1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nitella [24]
3 years ago
7

How to post a answer

Computers and Technology
1 answer:
SSSSS [86.1K]3 years ago
6 0
………………….yes yes yes
You might be interested in
What will Jason need to assemble a microcomputer and connect it to memory chips
lisabon 2012 [21]

会いたいんだ

愛したいんだ

その愛がもう今見たいんだ

会いたいんだ

愛したいんだ

今かっさらう So watch out now!

6 0
3 years ago
Compare and contrast the uses of NetWitness Investigator and Wireshark used in the lab. Why would a network administrator use Wi
Ahat [919]

<u>Explanation:</u>

Note, the Wireshark software application is unique in that it has the ability to perform multiple layers of individual packet analysis.

Whereas in NetWitness Investigator software application, even though it doesn't go deeper like Wireshark, it can still detect new threats or problems in a network and then organized all of such information for the administrator.

So, in a sense, by using both applications, a network administrator can find the problems (using Wireshark), while another application (NetWitness Investigator) organizes them for him.

3 0
3 years ago
The most important task in developing a new computer system/app is to: a) choose the most current technologies such as operating
Ede4ka [16]

Answer:

c) establish a good relationship with the user and develop detailed and complete user requirements.

Explanation:

A new computer system/app is a computer software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user. It must be designed to help people carry out an activity.

6 0
3 years ago
When a machine on the public network wants to reach the server at 172.30.0.10, which ip will it use?
Anton [14]
The IP address that it will use is 192.168.16.100
3 0
4 years ago
Read 2 more answers
There is a natural tendency on the part of users and system managers to perceive little benefit from security investment until a
spayn [35]

Answer:

The answer is True

Explanation:

Users and system managers/administrators do not necessarily see the use of security investments, because there is no security breach or security failure to the system.

When security infrastructures are in place, it is to prevent or at least reduce the possibility of devaluation, modification, corruption, destruction or deletion, disruption, disclosure, use, and inappropriate or unauthorized access. So, if any of these breaches do not occur, system managers and users perceive little benefits from security investments.

6 0
3 years ago
Other questions:
  • Assume that word is a variable of type String that has been assigned a value. Assume furthermore that this value always contains
    13·2 answers
  • Which is not a factor that leads to technological advancement?
    14·1 answer
  • Which page feature is used in long documents to assist readers in quickly finding information in the document without having to
    11·2 answers
  • 7.3.4: Find the Error
    7·1 answer
  • Saitama And Tatsumaki Both Go Shopping Together ,Both have Have 50 loafs of bread , And Saitama takes 43 , How much do Tatsumaki
    14·1 answer
  • How many times is the body of the loop executed?
    8·1 answer
  • Which keyboard shortcut pastes information from the clipboard?
    6·2 answers
  • An application is getting downloaded, the total size is 52GB. So the speed of the WiFi is like.. 10mb per second, so the questio
    12·1 answer
  • "Automated Deployment" is one of the prerequisite for DevOps implementation.
    8·1 answer
  • Give five example of a dedicated device ​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!