1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
3 years ago
6

What is the answer???​

Computers and Technology
1 answer:
alexandr402 [8]3 years ago
4 0

Answer:

I think it should be C

Explanation:

A group of two or more computers that are link together.

You might be interested in
All formulas that begin with =IF will
amid [387]

Answer:

return a specific value, calculation or message if certain condition met

Explanation:

"if" is used for conditional statements that means, do some work if the condition is met against that logic.

e.g.

If (a > 5)

{

Show "a is greater than 5"

}

so if we put a= 6 than condition met and given statement will be shown on out put as "a is greater than 5".

6 0
3 years ago
What does a professional programmer usually do first to gain an understanding of a problem?
ElenaW [278]
The correct answer to your question is:

Professional programmers work directly with, and interview customers to find out what the problem is.
6 0
3 years ago
Read 2 more answers
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
Define a JavaScript function named showGrades which does not have any parameters. Your function should create and return an arra
grandymaker [24]

Answer:

see explaination

Explanation:

//selective dev elements by id name

var gradeA = document.querySelector("#GradeA");

var passing = document.querySelector("#Passing");

var learning = document.querySelector("#Learning");

//function showGrades

function showGrades() {

var arr = [];

//converting string to int and inserting into array

arr[0] = parseInt(gradeA.textContent);

arr[1] = parseInt(passing.textContent);

arr[2] = parseInt(learning.textContent);

//creating json blob

var blob = new Blob(new Array(arr), {type:"text/json"});

return blob;

}

8 0
4 years ago
______design A plan for the actual implementation of the system.
Stella [2.4K]

Answer:

please

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • A dropped packet is often referred to as a _____________.
    7·1 answer
  • Famed science fiction writer H. G. Wells once envisioned something to store vast amounts of information. What did he call it?
    15·2 answers
  • Which of the following are types of formatting you
    12·2 answers
  • With microprocessors, The integration of a whole _____ onto a single chip or on a few chips greatly reduced the cost of processi
    14·1 answer
  • What does snap do need the answer now
    10·2 answers
  • All of the Internet in your country disappears. What happens next?
    13·1 answer
  • Devices which are used to receive data from central processing unit are classified as
    11·1 answer
  • Explain briefly why it is sometimes necessary to roll software back to a previous version, a procedure called "software
    9·1 answer
  • Which tool can be used to increase the space between a bullet point or a number and text?
    11·2 answers
  • PHOTOSHOP IS A GRAPHICS EDITING PROGRAM CREATED WITH IMAGES KNOWN AS________ ​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!