1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
2 years ago
9

Which girl is he baddest 1. Shawty 2.Lisa 3.Ashley

Computers and Technology
1 answer:
Ainat [17]2 years ago
3 0

Answer:

. . . . . . . S H A W T Y.. . .. . .

You might be interested in
Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender
Pavlova-9 [17]

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

4 0
3 years ago
Jed is the database administrator for a mid-sized computer component manufacturer. He is responsible for validating the data mod
svet-max [94.6K]

Answer:

Development task is the correct answer to the given question.

Explanation:

The database administrator is responsible for managing the database management system . The overall security of the database is depended on the database administrator.

The Development task include the following function  

  • Verification of the data model that is used by the database management system .
  • Check the user input it means validating the data.
  • Defining the overall requirement to create the model.
  • Providing backup when the data is loss .

So the Development task is the correct answer.

3 0
3 years ago
The smallest unit of time in music called?
zmey [24]

Answer:

Ready to help ☺️

Explanation:

A <em>tatum</em> is a feature of music that has been defined as<u> the smallest time interval</u> between notes in a rhythmic phrase.

7 0
2 years ago
Read 2 more answers
A technician is building a workstation that is to be used as an HTPC and will sit next to the audio receiver. Which of the follo
loris [4]

Answer:

B, Mini-ITX

Explanation:

According to my research on information technology and it's hardware, I can say that based on the information provided within the question the technician is most likely to use a Mini-ITX case. This is because an HTPC is a A Home Theater PC which does not need all the hardware that a regular PC needs, just the minimum specs, and these devices are usually hidden away in a drawer or behind the TV. Therefore he needs the smallest PC case which is a Mini-ITX.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
2 years ago
Will a pair of bar magnet ,with keepers on the two ends, act as a magnet
kiruha [24]

Yes, because the keepers are made up of iron, when the magnet is in contact with it they become temporary magnet.

8 0
3 years ago
Other questions:
  • Why are resources limited? Why can't we get everything all the time?
    12·1 answer
  • Enhancing and optimizing customer retention and loyalty is a major business strategy.
    15·1 answer
  • What is the typical educational requirement for a non-entry level software programmer?
    8·2 answers
  • NAT ________. allows a firm to have more internal IP addresses provides some security both allows a firm to have more internal I
    5·1 answer
  • Adam is an Engineering student but has decided that he does not want to work in that field, but in the Manufacturing career clus
    11·2 answers
  • The __________ operator increases the value of the variable by 1 after the original value is used in the expression in which the
    7·1 answer
  • If an ______ is caught dumping hazardous materials, that person can be prosecuted. Answer choices A) Employee B) Employer C) Bot
    7·1 answer
  • Hard disk works on the following technologies: (i) Technology used within the hard drive to read &amp; write data to the drive a
    11·1 answer
  • What is wrong with each of the following code segments? int[] values; for (int i = 0; i &lt; values.length; i++) { values[i] = i
    7·1 answer
  • Do anyone know how to code like I need someone do a code for me?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!