1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
5

When looking at aggregated logs, you are seeing a large percentage of Windows hosts connecting to an Internet Protocol (IP) addr

ess outside the network in a foreign country. Why might this be worth investigating more closely
Computers and Technology
1 answer:
mario62 [17]3 years ago
7 0

Answer:

"It might demonstrate a malware infection" is the correct response.

Explanation:

  • Because once glancing at aggregate data log files, clients could perhaps actually listen to road conditions but instead correlation coefficient.  
  • For obvious reasons, whenever you see a significant portion of presenters designed to connect to something like a particular destination out beyond your channel, it might have been worthwhile to investigate quite tightly, although it might demonstrate malware.
You might be interested in
A common text feature is,
Umnica [9.8K]
The answer would be D the summary
4 0
3 years ago
Whate are some creatures/animals that the robot rex imitates?
Rzqust [24]

<span>The Rex robot imitates the dinosaur perfectly. In terms of its structure, the robot looks like a dinosaur, and this is seen in the robot’s serrated teeth. To some extent, the robot imitates the cheetah due to its speed ability.</span>

3 0
3 years ago
I want to select between 5 different 2-bit inputs and output it. How many bits do I need to specify which input?
miskamm [114]

Answer:

3 select inputs are required to select a specific input between 5 inputs.

Explanation:

Multiplexer is used to select the inputs from different inputs to a single output. There are many types of multiplexers for different number of inputs selection. 1. 2x1 is the type of multiplexer where 2 inputs and 1 output. This is used to select between these inputs. There is one more pin to select the input between these two inputs that is called <em>select </em>input.

2. Another type is 4x1 multiplexer. There are 4 inputs and one output. In this type of multiplexer 2 select pins are used for selection of input bits between these 4 inputs.

For more than 4 inputs and less than 8 inputs, 8x1 multiplexer is used. this multiplexer uses three inputs for selection purpose.

8 0
3 years ago
E) ¿Entiende usted que tendría repercusión legal un mal manejo de los datos del cliente por parte de la empresa? ¿Por qué?
weqwewe [10]

Answer:

Efectivamente, un mal manejo de los datos del cliente por parte de la empresa tendría repercusiones legales que afectarían negativamente a la compañía. Esto es así porque un eventual mal manejo de los datos personales de los clientes implicaría una filtración de dichos datos hacia el resto del público, con lo cual los datos personales y privados de cada cliente se verían expuestos en forma pública, generando así posibles daños a estos a través de la mala utilización de dicha información por parte de terceros malintencionados.

4 0
3 years ago
For any element in keysList with a value greater than 60, print the corresponding value in itemsList, followed by a semicolon (n
nika2105 [10]

Answer:

Below are the python Program for the above question:

Explanation:

keysList =[1,61,68,64]#key list items.

itemsList =[1,2,3,4]#item list items.

for x in range(len(keysList)):#for loop.

   if(keysList[x]>60):#check the value to be greator.

       print(itemsList[x],end=";")#print the value.

Output:

  • The above code will print as "2;3;4;".

Code Explanation:

  • The above code is in python language, in which the first and second line of the code defines a list. That list can be changed by the user when he wants.
  • Then there is a or loop that scans the keylist items and matches the items that it is greater than 60 or not. If it then takes the location and prints the itemlist by the help of that location.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Information management examines the organizational resource of information and regulates its definitions, uses, value, and distr
    11·1 answer
  • Hanging out with friends, watching your favorite TV show, and buying a pair of new shoes are all examples of _____ for doing wel
    5·2 answers
  • You can use predesigned, formatted files called _____ to create new worksheets quickly.
    13·1 answer
  • The audience, setting, and type of presentation help determine presentation content. True or False?
    8·1 answer
  • What feature of a word processing program helps you to easily check and correct spelling mistakes?
    9·1 answer
  • David is working in a database that organizes student exam grade information. He needs to find all students who have scored 100
    15·1 answer
  • Why should computers have a file structure?
    7·2 answers
  • What is the relationship between interoperability and the other quality attributes highlighted in this book? For example, if two
    5·1 answer
  • Anybody know this question???
    6·1 answer
  • Which term describes a secure, individual, private cloud-computing model hosted within a public cloud?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!