1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
3 years ago
13

Adios brainly, wont be posting that much take my points away i d c

Computers and Technology
2 answers:
mrs_skeptik [129]3 years ago
5 0
Omg I would die to have your points because when I get on people call me a noob because I just got the app like 3 days ago and every time I answer a question some says noob like dang I just started
ankoles [38]3 years ago
3 0
True? What why please tell us what’s happening
You might be interested in
System uses a 6-bit 2’s complement signed integer representation. What is the range of decimal values it can represent?
kap26 [50]

Answer:

-32 to +31

Explanation:

6 bit 2s complement representation will be of the form b1b2b3b4b5b6 where each bit is either 0 or 1.

The largest positive number that can be represented using this scheme is 011111

Translating this to decimal this is 1*2^4 + 1^2^3 + 1^2^2 + 1^2^1 + 1^2^0

=16 + 8 + 4 + 2 + 1 =31

The smallest negative number that can be represented using this scheme is 100000

Translating this to decimal = -1 * 2^5 = -32

So the range of decimal values that can be represented is -32 to +31.

6 0
3 years ago
System memory is on a computer motherboard?
Leya [2.2K]
Is this a true or fales question

8 0
4 years ago
Read 2 more answers
What is the output of the following program?
Amiraneli [1.4K]

Answer:

1 2

1 1

1 0

Explanation:

i got it wrong for the awnser

3 0
3 years ago
Read 2 more answers
An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
djyliett [7]

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

5 0
3 years ago
Which of the following statements about ip addresses is true?
Greeley [361]

This question is incomplete because it is lacking the necessary answer options, which I have provided below:

A. When data is sent between devices on the Internet, they identify each other with an IP address.

B. When a user signs up for an email address they must also sign up for an IP address.

C. IP addresses are assigned at the factory.

D. The IPV4 IP scheme allows for an unlimited number of devices to connect to the Internet.

So, given your question, the answer option which is true about IP addresses is: A. When data is sent between devices on the Internet, they identify each other with an IP address.

An IP address is an abbreviation for Internet protocol address and it can be defined as a unique number assigned to a computing device or other network devices, in order to differentiate each computing device from one another in an active network system.

Hence, an IP address is typically designed and developed to uniquely identify each computing device or network devices connected to the Internet or an active network system.

Basically, IP addresses are used anytime two or more computing devices send and receive data from one another over the Internet.

In conclusion, interconnected computing devices identify each other with an IP address when sending and receiving data over the Internet.

Read more: brainly.com/question/20629962

5 0
3 years ago
Other questions:
  • In a word processor, Tariq chooses Options from the Tools menu and then selects the Track Changes tab. Which of the following ta
    14·1 answer
  • What is the benefit to having the user interface integrated into the operating system? a) Power users prefer the added flexibili
    13·1 answer
  • Select the correct answer.
    8·1 answer
  • Explain briefly the purpose of the Computer Management Console in Microsoft Windows.
    12·1 answer
  • If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’
    13·1 answer
  • What is the output of the following program?
    11·2 answers
  • Give three reasons to use a hard drive as mass storage.
    10·1 answer
  • What should you consider when developing your website content?​
    6·2 answers
  • Apakah kebaikan mengetahui fungsi elemen pada produk mekatronik​
    5·1 answer
  • Go to this link: https://platform.breakoutedu.com/game/play/going-buggy-78#
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!