1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
3 years ago
6

What is the answer???​

Computers and Technology
1 answer:
alexandr402 [8]3 years ago
4 0

Answer:

I think it should be C

Explanation:

A group of two or more computers that are link together.

You might be interested in
Who invented the ENIAC? More than one answer may apply.
andriy [413]

Answer:John Mauchly and Presper Eckert

Explanation:

3 0
3 years ago
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
ss7ja [257]

Answer:

Brute Force attack.

Explanation:

A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.

A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.

Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.

An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.

The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.

6 0
3 years ago
Which of the following is a quick way to restore the arrow pointer after you have used it for drawing?
Oxana [17]
A quick way to restore the arrow pointer after you have used it for drawing is to press the esc key.  The esc key is <span>used for any of the different </span>functions<span>, as to interrupt or cancel the current process or running program, or to close a pop-up window.</span>
7 0
3 years ago
Disk quotas are set using the ____ console. diskpart disk management mst windows explorer
liraira [26]
<span>Answer: Disk Management Console</span>
8 0
3 years ago
A private network that is accessible only to employees of the company that created it is called:
Trava [24]
Intranet is the answer to this question.

Google definition: An intranet is a network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization.
6 0
3 years ago
Other questions:
  • What is computer? Explain the characteristics of computer.<br>​
    12·1 answer
  • End-user development: the process by which an organization's non-it specialists create software applications.
    8·1 answer
  • OSI is a seven-layered framework used to help define and organize the responsibilities of protocols used for network communicati
    6·1 answer
  • You can create a database using one of the many templates available or by creating a new ______ database.
    9·1 answer
  • Virtual private network requires a secure remote connections<br><br> true or false?
    11·1 answer
  • assume that you want to sort an array have 100000 elements which algorithm (insert sort algorithm or quick sort algorithm) is th
    12·1 answer
  • A class is a _____, which encapsulates _____ and _____. (Points : 2) programming language construct; attributes; behavior
    7·1 answer
  • Which are examples of non-linear presentations? Choose all that apply.
    11·1 answer
  • Looking for friends, anyone up for it?
    12·2 answers
  • I came here for a answer so why did i get a pep talk
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!