1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
9

Blogs may refer to any kind of communication over the internet is true​

Computers and Technology
1 answer:
Sliva [168]3 years ago
6 0

Answer:

Yes It's true but You forgot email

Explanation:

You might be interested in
List three different sets of keywords that could be used to search for information on how to
ohaa [14]

Answer:

Set 1: "Trumpet", "Maintenance", "Instructions"

Set 2: "How to", "Trumpet", "Care", "Instrument"

Set 3: "Proper", "Clean", "Service", "Trumpet"

Explanation:

Actual search engines allow very advanced searches, using multiple words related with your objective will improve the results obtained. Also you can refine your search by using specific operators to include or exclude words, websites, file types or dates.

For example in Google search, using + and - will force the results to include and exclude respectively the  following word. Typing several words between " (double quotes) will search specifically for that sentence, the same words and in the same order. Using filetype: will restrict results of a specific file extension, like jpg, or pdf.

There are many other operators available, you can find more information about this by looking for "advanced search operators" of your favourite search engine.

7 0
3 years ago
What do you call the destination router on the network endpoint?
forsale [732]
It could be called the <span>I​Request​Reply​Router.</span>
7 0
3 years ago
Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
antiseptic1488 [7]

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, <u>it would have been better if the writer includes experience with a computer virus</u> so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

3 0
3 years ago
There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi
torisob [31]

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

6 0
3 years ago
A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate is known a
Pavel [41]

Answer:

Certificate Signing Request(CSR).

Explanation:

Certificate Signing Request(CSR):- It is a message that is specially encrypted Which validates the information that is required by CA for the issuing of a digital certificate.

It is the first step towards getting your own SSL certificate.

So we conclude that the answer to this question is Certificate Signing Request (CSR).

5 0
3 years ago
Other questions:
  • According to the partnership for 21st-century learning critical thinking ability includes all the following skills except
    15·1 answer
  • Assume you previously entered these lines of code.
    14·2 answers
  • A(n) _____________ is a system that prevents a specific type of information from moving between untrusted networks and private n
    9·1 answer
  • Are the buying and selling of stocks centralized activities? Why or why not?
    10·2 answers
  • How can forms help us reduce data-entry errors?
    12·1 answer
  • Write a program that has an array of at least 50 string objects that hold people’s names and phone numbers. The program then rea
    12·1 answer
  • To speed up the display of graphics, a(n) ________ is integrated into some video cards. select one:
    12·1 answer
  • PLEASE HURRY 30 POINTS
    15·2 answers
  • The first cell phones in widespread use were . Smartphone technological advancements added services. Answer the following questi
    12·2 answers
  • Margie has found a stock template to use. She changes a few things about the formatting and then saves the
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!