1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nata [24]
3 years ago
15

Which web design concept is most closely related to elements that symbolize the real world? A. node B. landmark c.metaphor IN D.

way finding​
Computers and Technology
1 answer:
sergij07 [2.7K]3 years ago
6 0

Answer:

landmark

Explanation:

You might be interested in
The concept of _________________ comes from the acknowledgment that data changes form and often gets copied, moved, and stored i
saveliy_v [14]

Answer: data loss protection

Explanation:

In any organization or enterprise it is very essential to provide protection from data loss to avoid breaches by unauthorized accesses and to secure the data irrespective of whether it is in rest or motion.

It is known that data changes its form when it is copied, moved and stored in different memory location so in this process a lot of sensitive data might be exposed to the outside world and left into the hands of the unauthorized for easy of access to it.

So once a security breach is possible through the system or into the network of the organization it would expose all the application database, emails, spreadsheets and the personal workstation files. So in such a scenario the importance of data loss protection is highlighted and must be given due importance.

8 0
3 years ago
In class, we discussed static local variables in C. Answereach question below; if necessary, find and consult a reference on the
alexira [117]

Answer:

(a) scope: function, lifetime: duration of the function

(b) scope: function, lifetime: duration of the program

(c) scope: global (all modules),  lifetime: duration of the program

(d) scope: module (file), lifetime: duration of the program

6 0
3 years ago
Which of the following is best known as a business network LinkedIn, Facebook, Twitter or Word Press?
Maslowich
The answer is LinkedIn.
 LinkedIn manage your personal identity. It also build and engage in your professional network. It access knowledge, insights and opportunities. It links people, skills and opportunities to create world largest crowd business creation system.

7 0
3 years ago
Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different
mojhsa [17]

Answer:

<em>D. Separation of duties</em>

Explanation:

Separation of duties (SoD) is a fundamental concept in internal controls and is the hardest and often the most expensive to achieve.

<em>This aim is accomplished by distributing the tasks and associated permissions among multiple people for a specific security system.</em>

7 0
3 years ago
Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this fu
Amiraneli [1.4K]

Answer:

yes administrators have to be concerned

Explanation:

It is necessary for countermeasures to be taken against DoS attacks

The types of attacks that can still occur are:

If the network connection get to be overloaded,  there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd  we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.

To reduce the impact of this kind of attacks,

1. there should be enough or excess network bandwidth  and distributed servers should be replicated if there is a possibility that network could get to be overloaded.

2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.

3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters

4. Use strong antivirus on computer sytems that are used to connect to the internet

7 0
3 years ago
Other questions:
  • Abigail is interested in connecting her tablet that usually connects to a wireless network, to her personal computer that usuall
    11·2 answers
  • Suppose you find a magic $1.00 coin. Its magic power is as follows: as each day passes, you get an additional dollar plus half o
    6·1 answer
  • How must you rect to a flashing<br> Yellow traffic light?
    9·1 answer
  • Why do clocks tick-toc?
    5·2 answers
  • The right headlight does not function on either high or low beam. Technician A says this could be caused by an open ground on th
    12·1 answer
  • Public static String doSomething(String s) { final String BLANK = " "; //BLANK contains a single space String str = ""; //empty
    6·1 answer
  • One advantage of using personal computers for Internet access is that they have relatively large screens for viewing Internet co
    7·2 answers
  • Why would you browse by entering a URL rather than use a link in a Web page
    15·1 answer
  • With a(n) ____ you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible.
    14·1 answer
  • Write a while loop that continues to increment uservalue by 5 as long as uservalue is less than 0.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!