1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
strojnjashka [21]
3 years ago
7

HELP PLS QUICK TRUE OR FALSE QUESTION

Computers and Technology
2 answers:
dmitriy555 [2]3 years ago
8 0

Answer: I think the answer is true but I don't fully understand it sorry if im wrong.

Explanation:

Annette [7]3 years ago
8 0
This is false .........
You might be interested in
"What technology will examine the current state of a network device before allowing it can to connect to the network and force a
EleoNora [17]

Answer: A. Network Access Control (NAC)

Explanation:

The CORRECT answer is (A.) <em>Network Access Control (NAC)</em>. NAC refers to an method used in computer protection in which aspects such as antivirus, or host intrusion prevention among others are somehow consolidated in order to unify endpoint security. Such an approach allows the system authentication to enforce network security.

7 0
3 years ago
Which following is one of the basic characters of object-oriented systems : Select one: a. process b. data c. module d. inherita
Leviafan [203]
The answer is D.

Inheritance means that a child class (subclass) can inherit functionality from a parent class (superclass). For example, a class called Person could have 2 subclasses called Student and Teacher. While Student and Teacher have attributes and methods that differ, they also have some that overlap. By passing these overlapping functionalities down from the Person class, we are making the code more reusable. This eliminates the need to write duplicate code and makes the code more readable.

7 0
4 years ago
What are the two types of formulas in excel
klasskru [66]

Hi Lisa


Complex and simple


I hope that's help :)

5 0
3 years ago
When evaluating mining results, data mining and evaluating becomes
victus00 [196]

Answer:

Q. When evaluating mining results, does data mining and evaluating become an intuitive process?

“Data mining” is technically associated with analysis of very large data sets, to appreciate patterns,and attempt to look at cause to effect relationships. Most of the data is quantitative in nature, and many of the tools relate to that of analysis of numerical /quantitative data.

Explanation:

One of the rules of the game of quantitative analysis, is to allow the “data to do the talking”, Your intuition CANNOT replace the results of quantitative analysis: whether through data mining or humble pencil and paper calculation on the back of an envelope.

With experience you may perhaps see a lot of “counter intuitive results”, Where the final outcome does not make “common sense” - but that is what the data is saying.

It is useful NOT to allow emotions, opinions, to come in the way of any sort of quantitative data analysis.

If you can specify what sort of data you are analyzing a more precise answer can be attempted.

8 0
4 years ago
It is good practice, however, for policy _________________________ to solicit input both from technically adept information secu
s2008m [1.1K]

Answer:

It is good practice, however, for policy <u>Administrator </u>to solicit input both from technically adept information security experts and from business-focused managers in each community of interest when making revisions to security policies.

<u>Explanation</u>

Administrator is the person who has access to each part of the computer. Ha has rights to revise, add or edit application. The administrator is authorized to make and implement policies that are for the interest of the community.

7 0
3 years ago
Other questions:
  • All queries have an explicit location. true of false
    13·2 answers
  • What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to di
    11·1 answer
  • Explain in three to four sentences what happens to data packets once they leave a node.
    11·2 answers
  • Data flow is not a major consideration when building an analytics model. T/F
    13·1 answer
  • Differentiate between trusted-source-security and antispoofing-security techniques.
    10·1 answer
  • A powerboat is about to cross paths with a sailboat under sail. What should the powerboat do
    5·1 answer
  • Write a program that performs the following tasks: Display a friendly greeting to the user Prompt the user for the value to conv
    13·1 answer
  • What is the primary means by which attackers infect computers with these attacks? How do these attacks commonly occur?
    8·1 answer
  • + Use for loop to print numbers from 100 to 10
    11·1 answer
  • I have a top-secret recipe for the greatest cookie dough I have made and I want to keep the recipe a secret so I apply for a? *
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!