1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
loris [4]
3 years ago
5

What is meant by normalization? Occurs when an intrusion detection system labels normal activity as anomalous. The process of tr

anslating log files from various systems into a common format. Occurs when an intrusion detection system overlooks anomalous activity. The process of translating and reformatting raw log files into useful reports
Computers and Technology
1 answer:
Sladkaya [172]3 years ago
4 0

Answer:

hello kitty hi hi hi hi hi hi good hi out out of bound

Explanation:

You might be interested in
Research and identify at least five specialized search engines and their applications.
Varvara68 [4.7K]

Specialized search engines indexes content specialized by topic or location and are used to deliver more relevant results to the user. It indexes pages for particular topics. Examples of specialized search engines and their applications include;

1. Uquery.com – This new search engine focuses more on the emergence of iPhone and iPod touch applications

2. Taptu.com – A downloadable search engine that helps the user find items specific to fit on a mobile screen

3. Yahooligans – A sub-domain of yahoo that focuses on kid friendly games.

4. Pubmed.com – This is specifically meant for students in medical schools

5. Zillow.com – Online real estate service that provides information regarding home purchase.

5 0
3 years ago
In cell D5, enter a formula to calculate the number of days for the first workshop. Add 1 to the results to include the total nu
iris [78.8K]

Answer:

D7

Explanation:

5 0
4 years ago
EXERCISE
nirvana33 [79]

Answer:

1. True

2. True

3. False

4. True

5. True

8 0
2 years ago
A commonly-used estimate for the number of bytes needed to store one
Basile [38]

Answer:

0.127 miles ; 5.458 *10^8 miles

Explanation:

Number of bytes needed to store a page = 2000

Number of pages (Harry Potter's book) = 800

Total memory required to store entire book = (2000 * 800) = 1600000 = 16 * 10^5 bytes

Hence,

1 byte of memory will store : (height of each book / memory size of each book)

= 3 ÷ 16 * 10^5

= 1.875 * 10^-6

For 32 bit memory space :

(1.875 * 10^-6 * 2^32) = 8053.06368 inches

1 inch = 1.578 * 10^-5 mile

8053.06368 inches = 8053.06368 * (1.578 * 10^-5) = 0.1270773448704 miles

= 0.127 miles

For 64 bit memory size :

(1.875 * 10^-6 * (2^64)) = 3.45876 * 10^13 inches

(3.45876 * 10^13) * (1.578 * 10^-5)

= 5.458 *10^8 miles

3 0
3 years ago
What is element 115 and what is it from?<br> Also what did it do?
tekilochka [14]
Its temporary name, which is being used as a placeholder, is ununpentium. Element 115<span> is one of a number of super heavy </span>elements—elements<span> with an atomic number greater than 104—that are so short-lived, they can't be detected in nature. ... Creation of </span>element 115<span> during a particle collision of americium and calcium atoms</span>.
7 0
3 years ago
Other questions:
  • Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other
    6·1 answer
  • Word provides an undo button that can be used to cancel the most recent command or action. true or false.
    10·2 answers
  • 50 pts DO NOT ANSWER FOR POINTS
    9·1 answer
  • On an open book test, Anna was asked to predict how American laws may affect the Mexican way of life if the US Constitution was
    15·1 answer
  • Describing light years
    7·1 answer
  • These icons cannot be removed from the Dock. Finder e-mail music player Trash
    14·1 answer
  • The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________
    15·1 answer
  • No spamming or links
    15·2 answers
  • How many parameters can we use in each function?
    15·1 answer
  • What can a government use to determine your location at a specific time as long as you're using your mobile device
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!