1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
2 years ago
6

Vocabulary and Bridge Information

Computers and Technology
1 answer:
motikmotik2 years ago
6 0
Umm
This is to bunch of questions..
You might be interested in
What technology has had the most significant influence on engineering?
Lorico [155]
The wheel (: would be the correct answer
5 0
3 years ago
A software repository, also known as a 'repo'
Step2247 [10]
A software repository is a storage location for software packages. Often a table of contents is also stored, along with metadata. A software repository is typically managed by source control or repository managers.

I hope this helps
7 0
2 years ago
B) What is the use of output devices? ​
chubhunter [2.5K]

Answer:

  • It is used to send data from a computer to another device or user.
  • It converts information into a human-readable form.
6 0
2 years ago
Read 2 more answers
Describe five ways in which Process Explorer (procexp) can be used in computer forensics as part of an investigation
nataly862011 [7]

Answer:

 The process explorer is mainly used for tracking the actual problems in the system. Process explorer is also known as proc-exp and it is also used as system monitoring where it monitor the microsoft window that are typically created by the SysInternals.  

The following are the five ways in which the proc-exp (Process explorer) are used in the computer forensics for the purpose of investigation are:

  • The process explorer mainly provide the various types of functionality to the task manager for monitoring the system properly.
  • It basically used in the system for tracking the main problems.
  • It used in computer forensics for tracking the system problems and it give the detail information about the system memory also.
  • It keeps track all the virus and malicious software in the computer system.
  • It helps for investigation purpose as by using the process explorer we can get all the information about the particular computer system and software.  

4 0
3 years ago
The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos
Zepler [3.9K]
<h2>Answer:</h2>

Option b, c, d are true.

The correct statements are as follows:

<h3>b. Can restrict a computer from receiving network traffic </h3><h3>c. Stops attackers when they are outside of the company's internal network </h3><h3>d. Stop a process or application from launching</h3><h3 /><h2>Explanation:</h2>

Firewall can be defined as a wall or checkpoint that checks each entity before it accesses to go inside or outside a network.

A firewall:

  • makes sure that the data inside a private network is safe by building a wall around it.
  • restricts the malicious data to go inside the network.
  • always ask about launching an application which is blocked by it due to suspicious activity.

A firewall can not:

  • prevent a system from being fingerprinted by port scans.
  • Disable an account.

<h3>I hope it will help you!</h3>
3 0
3 years ago
Read 2 more answers
Other questions:
  • The term _____ best describes the level of technology skills needed in today’s business world.
    15·1 answer
  • Create a stored procedure named prc_inv_amounts to update the INV_SUBTOTAL, INV_TAX, and INV_TOTAL. The procedure takes the invo
    8·1 answer
  • In business documents, spacing between columns needs to be _____. 0.25 inches as little as possible as wide as possible proporti
    10·2 answers
  • How to insert header and page number in word 2016?
    8·1 answer
  • 7.12 LAB: Contains the character
    12·2 answers
  • Which of the following solutions enables simultaneous digital transmission of voice, video, data, and other network services ove
    7·1 answer
  • What is the key function of a sales team?
    13·1 answer
  • a sign is to be hung from the end of a thin pole, and the pole supported by a single cable. your design firm brainstorms the six
    13·1 answer
  • What is one reason that writing effective messages is so important
    11·2 answers
  • Which of the following is an example of an output device
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!