1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
3 years ago
8

I don't want my large video files using up all my hard drive space . Can I archive my videos in on DVDs or Blu Rays?

Computers and Technology
1 answer:
irina [24]3 years ago
8 0

Answer:

dvds

Explanation:

You might be interested in
Android OS "AFTER" Beta.<br><br> A. Cupcake<br><br> B. Candy<br><br> C. Cookie<br><br> D. Carmel
Sonbull [250]
Cupcake was third release of Android original operating system. Came out in 2009 and is no longer supported
3 0
3 years ago
An organization’s SOC analyst, through examination of the company’s SIEM, discovers what she believes is Chinese-state sponsored
Vinil7 [7]

Answer: Provided in the explanation segment

Explanation:

Below is a detailed explanation to make this problem more clearer to understand.

(1). We are asked to determine whether the systems have been compromised;

Ans: (YES) From the question given, We can see that the System is compromised. This is so because the plan of communication has different details of scenarios where incidents occur. This communication plan has a well read table of contents that lists specific type of incidents, where each incident has a brief description of the event.

(2). Whether the analyst’s assertion has valid grounds to believe it is Chinese state-sponsored.

Ans: I can say that the analyst uses several different internet protocol address located in so as to conduct its operations, in one instance, a log file recovered  form an open indexed server revealed tham an IP address located is used to administer the command control node that was communicating with the malware.

(3). What other threat intelligence can be generated from this information?

Ans: The threat that can be generated from this include; Custom backdoors, Strategic web compromises, and also Web Server  exploitation.

(4). How would that help shape your assessment?

Ans: This helps in such a way where information is gathered and transferred out of the target network which involve movement of files through multiple systems.

Files also gotten from networks as well as  using tools (archival) to compress and also encrypt data with effectiveness of their data theft.

cheers i hope this helped!!!

3 0
3 years ago
Which of the following statements about moving averages is not true?
AleksAgata [21]

Answer:

The answer is "Option D"

Explanation:

The term moving average is known as a time series of information, which is widely used to reduce quick-term variations and demonstrate deep-term patterns or intervals. It is a type of matrices numerically, thus it could be considered as either an example of a tiny-pass filter for data processing, and correct options can be described as follows:

  • In option A,  It is used in a smooth series.
  • In option B, In this process, all the values are used in the calculation are equal in weight.
  • In option C, It is the simplest method, which is used in exponential smoothing.
7 0
3 years ago
Select three advantages of cloud computing.
Julli [10]

Answer:

A,B,and C

Explanation:

Hopefully this helps!

7 0
3 years ago
Why is it helpful that the ribbon tabs can collapse?
Verizon [17]
<span>The 'Pin the ribbon' button replaces the 'Collapse the Ribbon' button when the ribbon is collapsed. You will see the 'Pin the ribbon' button only when you expand a ribbon by tapping or clicking a tab.</span>
4 0
3 years ago
Other questions:
  • Why does the hp computer not have Bluetooth?
    6·1 answer
  • WILL MARK BRAINLYIST
    15·2 answers
  • In Google search results, how are organic links different from sponsored links?
    13·2 answers
  • "Most of us know that when we come into a college classroom, we will see desks and chairs, a computer station and a projector. A
    6·1 answer
  • Fazer um programa em C++ que contenha 3 funções sendo:
    11·1 answer
  • rite a program that prompts the user to enter an integer and displays each of its numbers one by one.
    9·1 answer
  • How many Pokemon have only one type? In other words, for how many Pokemon is Type2 blank?
    6·1 answer
  • How should resumes and cover letters be written to help you obtain a job that meets your
    14·1 answer
  • How many registers are there in the memory unit?
    8·1 answer
  • System.out.print();
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!