1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
9

Blogs may refer to any kind of communication over the internet is true​

Computers and Technology
1 answer:
Sliva [168]3 years ago
6 0

Answer:

Yes It's true but You forgot email

Explanation:

You might be interested in
In computer security what do the rows and columns correspond to in an 'Access Control Matrix'. What does each cell in the matrix
Tcecarenko [31]

Answer:

Explanation:

An Access Control Matrix ACM can be defined as a table that maps the permissions of a set of subjects to act upon a set of objects within a system. The matrix is a two-dimensional table with subjects down the columns and objects across the rows. The permissions of the subject to act upon a particular object are found in the cell that maps the subject to that object.

Summary

The rows correspond to the subject

The columns correspond to the object

What does each cell in the matrix contain? Answer: Each cell is the set of access rights for that subject to that object.

4 0
3 years ago
Question 1
Alexxandr [17]

Explanation:

so, what do you think ?

I am sure you have used a computer or a smart phone yourself.

how many clicks or taps do you want to do before you you get what you were looking for ?

hmmmm ?

as few a possible, right ?

ideally, of course, this is one (1) click or tap.

7 0
2 years ago
Maria is an experienced programmer who has worked on different projects. She was recently promoted to be a software development
Lana71 [14]
Leading a software engineering/development team must require patience, understanding, and of course strong leadership skills. To lead a software team, you have to understand the work that goes into programming and building the end product which takes time. Additionally, strong leadership and communication skills can drive the team towards the goal, which has been set.
5 0
3 years ago
Jack follows the steps below.
Eddi Din [679]

Answer:

D is my answer to this question.

5 0
3 years ago
Read 2 more answers
You are the security analyst for your organization and have discovered evidence that someone is attempting to brute-force the ro
Sergeu [11.5K]

Answer:

Active Attack

• It is an active attack 1, because someone is actively attacking your system. It is also an active attack because it is affecting the way your system works negatively, and visibly.

• 2, because they have been caught for actively committing a crime.

• lastly, because a brute-force is classified as an active attack, regardless. It is an illegal way to attempt to damage, steal or change a root password.

•<em> Fun fact </em>

 <em>A DDoS(distributed denial-of-service) is also classified as an active attack.</em>

6 0
2 years ago
Other questions:
  • The encapsulation unit on the presentation layer of the osi model is
    10·1 answer
  • Which best describe a resource each student could use to find information
    6·2 answers
  • When you set the position property for a block element to fixed, the element
    5·1 answer
  • Match the job titles to the tasks
    11·2 answers
  • 1) In your own words, explain what a browser is. 2) Why is it important to keep your browser up to date?
    12·1 answer
  • In Python, if var1 = "Happy" and var2= "Birthday" and var3 = (var 1+var2) *2, then var3 stores the string
    6·1 answer
  • A DBMS commonly receives data update requests from application programs.A. TrueB. False
    11·1 answer
  • The term Linux Intrusion Detection System ( LIDS) refers to a command that allows an administrator to run processes as root with
    5·1 answer
  • In GD, what does RWR stands for?
    9·1 answer
  • 48
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!