1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex_Xolod [135]
3 years ago
5

Good english songs to put in a power point

Computers and Technology
1 answer:
zheka24 [161]3 years ago
7 0
Depends on what the powerpoint is about...
You might be interested in
Which network component connects a device with the transmission media and allows it to send?
yanalaym [24]
The wireless network I believe
5 0
3 years ago
Can someone please tell me what I’m doing wrong ? Please and it’s due on Thursday!!
liberstina [14]

Answer:

Sure. In Unit test 5, it's looking for 1 instead of 0. You are returning 0 instead of 1.

0 requires 1 digit to express it and should therefore return 1.

In line 6, change the 0 to a 1.

8 0
2 years ago
The type of line shown below represents an / a:​
VikaD [51]

Answer:

esrfsrtg

Explanation:

6 0
3 years ago
4. Why does Hancock believe that our communication online is more honest than we might<br> expect?
meriva

Answer:

The reason we are more honest online is simpler than we think, says Hancock. In the past, before there was modern technology or even written language, people could lie to each other easily. Once the words were said, they disappeared. ... Technology therefore might make us more honest than ever

6 0
3 years ago
Read 2 more answers
Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance to gather extensive informat
LUCKY_DIMON [66]

The  reasonable steps should the company have taken to prevent Jane from finding this information is to do a Vulnerability scanning or a A penetration test.

  • How To defend Against Port Scanning try and use or Install a Firewall and the use of TCP Wrappers.

<h3>What is  Vulnerability scanning?</h3>

This is a kind of passive reconnaissance techniques. This form of scanning is the process of auditing a said network. A vulnerability scanner is one that looks into the network or application to see issues but they do not attempt to exploit any vulnerabilities that is seen.

A penetration test (pen test) is known to be a form of ethical hacking that entails one to think like an attacker and find out ways to penetrate the target's security systems. This aim to:

  • Verify a threat exists.
  • Bypass security controls.
  • Actively test security controls.
  • Exploit vulnerabilities.

Learn more about penetration test  from

brainly.com/question/26555003

8 0
2 years ago
Other questions:
  • 3. Describe what a pre-processor does in a network-based IDS tool such as Snort. Demonstrate your understanding of this function
    6·1 answer
  • What would 128 kbps look like on a phone? i.e. 4g, 3g, 2g, etc
    9·1 answer
  • Which of these statements best describes an application programming interface?
    5·1 answer
  • Monetary Policy can be either Expansionary or Contractionary. Which of the following actions classify as Expansionary Monetary P
    7·2 answers
  • Orifice tubes are A. coded in American models only. B. coded by number for easy identification. C. similarly but not exactly siz
    12·1 answer
  • How to get this on your screen in 2k20 on Xbox
    14·2 answers
  • Write a program segment with a do-while loop that displays whether a user-entered integer is even or odd. The code should then a
    5·1 answer
  • The minimum spanning tree of an undirected graph G exists if and only if G is connected. True or False?
    12·1 answer
  • Using a "word" of 5 bits, list all of the possible signed binary numbers and their decimal equivalents that are represent able i
    12·1 answer
  • When using the Internet, do not give out your __________ without your parents' permission. (Select all that apply.)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!