1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
12

Will give brainliest !!

Computers and Technology
1 answer:
Veronika [31]3 years ago
3 0
Images word files and it ensures that’s the js a island dnsjwlwnnsjskq
You might be interested in
What process periodically validates a user’s account, access control, and membership role on inclusion in a specific group?a. Re
Gennadij [26K]

Answer: (A) Recertification

Explanation:

 Recertification is the process that simplify and also automatically re-validate the account of the target type also the member of the resource group. It is the process in which the user account are validated periodically and also control the access.

  • The policies of the re-certification basically initiate the workflow in the activity and also set the accurate notification during the process of re-certification.
  • The re-certification access is important as it enables the companies for reviewing all the external and the internal users.
  • It provide various types of benefits to the organization as it increase the security and also the re-certification accuracy.

Therefore, Option (A) is correct.

6 0
3 years ago
Explain what happens if you try to open a file for reading that does not exist.
ZanzabumX [31]

Answer:

Exception is thrown and the file is created with 0 length.

Explanation:

While opening a file there is an error occur which shows the file does not exist that means an  exception is thrown.

And this error can be occur when the size of the file is very very low means the file is a size of 0 length. So to avoid this error we have to exceed its length from the zero length.

8 0
3 years ago
How can I make [ print(3 * x) ] into a functional python code?
CaHeK987 [17]

If you're programming in python, you simply have to assign a value to x and then use the print function. For instance,

x = 3

print(3 * x)

9 will be the output. I hope this helps!

5 0
3 years ago
Consider the cement used for the foundation; the bricks and timber used for the walls; and the shingles used for the roof. All o
gavmur [86]
<span>Consider the cement used for the foundation; the bricks and timber used for the walls; and the shingles used for the roof. All of these are __________ in making the house.

A. Elements</span>
6 0
3 years ago
You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
mario62 [17]

Answer:

C

Explanation:

It is best to Implement a UTM appliance.

A Unified Threat Management (UTM) system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features.

DescriptionUnified threat management is an approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function.

Cheers

8 0
3 years ago
Other questions:
  • Directions Use your imagination and a word processor to write a business letter with two to three paragraphs. Your business lett
    5·1 answer
  • Does clearing your hard drive make your computer faster reddit
    13·1 answer
  • What type of document would you use the landscape page orientation
    7·1 answer
  • For a line segment, show that clipping against the top of the clipping rectangle can be done independently of the clipping again
    7·1 answer
  • What provides access to the internet and may also be internal?
    8·2 answers
  • What is a boolean in Java
    5·1 answer
  • What's the difference between cross-site scripting and cross-site request forgery? How do you protect against cross-site request
    15·1 answer
  • State three advantages of using a printer​
    15·1 answer
  • A small startup company has hired you to harden their new network. Because funds are limited, you have decided to implement a un
    8·1 answer
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!