1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VikaD [51]
3 years ago
5

Dispositivo de computo

Computers and Technology
1 answer:
katrin2010 [14]3 years ago
8 0

Answer:

wouf wouf wouf

Explanation:

i don't know.

You might be interested in
A(n) ____ consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to pe
yarga [219]

Answer:

The correct answer is "Program".  

Explanation:

Program is the collection of statement or instruction which is developed for creating any software or any purpose. The program is implemented or executed by a computer to perform a particular task.The particular programmer always writes an instruction to develop a program.

Program are always organized for the common purpose, that specifies the computer what tasks to perform as well as how to perform that particular task for example if programmer develops a program of calculator then it should be only used for the calculation purpose.

7 0
3 years ago
Dr. Joon asks her students how to insert a table in an Excel workbook. The students record the steps a chart. Which students lis
Leona [35]

Answer:

C

Explanation:

Both Table and Format as Table can be used to create a table

4 0
4 years ago
A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
victus00 [196]

Answer: (D) Distributed denial- of- service (DDoS)

Explanation:

The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.

  • Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
  • This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.

Therefore, Option (D) is correct.

8 0
4 years ago
Choose the missing method name.
leva [86]

Answer:

midpoint i'm pretty sure. :)

Explanation:

3 0
2 years ago
Why do you feel an organization has multiple layers of security in place to protect its operation?
aalyn [17]

The purpose of including multiple layers in your network security<span> is to make sure that </span>each single defense component has a backup<span> in the case of a flaw or missing coverage. The individual strengths of each layer also cover any gaps that other defenses may lack.</span>

With this assumption in mind, each individual layer in a multi-layered security approach focuses on a specific area where the malware could attack. By working in concert, these layers of security offer a better chance of stopping intruders from breaching company networks than using a single solution.

The types of security layers you can use in your network defense include:

<span>Web protectionPatch managementEmail security and archivingVulnerability assessment and analyticsAntivirus softwareData encryptionFirewallsDigital certificatesAnti-spam and spam filtersPrivacy controls</span>

<span>Having multiple layers of security in place is crucial for MSPs who protect data at all levels and across numerous applications and devices. Not only should data stay safe, but so should the methods of communication and the network where information is transferred.</span>

4 0
4 years ago
Other questions:
  • Given num_rows and num_cols, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
    7·1 answer
  • What type of device is built into a tablet computer and can send data over radio waves to another device such as a laser printer
    10·1 answer
  • Match the challenge with the term or process that offers a solution.
    6·1 answer
  • Description A data retrieval tool that finds specified data within a database A collection of records All of the fields for a si
    7·1 answer
  • Which behavior of the application should the user expect? A user profile has login hour restrictions set to Monday through Frida
    12·1 answer
  • "You have installed a point-to-point connection using wireless bridges and Omni directional antennas between two buildings. The
    8·1 answer
  • Knowing the meaning of the acronym WAS I WHY can be most helpful to you when you?
    14·1 answer
  • The homepage is the page your browser displays when you first start the program
    12·1 answer
  • Select the correct answer from each drop-down menu. The following diagram shows four resistors. What is the effective resistance
    9·1 answer
  • How can i setup a mesage room and also want to hangout ??????
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!