1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tankabanditka [31]
3 years ago
5

Select the best answer to the following question.

Computers and Technology
1 answer:
Fittoniya [83]3 years ago
8 0

Answer:

I think its called "cloud computing"

You might be interested in
jakie krasnale mieszkaja we wroclawiu i opisz kto napisal kronike, prosze nie kopiowac dlugich tekstow najlepiej by bylo opisac
ASHA 777 [7]
Co kronika czytasz od?

6 0
4 years ago
How long should a resume be
Anuta_ua [19.1K]
At least two pages long
3 0
3 years ago
Read 2 more answers
Which microsoft operating system started the process of authenticating users with a user name and password?
11111nata11111 [884]
It should be either windows 98 or windows xp but I think it is windows xp
5 0
3 years ago
What does the headgear of a mine do
deff fn [24]
Hard to answer to short but I will try the head gear let's you talk to people on the internet
5 0
4 years ago
Read 2 more answers
________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
andrew-mc [135]

Investigating system logs helps in determining the cause of a security threat in an incident response plan.

<h3>What do system logs works for?</h3>

A system log is known also as syslog. This is known to be that part of a system that tells or show the  records of all the actions that takes place in an operating system.

Conclusively, the Investigating system logs helps in determining the cause of a security threat in an incident response plan because it will tell all of the startup messages, system changes and other processes that took place in the system.

Learn more about security threat from

brainly.com/question/25758530\

#SPJ1

3 0
2 years ago
Other questions:
  • What is used in an ipv6 for local device to learn the layer 2 ethernet address of a device that is on a remote nonlocal vlan?
    14·1 answer
  • ____________________ software is a type of security software designed to identify and neutralize web bugs, ad-serving cookies, a
    8·1 answer
  • Which feature of virtualisation helps increase the IT productivity of a business
    14·1 answer
  • C programming:
    13·1 answer
  • A program called a ( n ) ____ translates instructions written in high-level languages into machine code.
    13·1 answer
  • When entering a expressway using a weave lane you must do what
    7·1 answer
  • Which search phrase is the most effective to find out about the most popular pizza chains worldwide in 2019?
    14·1 answer
  • Ang Kabihasnang ito ay umusbong sa rehiyon ng Timog Mexico
    6·1 answer
  • A class researching the world’s population would like to include a graph that shows historical changes. They have information fr
    7·1 answer
  • Briefly describe the function of options in a linux command and give an example of a useful option.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!