1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
15

What Temperature does mainframe need

Computers and Technology
2 answers:
Drupady [299]3 years ago
8 0
I’m not sure if this is right but it can’t exceed 98 degree fare height if that helps
mart [117]3 years ago
8 0

Answer:

98 degree fare height

Explanation:

You might be interested in
An organization’s SOC analyst, through examination of the company’s SIEM, discovers what she believes is Chinese-state sponsored
Vinil7 [7]

Answer: Provided in the explanation segment

Explanation:

Below is a detailed explanation to make this problem more clearer to understand.

(1). We are asked to determine whether the systems have been compromised;

Ans: (YES) From the question given, We can see that the System is compromised. This is so because the plan of communication has different details of scenarios where incidents occur. This communication plan has a well read table of contents that lists specific type of incidents, where each incident has a brief description of the event.

(2). Whether the analyst’s assertion has valid grounds to believe it is Chinese state-sponsored.

Ans: I can say that the analyst uses several different internet protocol address located in so as to conduct its operations, in one instance, a log file recovered  form an open indexed server revealed tham an IP address located is used to administer the command control node that was communicating with the malware.

(3). What other threat intelligence can be generated from this information?

Ans: The threat that can be generated from this include; Custom backdoors, Strategic web compromises, and also Web Server  exploitation.

(4). How would that help shape your assessment?

Ans: This helps in such a way where information is gathered and transferred out of the target network which involve movement of files through multiple systems.

Files also gotten from networks as well as  using tools (archival) to compress and also encrypt data with effectiveness of their data theft.

cheers i hope this helped!!!

3 0
3 years ago
If you are installing separate anti-virus and anti-spyware programs, which should you install first
Vera_Pavlovna [14]
Probably the anti virus, so you don't get a virus from downloading the anti spyware program.
6 0
3 years ago
What are examples of data duplication in flat files? Check all that apply.
photoshop1234 [79]

Answer:

Flat file databases are databases that are contained in one single table, or in the form ... -Data Redundancy, By having a relational database it ensures that no attributes ... There are only three different 'degrees' of relationship between two entities. ... Consider, for example, the link between customers, orders and products.).

Explanation:

7 0
3 years ago
Read 2 more answers
Which part of the computer stores and processes data?
lilavasa [31]

it is A the hardware im pretty sure but dont put my answer in im not completley sure

3 0
3 years ago
Which of the following is a central feature of agroup?interactionmutual influenceinterdependenceall of the given options
elena55 [62]

Answer: All of the above

Explanation: A group is considered as the collection of two or more constituents/individuals. The characteristics of the a group are interaction , interdependence,interaction etc. There is a sense of responsibility and trust to work to achieve goal by depending on each other is described as the interdependence and for this interaction between group is needed as to maintain good communication and also there is a influence of each other on each group member.

3 0
4 years ago
Other questions:
  • Microsoft windows server and linux are examples? of:
    12·1 answer
  • If a movie starts at 305 and the movie is 2 hrs and 44 mins when does the movie end?
    14·1 answer
  • Can yall please take these points.
    11·2 answers
  • Some careers emerge to address the environmental impact human behaviors and processes might be having on our planet. True False
    9·2 answers
  • Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual dev
    13·2 answers
  • The large capacity, high-definition optical discs designed to store hi-def video and video games are _______. Group of answer ch
    13·1 answer
  • An OCA previously classified a recent government breakthrough in energy technology as Confidential. The military is developing a
    9·2 answers
  • Can anyone help me this is due today :) <br> Thank you so much
    14·2 answers
  • Name the factors which of the following resources relate to :
    7·1 answer
  • 9.3 code practice
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!