1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergij07 [2.7K]
3 years ago
6

8 POINTS!!!!!!!!

Computers and Technology
2 answers:
user100 [1]3 years ago
6 0

Answer:

@ is your answer

Happy to help

Pls mark as Brainliest

kumpel [21]3 years ago
3 0
I believe it is @, since it means "directed to someone" showing that you are talking to them
You might be interested in
Match each code snippet to its appropriate markup language name
Mazyrski [523]

Answer:

Please find the complete solution in the attached file.

Explanation:

8 0
3 years ago
What is the use of an NDP?
Makovka662 [10]

Answer:

It defines five ICMPv6 packet types for router solicitation,router advertisement,neighbor solicitation,neighbor advertisement,and network redirects.

Explanation:

8 0
3 years ago
Company A has a project plan for a new product under development. The product will be one of many released in the coming year. T
gizmo_the_mogwai [7]

Answer:

Company A

The ISO 27002 classification level that is most likely assigned to this document is:

b) Proprietary

Explanation:

The ISO 27002 classification levels adopted by commercial organizations are Restricted (top secret is preferred in government circles), Confidential, Internal (or proprietary), and Public. Since the new product is under development, one of many, and most likely known to the project team, the project plan will be classified as Proprietary.  Company A designates this document as Proprietary or Internal to show that disclosure of the information to its competitors is not allowed.  This level of classification shows that Company A can establish intellectual property rights over the document.

4 0
3 years ago
Compiler software has a stepping function that
just olya [345]

Answer:

Runs code line by line to help developers find bugs.

Explanation:

I took the test.

3 0
3 years ago
Read 2 more answers
In 2016, NIST published a new Federal Master Cybersecurity Framework to create a mandatory framework for managing cybersecurity
ICE Princess25 [194]

Answer:

In 2014, NIST published a new Federal Master Cybersecurity Framework for managing cyber risk for the delivery of critical services. So the correct answer is False.

Explanation:

NIST published the Federal Master Cybersecurity Framework to managing risk for the delivery of critical services. The U.S. issued Framework on February 12, 2014.

8 0
3 years ago
Other questions:
  • If you want to be more efficient at using the World Wide Web, refresh the page often.
    7·1 answer
  • Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.
    11·1 answer
  • A group of computers that are interconnected in order to share information or documents is called a _____.
    7·1 answer
  • Match each scenario to the absolute value expression that describes it. 1. the distance moved when going backwards five spaces i
    13·2 answers
  • Pleasee help. How do you fix this problem in discord?
    10·1 answer
  • Describe the different non-printing characters,​
    11·1 answer
  • I used a walmart MoneyCard and now it says its prepaid. Its my dad's card.
    12·1 answer
  • Were can i watch unexpected free season 3
    9·1 answer
  • Screen reading for extended periods can cause___________ _____________, so the position the monitor to minimize glare and give y
    5·1 answer
  • What is referential integrity
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!