1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
3 years ago
9

Complete each statement by choosing the correct answer from the drop-down menu.

Computers and Technology
2 answers:
mihalych1998 [28]3 years ago
7 0

Answers for edg:

1- speaking and listening

2- nonverbal communication

3. gestures often have multiple interpretations

4. interpreting body language and behavior

Explanation: hope this helped! i just did them and they were right :)

Oduvanchick [21]3 years ago
3 0

Answer: what the other guy said

Explanation:

You might be interested in
What does my name look like in binary code, btw my mane is Wendy Alexis Morales
jekas [21]
01010111 01100101 01101110 01100100 01111001 00100000 01000001 01101100 01100101 01111000 01101001 01110011 00100000 01001101 01101111 01110010 01100001 01101100 01100101 01110011
6 0
3 years ago
Read 2 more answers
What plan can businesses use to protect sensitive data from malicious attacks?
Anna11 [10]

Answer:

cybersecurity

Explanation:

it's either that or anti-spywhare but cybersecurity seems more likely

6 0
2 years ago
Read 2 more answers
What does "Forward" in emails do?​
tatuchka [14]
Basically just want to make your your email is easy
4 0
3 years ago
Please help me with these questions
adelina 88 [10]

3. A, (first choice)

4. C (Third choice from top)


6 0
2 years ago
There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi
torisob [31]

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

6 0
3 years ago
Other questions:
  • He would like to get rid of the graph. What will accomplish
    8·1 answer
  • A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to
    11·1 answer
  • Help !!!!!
    9·1 answer
  • When evaluating mining results, data mining and evaluating becomes
    6·1 answer
  • Part 1: For this assignment, call it assign0 Implement the following library and driver program under assign0: Your library will
    5·1 answer
  • Which of the following component is required to insert text in multimedia
    8·1 answer
  • What does the following process describe?
    10·1 answer
  • Where else can the computer send the results of processing other than to output​
    13·1 answer
  • Write algorithm and flowchart for the following<br>a.find the sum and average of any four numbers ​
    9·1 answer
  • Which response best completes the following IF-ELSE statement?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!