1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
6

How do i answer a question on brainly????

Computers and Technology
2 answers:
ddd [48]3 years ago
7 0

Answer:

there is an answer button below the questions

Explanation:

VMariaS [17]3 years ago
6 0

Click on the question. Then click on the blue coloured answer. Then you can answer it. If 2 people are already answering the question, then you will not be able to answer it.

You might be interested in
Using a graphic organizer in the prewriting can do all of the following except what?
ikadub [295]
A. organize the writers thoughts 
<span>B. help narrow the writers topic </span>
<span>C. research a writers story** </span>
<span>D. help make the writing more detailed.</span>
5 0
3 years ago
Who are the best candidates for members of skills USA?
Kryger [21]

Answer:

Is there more to the question? But I have had this question already and the answer is B)

7 0
3 years ago
13. A 2-sided coin has an equal likelihood of landing on each side. One side is called "heads" and the other is called "tails".
serious [3.7K]

Answer: c

Explanation:

only reasonable answer

7 0
3 years ago
____ is concerned with the security of computers or devices that are part of a network infrastructure.
Maru [420]

Network security is concerned with the security of computers or devices that are part of a network infrastructure.

Network security can be defined as a broad term that includes many technologies, devices and processes. In the simplest terms, network security is a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using software and hardware technologies. Every organization, regardless of size, industry, infrastructure or structure needs a level of network security solution to protect it from the ever-evolving cyber threat landscape in today's wild.

There are many avenues to consider when addressing network security across an organization. Attacks can occur at any path in the network security layer model, so hardware, software, and network security policies must be designed to address each area. Network security usually consists of three distinct controls: physical, technical and administrative.

You can learn more about network security here brainly.com/question/14407522

#SPJ4

5 0
2 years ago
Write a 5 paragraph essay about this virus, who created it, why, what damage did it cause, and did they go to jail. The worst co
zheka24 [161]

The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

<h3>What does MyDoom virus do?</h3>

The MyDoom virus was said to be the one that brought about a lot of loss in the whole globe.

The  MyDoom is known to be an effective worm that was created to make zombies out of lots of thousands of computers.

Note that the Hackers are able hijacked terminal to wage a kind of  denial of service (DoS) attack to any firm that they do identified.

The virus is known also as Novarg as it is a“worm,” sthat do pread by mass emailing.

Therefore, The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

Learn more about Virus from

brainly.com/question/14887682

#SPJ1

6 0
2 years ago
Other questions:
  • Assume the existence of a Building class with a constructor that accepts two parameters: a reference to an Address object repres
    9·1 answer
  • Write a command that will start and run the gedit command in the background.
    8·1 answer
  • Keion works as a freelancer creating websites and designing logos for clients. He recently had a hard drive failure and lost wor
    12·1 answer
  • In server-side discovery pattern, load balancing and routing of the request to the service instances are taken care of by the se
    9·1 answer
  • You rub two red balloons against a wool scarf. What do you think will happen if you place the balloons near each other. Justify
    5·1 answer
  • A kerberos __________ is a set of managed nodes that share the same kerberos database.
    10·1 answer
  • What is activated as necessary to support local eocs and to ensure that responders have the resources they need to conduct respo
    5·1 answer
  • To summarize means to
    11·2 answers
  • What would a programmer use to stop a while-looping sequence and return to the beginning of the statement?
    11·2 answers
  • How are the four characteristics of the db approach related to the four functions of a dbms?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!