1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
3 years ago
10

Solve this for brainlest​

Computers and Technology
1 answer:
saw5 [17]3 years ago
6 0

Answer:

which chapter is this

Explanation:

You might be interested in
Janet has created a 3D movie. She wants to make a copy of the movie and store it for future use. Which device should she use?
Valentin [98]

She can use secondary storage devices like:

1) Hard Disk

2) Floppy disks

3) Pen-Drives

3 0
3 years ago
__________ has become a widely accepted evaluation standard for training and education related to the security of information sy
kirill115 [55]
NSTISSI NO 4011 has become a widely accepted evaluation standard for training and education related to the security of information system. The standard is directed at information security professionals who are experts in identifying system vulnerabilities, investigating system security, documenting, analyzing and evaluating system security technology policies.<span />
4 0
3 years ago
A result of the Gibbons v. Ogden (1824) decision was that states​
rjkz [21]

Answer:

Explanation:

Gibbons v. Ogden (1824) was a historical decision, where the congress of the United Stated wants to regular interstate commerce. This was a legal fight about the potential of the new steamboat navigation, in the Supreme Court of the United States between the best layers in those days.

This decision of the U.S. Supreme Court was Congress had the right to regulate interstate commerce.

4 0
3 years ago
Someone once observed that "the difference between roles and groups is that a user can shift into and out of roles, whereas that
mestny [16]

Answer:

All things considered newgrp has nothing to do with security jobs.  

newgrp sets the procedures bunch id which is in many frameworks are irrelevant. All gatherings are accessible. Gatherings are characterized as assortment of clients , bunch get to is conceded to documents dependent on the record gathering.  

Regularly (setgroups/getgroups ) all gatherings are in the process get to list.  

The authorization at a document or registry level has a 3 level arrangement of consents, for example, client proprietorship , bunch possession and others. All things considered the document authorization are a mix of read , compose and execute .we need both peruse and execute consent to run a program.  

A procedure may get to the document if a record has a place with the user(the proprietor of the document ) or if the gathering identifier coordinate on the gatherings in the clients bunches list. That entrance is constrained by the relating consents signals on the record.  

Gatherings have been over-burden with some "job" definitions. In any case, these are just over-burden and not a decent utilization of groups,the utilization of a gathering as a job was bolstered by the setgroup id banner , and by utilities like a sudo , where gathering name likewise coordinates a security control. It expect that the gathering name isn't utilized for documents yet once a client is in the gathering that client can apply the gathering to a record regardless of whether it isn't what the gathering was for.  

This over-burden use worked where frameworks didn't bolster genuine jobs. The over-burden utilize was only a work around.  

Linux has genuine job definition bolstered by SELinux models and can be applied to documents , clients , and forms.

7 0
4 years ago
________ is the extent to which differences in observed scale scores reflect true differences among objects on the characteristi
AysviL [449]

Answer: Validity

Explanation:Validity is the type of claim that is made towards the measuring of reliability of any element. The differences appearing in the measurement of the elements displays the validly factor is not up to the mark which indirectly implies that reliability is not high. Validity is the situation in which all the parameters appearing in the element is perfect. If validity is perfect then only perfect reliability is achieved.

7 0
4 years ago
Other questions:
  • Which of the following is CORRECT about database managementsystem's languages?
    6·1 answer
  • A high school student is working as a summer intern at your company. Explain to the intern how viruses, malware, and spam impact
    11·1 answer
  • Daniel has a list of numbers that are not in any order. He wants to find the order of the numbers with the help of a spreadsheet
    10·2 answers
  • What is the correct html element for playing audio files?
    11·1 answer
  • Suppose that we are using PDDL to describe facts and actions in a certain world called JUNGLE. In the JUNGLE world there are 4 p
    7·1 answer
  • Complete the sentence.<br> In your program, you can open
    5·1 answer
  • Define the term algorithm and describe how programmers use algorithms when designing a program.
    8·1 answer
  • Write any two word processing software​
    11·1 answer
  • What is the chip that allows the screen to work
    14·2 answers
  • Suppose that you are given the following partial data segment. what value does idtype contain, in decimal?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!