1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_lady [41]
3 years ago
5

Discuss at least 1 Microsoft Windows security features that could protect data?

Computers and Technology
1 answer:
Licemer1 [7]3 years ago
5 0

Answer:

Virus & threat protection.

Explanation:

Monitor threats to your device, run scans, and get updates to help detect the latest threats.

You might be interested in
What is the difference between an html opening tag and a closing tag?.
Doss [256]

Answer:

Explanation:

Generally speaking, there are two kinds of tags - opening tags: <html> and closing tags: </html>. The only difference between an opening tag and a closing tag is the forward slash "/". You label content by putting it between an opening tag and a closing tag.

HTML is all about elements.

7 0
2 years ago
Who prime minister of india​
Alex777 [14]
<h3>\mathfrak\red{✨ Answer :-}</h3>

Mr. Narendra modi is a prime Minister of Indian.

8 0
3 years ago
Read 2 more answers
Think back on the Font Tester App. Can you think of an example of another app or feature of an app which would use a loop to con
ch4aika [34]

Answer:

The search bars in search engines to find the most reliable information.  

Explanation:

8 0
3 years ago
A third party intercepting a packet and downloading its information before it is sent onward toward its destination is called
SSSSS [86.1K]

Answer:

Explanation:

<u>Packet sniffing</u> is the process of capturing each packet that is transmitted over the network and analyzing its content. Most of the time, packet sniffing is used to troubleshoot network problems or to gather network statistics. The software or device used for capturing packet data is called packet sniffer, packet analyzer, network sniffer or simply network analyzer.

The Packet Sniffer Sensor monitors, among other things:

• Total traffic

• Port sniffer

• Web traffic (HTTP, HTTPS)

• Mail traffic (IMAP, POP3, SMTP)

• File transfer traffic (FTP, P2P)

• Infrastructure traffic (DHCP, DNS, ICMP, SNMP)

• Remote control (RDP, SSH, VNC)

• Other UDP and TCP traffic

Third party intercepting a packet and downloading it information before it is sent onward toward its destination is called <u>Packet Sniffer</u>

4 0
3 years ago
What would happen if computers only had input peripherals and a CPU
Wewaii [24]
It will overheat because it don't have gpu
8 0
3 years ago
Read 2 more answers
Other questions:
  • Write a function (named n_pointed_star) to make the turtle draw an n-pointed star. The function should return nothing, and accep
    10·1 answer
  • A(n) ____ is a system designed to handle only very basic applications with an absolute minimum amount of hardware required by th
    9·1 answer
  • What purpose would tracking changes be most useful for?
    7·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    5·1 answer
  • In which of the following scenarios would it be best to use a for loop?
    6·1 answer
  • The _____ feature will mark all changes made to a document for others to review at a later time.
    13·1 answer
  • PLEASE HELP!!! WILLGIVE BRAINLIEST!!!
    11·2 answers
  • 3. Comparing the Utopian and dystopian views of Technology according to Street (1992) which one in your view is more applicable
    14·1 answer
  • Press _________ to toggle the selected range as bold​
    6·1 answer
  • Using only AND, OR and inverter gates to implement the above Boolean equation, how many gates are needed
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!