1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
3 years ago
10

Which of them does not support decision making? Options DSS, GDSS, ESS All of above

Computers and Technology
1 answer:
Gala2k [10]3 years ago
8 0
Go to this website all of your anwers are here- http://www.academia.edu/9209970/ASSIGNMENT_C_Total_40_Question
You might be interested in
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
Why should we be careful about opening email attachments?
quester [9]

Answer:

files can easily infect your computer with viruses or malware.

Explanation:

8 0
3 years ago
Read 2 more answers
A technician is buying a PC that will host three VMs running at the same time with the current configuration. The technician bel
raketka [301]

Answer:

B. SSD

Explanation:

VMs or virtual machines are virtually created environment for multiple operating system on a host operating system. The host operating system has an extension called Hyper-V. The hyper-V manager helps to manage the virtual machine's activities.

The VMs can hold applications in their respective containers, which requires a partition of the storage. So when more VMs are configured, more storage memory is required to store their individual data. The VMs in a computer system can share a network interface card.

7 0
3 years ago
How many bytes make up the word panthers
Sati [7]
It is saying 8 bytes
6 0
3 years ago
What is the supernatural condition called whereby a human transforms into a wolf?
Paraphin [41]
The supernatural condition whereby a human transforms into a wolf is called a werewolf.
4 0
3 years ago
Read 2 more answers
Other questions:
  • An automobile battery, when connected to a car radio, provides 12.5 V to the radio. When connected to a set of headlights, it pr
    11·1 answer
  • Can Any body Define what is search engine in a simple language quick please​
    14·1 answer
  • Sometimes you're the dog, sometimes the fire hydrant, your thoughts?
    15·1 answer
  • The destructor automatically executes when the class object goes out of ____.
    12·1 answer
  • Nate specifically wants a template that will work for an application letter. Which features in the New dialog box can
    15·1 answer
  • Njdnkjsdnjvnsdjvnjsdnvjsdvnjdnvjdsnvnksn
    6·1 answer
  • Last bittttt of points
    8·1 answer
  • Cursor/Blinking line is used to show current_ on document. A- Color b- Status c- Type d- Location
    11·1 answer
  • Which contact field is used to control the name that would appear in the To field of an email message when a user is sending a m
    5·2 answers
  • William brought some data into his Tableau Book, but the data had some null values and incorrect column headers. What did Willia
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!