1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill115 [55]
3 years ago
7

Helloo Freee brainlist points answer, anyone want any if yes COMMENT ​

Computers and Technology
2 answers:
zubka84 [21]3 years ago
4 0

Answer:

HeY sIsTeRs I'm bored. Oh and thank you for the points gurlll

Explanation:

Lera25 [3.4K]3 years ago
3 0

Answer:

nice

Explanation:

............yfhfhfxrtcbijbgcezestchbjn

You might be interested in
Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
forsale [732]

Answer is given below :

Explanation:

Minimize attack surface area:

  • This area is often open to attackers due to the addition of features. For example, an unwanted text box in a web application can lead to SQL attacks. This can lead to data loss of information and privacy.

Least privilege:

  • Make sure the business process requires at least some money from users such as CPU usage, memory, file systems. The higher the resource consumption the higher the risk.

Fail secured:

  • However, there are many ways an app can fail with its process. The exception always comes with the handler‌ to handle failed cases.

Security been as simple as much:

  • Always create a simple way to maintain security. Come up with a simple code, it will go faster and faster.  Otherwise it will take unnecessary confusion and time.
5 0
2 years ago
Infrared, a wireless connection used in the past prior to bluetooth, was limited because it ________.
Mars2501 [29]
It required a direct line of site between devices. Hope this helps!
8 0
3 years ago
"background" software that helps the computer manage its own internal resources is called ________.
just olya [345]
"background" software that helps the computer manage its own internal resources is called system software. It is a software (<span> programs) that work in the background to provide basis for other software. Programs that are dedicated to managing the computer itself,  </span>the operating system<span>, file management utilities, and disk </span>operating system<span> (or DOS). </span>
4 0
3 years ago
As with country citizenship, with digital citizenship comes _____.
deff fn [24]

Answer: Responsible Technology usage

Explanation: Digital citizenship refers to the responsible use of technology, and the teaching of digital citizenship is essential to help students achieve and understand digital literacy, as well as the prevention of cyber bullying, online security, digital responsibility and digital health and wellness. to ensure

6 0
3 years ago
Read 2 more answers
Cobbling together elements from the previous definition and whittling away the unnecessary bits leaves us with the following def
pentagon [3]

Answer:

This is not plagiarism

Explanation:

The student has properly referenced the original source material, therefore, it is not plagiarism. Also, it is sufficient to just reference the attached source material author. Although it is implied that several other authors' material has been used in the source material, there is no need for the student to reference the other authors too.

3 0
3 years ago
Other questions:
  • A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-lif
    10·1 answer
  • An example of a current disruptive technology is a?
    8·2 answers
  • Which of the following is not one of DBA's tasks?
    14·1 answer
  • 14. Convert 11110111 from binary to denary<br> (1 Point)
    12·2 answers
  • You specify the shape of an oval in a Java applet by defining the oval's:__________.
    5·1 answer
  • What your computer can do to you?
    14·2 answers
  • Describe the functions of ALU, resisters, CU, BIU, Cache and FPU.
    7·1 answer
  • takes the perspective that a program describes what the solution to a problem is, not how that problem is solved. Select one: a.
    5·1 answer
  • Fields &amp; Methods
    5·1 answer
  • Once you select a theme, you__________ change the theme’s individual elements independently of each other.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!