1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexgriva [62]
3 years ago
14

Your _______ can help block inappropriate content online. 1. web browser 2. Password

Computers and Technology
1 answer:
djverab [1.8K]3 years ago
7 0

Answer:

web browser.

Explanation:

yea let me go post my password to block content (sarcasm)

You might be interested in
Write down 5 tips that an office can use to be more sustainable and reduce wastage? Write a description of each one and how it r
Evgen [1.6K]

1 Use water cooler

2 Avoid single use drink container for guests

3 Bring lunches in reusable containers

4 Paper waste reduction

take paperless notes

5 Use both sides of paper while printing, coping and writing

8 0
3 years ago
A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action shoul
sergij07 [2.7K]

An action which this organization should take to find out if systems have been compromised is: C. Look for unauthorized accounts.

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities and compromises in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails a tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the computer system.

In this scenario, we can reasonably infer and logically deduce that an action which this organization or cybersecurity specialist should take to find out if systems have been compromised is to look out for unauthorized accounts.

Read more on penetration test here: brainly.com/question/25813524

#SPJ1

Complete Question:

A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised?

Look for policy changes in Event Viewer.

Scan the systems for viruses.

Look for unauthorized accounts.

Look for usernames that do not have passwords.

7 0
1 year ago
An interrupt priority scheme can be used to ____. allow the most urgent work to be finished first make it possible for high-prio
Nana76 [90]

Answer:

All of the above

Explanation:

An interrupt priority scheme is a system which decides the priority at which various work is done and it perform all of the above mention task so therefore all of the above is the right answer.

5 0
4 years ago
What have been three technological changes to photography in the past 200 years?
kolbaska11 [484]
I hope this helps but cars, phones and computers.
3 0
3 years ago
You can tell when an image is selected, because its sizing handles will be visible. True or False
Ivenika [448]

This is true because you can go and check yourself in Word and you can click on an image and the sizing handles will appear.

hope that helps :)

8 0
4 years ago
Read 2 more answers
Other questions:
  • John would like to move from the suburbs into the city, but the rent in the city is very high. John has found an apartment he re
    13·1 answer
  • Suppose you were assigned to develop a logical model of the registration system at a school or college. would you be better off
    9·1 answer
  • Calculate the change in RGDP if the MPC is .6 and initial spending is $500,000.
    8·1 answer
  • A group of developers for a startup company store their source code and binary files on a shared open-source repository platform
    14·1 answer
  • I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD
    11·1 answer
  • What is the output?
    11·1 answer
  • can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)
    14·2 answers
  • While working in a group of two the members are not getting along. You bring the two members together so they can discuss this i
    11·1 answer
  • Why do you want to work for Rev?
    5·1 answer
  • 15. Question
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!