1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dedylja [7]
3 years ago
7

HELP im soooo confused

Computers and Technology
1 answer:
Maslowich3 years ago
6 0
This is so difficult. sorry i couldn’t help!!
You might be interested in
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
The involvement of the United States in the ______ and ______ resulted in _______ .
Aleksandr-060686 [28]

The involvement of the United States in the <u>Iraq</u> and <u>Kuwait conflict</u> resulted in <u>Persian Gulf War</u>.

<h3>What is the Persian Gulf War?</h3>

The Persian Gulf War can be defined as an international conflict that was led by the United States of America alongside the forces of the United Nations (UN) against the larger state of Iraq, in response to her invasion and annexation of the smaller country of Kuwait.

In this context, we can infer and logically deduce that the involvement of the United States in the <u>Iraq</u> and <u>Kuwait conflict</u> resulted in <u>Persian Gulf War</u>.

Read more on Persian Gulf War here: brainly.com/question/1105731

#SPJ1

8 0
3 years ago
What quantities are measured by the following sensors:
grigory [225]

Answer:

D

Explanation:

3 0
3 years ago
CRM systems provide an organization with an important element: all employees of the company who directly or indirectly serve a c
Vilka [71]

Answer: On the same page

Explanation:

 The CRM is basically stand for the customer relationship management that are design to support all the relationship with the customers. It basically analysis the data about the customers to improve the relationship and growth in the organization.

All the employees in the organization are directly and indirectly server the customers are basically o the Same page by the individual computers.

The CRM approach are basically compile the given data from the different communication source such as company website, email and telephone.

 

8 0
4 years ago
Typically , how do people earn income
natima [27]
People earn income by getting jobs and working. When they work, they get paid. That's an income
3 0
4 years ago
Read 2 more answers
Other questions:
  • Which type of peripheral is a keyboard?
    11·2 answers
  • What is media consumption ?
    12·2 answers
  • You are working on a router that has established privilege levels that restrict access to certain functions. you discover that y
    5·1 answer
  • Write a program that reads a book (a file in text format), breaks each line into words, strips whitespace and punctuation from t
    10·1 answer
  • In a _______ format, the date line and the signature block are centered.
    6·1 answer
  • How do operating system work?
    5·1 answer
  • ICT Practical Work
    12·1 answer
  • What are the two types of commennts of java​
    12·1 answer
  • Which option is a real job title on the interactive media career pathway? A. Social networking specialist B. Information technol
    11·1 answer
  • look for ten websites and classify them as static or dynamic what makes each websites static or dynamic?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!