1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kiruha [24]
3 years ago
12

Does anyone play genshin impact here?

Computers and Technology
2 answers:
Reika [66]3 years ago
6 0
Answer


NO sorry
Have a great day
Elodia [21]3 years ago
5 0

Answer:

what server are u on

Explanation:

You might be interested in
The top-level domain (tld), also known as the ________, typically identifies the type of organization an address is associated w
Contact [7]

The top-level domain (TLD), also known as the domain suffix, typically identifies the type of organization an address is associated with . (dot)

The top-level domain is the last part of the domain name i.e the part after the final dot. The tld identifies what kind of organization the domain belongs to and classifies its purpose. For example, “.com “is for commercial businesses and “.gov” is for governmental institutions.

There are three main types of top-level domains;

  1. Generic TLDs: They cover the most common domain names like “.com”,” .net” and “.org”.
  2. Country-code TLDs: These domains are reserved for use by certain countries and states like “.uk”, “.pk”, “.au”.
  3. Sponsored TLDs: These are usually representative of any geographical or professional communities with a delegated sponsor who represents them.

You can learn more about domain name at

brainly.com/question/10314541

#SPJ4

3 0
1 year ago
What functionality can a vulnerability scanner provide that a port scanner cannot?
Rina8888 [55]
<span>Sending alerts when new systems are added to the network is the functionality that a vulnerability scanner can provide and a port scanner cannot.
</span>port scanner<span> allows testing of open </span>ports and firewalls. It d<span>iscovers open UDP </span>ports<span> on your target system by </span>scanning with NMAP and by doing so it is<span> the first step of a complete </span>vulnerability<span> assessment. </span>
7 0
3 years ago
What is a back door?
V125BC [204]

Answer:

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment. Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems.

Explanation:

3 0
3 years ago
Read 2 more answers
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
What are two examples of items in Outlook?
marta [7]

Answer:

I believe it would be button and tool bar

8 0
3 years ago
Other questions:
  • What are 5 actions that you can do to take care of your camera
    14·2 answers
  • Joe sends a scathing e-mail to his boss regarding increased work hours. Joe tries to deny sending the e-mail, but is unable to d
    9·1 answer
  • What year did buck tooth bob become famous
    11·2 answers
  • Classify the following skills: preparing a presentation, rebuilding a car, and solving equations.
    11·2 answers
  • A vehicle equipped with an electronically shifted transaxle stalls whenever slowing to a stop after being driven over 20 miles (
    15·1 answer
  • VURULU<br> The default style in Word is called the
    6·1 answer
  • How to reset maintenance light on toyota camry?
    12·1 answer
  • What is the difference between a 13 column abacus and 5 column abacus?
    10·1 answer
  • When you start a new blank document, you begin typing at the
    6·1 answer
  • Give two reasons why it is not advisable to open email from unknown sources​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!