1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
9

The road is closed a head

Computers and Technology
1 answer:
irina [24]3 years ago
8 0
“T”he road is closed “ahead”.
You might be interested in
Why stress testing is needed?​
Zarrin [17]

Answer:

To be able to test a product if it can withstand what it is supposed to before being released to the public for saftey reasons.

7 0
3 years ago
Read 2 more answers
Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networki
HACTEHA [7]

Answer:

A. Router

Explanation:

4 0
3 years ago
You need to install an RODC in a new branch office and want to use an existing workgroup server running Windows Server 2012 R2.
klio [65]

Answer:

You should do the following:

  • Create an account of computer for RODC in the domain controller OU (Organizational unit) as well as allow the Micheal's account to join the computer to the domain.

Explanation:

RODC:

It is called as Read only domain controller that is used to ensure the protection of the servers at remote offices of an organizations.

  • In this case, you are installing an RODC in a new branch office that is remote. For installation of RODC on windows server 2012 R2, we need to create an account for the computer in the domain controller organizational unit for the installation of RODC.
  • We also need to create an account for Micheal's with the privilege to join that computer to the domain.

5 0
3 years ago
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
Thepotemich [5.8K]

Answer:

Option (A) is the right answer.

Explanation:

The following terms can be described as :

Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.

Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.

Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.

Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.  

According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.

3 0
3 years ago
1.) An education application would most likely do which of the following?
77julia77 [94]
The answer would be D teach a new language.
3 0
4 years ago
Read 2 more answers
Other questions:
  • What Coding program does UNITY use?
    6·1 answer
  • The ability to keep web page visitors at your site is called _______.
    11·1 answer
  • What FAA-approved document gives the leveling means to be used when weighing an aircraft?
    5·1 answer
  • Print person1's kids, apply the IncNumKids() function, and print again, outputting text as below. End each line with a newline.
    12·1 answer
  • Which of the following is true regarding packaged software and custom software? Group of answer choices Packaged software are ap
    13·1 answer
  • The proper hand position for keyboarding.
    15·1 answer
  • 1) Why is angle of view important? What are some of the ways that you can do this?
    6·1 answer
  • Which of the following is false? Group of answer choices A) A string may include letters, digits, and various special characters
    7·1 answer
  • All languages require the code which is simply a word that means _____.
    9·1 answer
  • What are two best practices for creating ads? (Choose two.) Select All Correct Responses Implement one ad per ad group per keywo
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!