 [45]
<span>Ftp is a network protocol that is utilized to copy and manage files over the internet.  </span>FTP<span> is widely </span>used<span> for transferring </span>files<span> between computers </span>over<span> a TCP/IP-based network, such as the </span>Internet<span>.</span>
5 0
3 years ago
In which two places are a keyboard usually held on a laptop?
Margarita [4]

Answer:

Bottom of the case

Through a connector

Explanation:

Regularly we must see the bottom of the case to remove some screws, and then move the keyboard, but first, you have to remove a connector.

The keyboards have evolved from windows and IMB built their own keyboards for desktop, and now we have digital keyboards, and replace a keyboard in a laptop can change for the model or the size.

6 0
3 years ago
Other questions:
  • Which of the following is NOT a safe skill you can use to reduce your risk
    11·2 answers
  • Create an application named TurningDemo that creates instances of four classes: Page, Corner, Pancake, and Leaf. Create an inter
    7·1 answer
  • Suppose testcircle1 and circle1 in listing 9.1 are in two separate files named testcircle1.java and circle1.java, respectively.
    14·1 answer
  • All of the following are used to fund private schools except ______
    14·2 answers
  • What necessarily happens when a photographer chooses to give either the aperture or the shutter speed priority?
    10·1 answer
  • What is the main difference between weathering, erosion and leaching​
    9·1 answer
  • If you can photoshop please text me i need help for my digital media class 7862381441
    9·1 answer
  • Decimal numbers are based on __________.
    6·1 answer
  • What is the answer ????​
    13·2 answers
  • WILL GIVE BRAINLIEST!!! Danielle is warehouse supervisor for a large shipping company. Most shipments need to leave the warehous
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!