1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentina_108 [34]
3 years ago
14

How do you invite someone to a conversation on brainly

Computers and Technology
1 answer:
Alona [7]3 years ago
3 0
You can’t sorry dude
You might be interested in
Nurse Jackie is a humorous depiction of a drug-addicted nurse who struggles to balance the demands of her hectic hospital job wi
11Alexandr11 [23.1K]

Answer:

dramedy would make since to me

Explanation:

3 0
3 years ago
Ensuring that users have access only to the files they need to complete their tasks is an example of which principle? A. Separat
Flura [38]

Answer:

Least Privilege

Explanation:

The principle of least privilege an important principle in computer security. It is the practice of limiting access rights for users to the basic minimum or least amount of privilege they require to perform their tasks. For example a user is granted privilege to execute a file or manipulate data or use resources they require to perform a function or task. Therefore, this principle can be used only to limit access rights for programs, systems, and devices to those permissions only that are required to carry out permitted activities. Conforming to principle of least privilege reduces the risk of hackers gaining access to sensitive information or a system, by compromising a user account or device. For example an individual whose task is to enter data into a database only requires option to add records to that DB by the principle of least privilege. If a virus attacks the computer of that individual, this attack is restricted only to creating DB entries.

5 0
3 years ago
To transfer files to your company's internal network from home, you use FTP. The administrator has recently implemented a firewa
Aleonysh [2.5K]

Answer:

Ports 20 and 21

Explanation:

For the FTP to work, there are two parts that are required; the command and the data.  These two parts are sent on the two ports 21 and 20 respectively.  If the firewall is indeed blocking connections on ports 21 and 20, then your FTP will not work.

Hence, you need to open ports 20 and 21 to allow FTP to remain functional.

Cheers.

6 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
denpristay [2]

Answer:

Adobe Premire pro

Explanation:

8 0
3 years ago
Suppose that we have a ternaryrelationship R between entity sets A, B, and C such that (i) A has a key constraint; and (ii) Chas
lutik1710 [3]
Lol i mean it could definitely be any of the choices lol i don’t have a clue lol
3 0
3 years ago
Other questions:
  • How is the Task Manager helpful in displaying which resources your computer is using and how fast?
    5·2 answers
  • Do most facebook and twitter users access the platform from their personal computers?
    6·2 answers
  • Which intel processor technology interconnects the processor, chipset, and wireless network adapter as a unit, improving laptop
    14·1 answer
  • What is the protocol in the web search at the bottom?
    13·1 answer
  • You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provi
    8·1 answer
  • 16. Which of the following wire gage sizes is the thickest? A. 14 B. 8 C. 0 D. -33
    14·1 answer
  • _____the measuring instrument is not necssery​
    10·1 answer
  • Which of the following expressions is not equivalent to X ' ?
    14·1 answer
  • Advantages and disadvantages of java
    10·1 answer
  • You are assigned by your teacher to perform the assembly of all the parts of the computer in preparation for the hands on activi
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!