1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
2 years ago
14

PLEASE HURRY I WILL GIVE BRAILIEST TO WHO EVER ANSWERS AND IS CORRECT

Computers and Technology
2 answers:
Valentin [98]2 years ago
5 0

Answer:

Accessible twenty-four hours per day and seven days per week

Quick and easy sharing

Document sharing

torisob [31]2 years ago
4 0

Answer:

B, D, E is the answers I think

You might be interested in
Which attributes are indicators that a website is reliable? Check all that apply is up to date explains sources of data is an ed
Ahat [919]

Answer:

1 - Is up to date

2 - explains sources of data

3 - is an educational website

6 - will not share personal information

7 - has articles written by experts

7 0
2 years ago
Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and
makkiz [27]

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

7 0
3 years ago
The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the
mars1129 [50]

Answer:

I recommend Digital Certification of User through trusted certification Authority, who is requesting to access the company website through VPN to make sure the identity of the user.

Explanation:

Digital Certificate is the type of identity key or certificate that is assigned to the users as per their request. It is a unique number that is assigned to the user to ensure the authentication that Who are you. It is same like our identity card number that shows our identity to someone as per requirement.

These certificates are issued by certification organizations that are registered or trusted. If the users are using VPN on their devices to access some website that may not be a trusted user or a malware that can hurt the company by breaching the security protocols. So, some companies didn't allow untrusted users to websites.

<em>Therefore, I recommend to my company that, they should ensure that the users that are trying to access the website through VPN must have some digital Certificate from trusted certification authority to ensure the identity of the users.</em>

<em />

6 0
3 years ago
What are the steps for consolidating data from multiple worksheets? 1. Select the range of data on the first worksheet you wish
likoan [24]

Answer:

2. Go to the Data tab on the ribbon and select Data Tools.

3. Then, select and the dialog box will appear.

4. Choose the in the drop-down. Then, select the first group of data and press Enter.

1. Select the range of data on the first worksheet you wish to consolidate.

5. To add from more worksheets, select from the View tab.

Explanation:

Consolidation in Microsoft Excel is used to gather information from several worksheets. To consolidate data in a new worksheet, select the new worksheet and click on the upper left side where the data should be.

Click on Data > Consolidate, then a dialog box would appear. From the dialog box click on the function to consolidate with, then click on the reference area and select the first data range by clicking on the first worksheet and drag the data range to the box and click Add.

To add more data range, click on the reference area and do the same as the first data.

7 0
3 years ago
Read 2 more answers
A service that enables a customer to build and run their own applications but doesn't include extensive access to hardware and m
Musya8 [376]

There are a lot of computer apps. A service that enables a customer to build and run their own applications but doesn't include extensive access to hardware and middleware is PaaS.

<h3>What is PaaS?</h3>

This is known to be one that helps user to install and run their own application on any kind of vendor-supplied hardware and system software.

The Platform-as-a-Service, is said to be a cloud computing model that gives customers a full cloud platform such as hardware, software, and infrastructure that is used for creating, running, and handling applications.

Learn more about PaaS from

brainly.com/question/14364696

8 0
2 years ago
Other questions:
  • What is a negative impact of digital communication
    6·1 answer
  • Which tab is used to edit objects on the slide master and layouts
    10·1 answer
  • Write structured pseudocode to show the following: print “Reorder” when the quantity is less than 20; otherwise print “OK”.
    15·1 answer
  • Among the following, which is the best protection against ransomware?
    8·1 answer
  • Some of the more important __________ include anti-virus (and anti-malware), host-based firewall, system hardening (removing unw
    11·1 answer
  • Paul has been working long hours. He is tired and distracted by family issues,
    10·1 answer
  • Define the following BASIC terms:<br> 1. Keywords<br> 2. Constants<br> 3.Variables
    8·1 answer
  • An address has a house number, a street, an optional apartment number, a city, a state and a postal code. Define the constructor
    5·1 answer
  • Define a new class Fighter that inherits from Spaceship. Add a variable property weapon that defaults to an empty string and a v
    14·1 answer
  • Write the function evens which takes in a queue by reference and changes it to only contain the even elements. That is, if the q
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!