1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
3 years ago
10

Solve this for brainlest​

Computers and Technology
1 answer:
saw5 [17]3 years ago
6 0

Answer:

which chapter is this

Explanation:

You might be interested in
1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
ioda

The well-designed standard architecture for security features in computer networking is defined by the OSI Security Architecture.

The OSI architecture is widely accepted because it establishes the process for ensuring safety in an organization. In a live attack, the victim is made aware of it. The victim of a passive attack is not made aware of the attack. System resources can be modified during an active attack. System resources are not changing while under passive attack. Monitoring a system is the focus of passive assaults, which do not require changing any data on the target system. On the system under attack, active threats will alter data.

Learn more about system here-

brainly.com/question/14253652

#SPJ4

6 0
1 year ago
Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
Sindrei [870]

Answer:

Cloud Computing        

Explanation:

Cloud Computing is basically an infrastructure to deliver various computing resources and services  to the users online (via Internet). These resources include networks, applications, servers, databases, software, storage etc.

These services are mostly utilized by organizations for recovery and backup of data, using virtual hardware and other computing resources such as desktops, memory etc. Cloud computing is also used for developing software, for securing data by providing with access control and for storing bulk of data.

The benefits of cloud computing are as following:

Because of cloud computing the customers do not have to buy hardware or install software on their computer which might be very costly to maintain and update. Servers and data centers are provided by cloud service providers and experts are available for managing the services and resources.

These services are scalable and can be adjusted as per the users requirements.

Cloud computing offers a variety of protocols, tools, and access controls that improve security and protects confidential data, applications, and networks against security threats and attacks. It also provides with data backup, disaster recovery.

5 0
3 years ago
Consider an allocator that uses an implicit free list. The layout of each allocated and free memory block is as follows: 31 210
kakasveta [241]

Answer:

Explanation:

start with what you know

6 0
3 years ago
I really need help with this question, I can’t fail this please :) tysm
Maurinko [17]

Answer:

i think its the third one, i hope this helps

Explanation:

4 0
4 years ago
Consider the problem where you are given an array of n digits [d and a positive integer b, and you need to compute the value of
Fofino [41]

Answer:

The question is completely described and solved below:

3 0
3 years ago
Other questions:
  • Select the correct answer.
    5·1 answer
  • A 10MB file is compressed into a 2MB file for storage. What is the compression ratio?
    6·1 answer
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
    5·1 answer
  • You can write as many constructors for a class as you want, as long as they all have different ____ lists.
    8·1 answer
  • Does anyone know what happened to Cole Morgen, the actor?
    11·1 answer
  • Given the message size of 16Kb, packet size of 2Kb, speed of 4Kbps over 3 links, how much time, will it take the message to trav
    6·1 answer
  • Create the arrays and assign randomized values for each element in the array. The randomized values should range from 1 to twice
    9·1 answer
  • When was the first computer made?
    8·1 answer
  • Which word did alexander graham bell want adopted as a telephone greeting instead of hello.
    13·2 answers
  • What are 15 importance of information processing cycle?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!